Brazil Put Its Military In Charge of Cyber Security

0
Brazil's military approach to cyber insecurity is consistent with a broader effort to find a role for the Brazilian armed forces in the 21st...

ISIS Secure Messaging App Uncovered

0
ISIS is known for its strong affinity to modern technological solutions, using encrypted apps like Telegram to communicate in secret from prying eyes, and...

Cloud Video Surveillance Made Possible – Today

0
Perimeter security requirements for sensitive infrastructure, both public and private, are getting tougher by the day. Constant high resolution video streams and low latency,...

Carnegie Mellon Tor Attack Confirmed

0
Despite repeated denials by the US government, a federal judge has now confirmed that Carnegie Mellon University (CMU) was commissioned by the government to...

Equation Group: The Crown Creator of Cyber-Espionage

0
Kaspersky Lab discovers the ancestor of Stuxnet and Flame – powerful threat actor with an absolute dominance in terms of cyber-tools and techniques. For several...

Modern solutions for modern challenges

0
The modern world presents us with difficult challenges which didn’t exist in the past. Nowadays, in an age where the internet is so developed...

Israel: The Cyber Power

0
A regional power devoted to ensuring its own survival, Israel has burgeoned into a high tech epicenter built around Internet security, anti-virus software, and...

Suspicion Of Successful Cyber Attack On Patriot Battery

0
Many times, when mentioning technological advancements, it is in the context of making tasks easier for man to do and keeping his life safe....

The End of 3D printed weapons?

0
Today almost anything imaginable can be printed with 3D printing. Usually the prints are done for completely civilian fields, such as printing home untensils...

iHLS TV Future Forces For HLS

0
Future Forces For HLS Future Forces 4 HLS   The upcoming conference for the HLS Future Forces is to be held on July 21st, bringing with...

Hackers Penetrate, Control Water Utility

0
Hackers managed to gain privileged access to a water utility’s control system and change “the levels of chemicals being used to treat tap water,”...

Protect UAVs from hacking

0
The U.S Navy has kicked off a project to collaborate with outside scientists on research and development that will help protect the branch’s flying...

Islamic State Sent You A Friend Request

0
A group of supporters for the Islamic State terror organization who call themselves the Islamic State Hacking Division has published last week a list...

Four Decades Of Israeli UAV’s Technology

0
In the 1970’s, Israel was the world’s pioneer in the field of unmanned aerial vehicles (UAV). Today, Israel is still at the global forefront...

Israeli developers helped create the new IBM security program

0
ibm reveals a new integrated security system, helping organizations detect vulnerabilities and threats in real time while reducing security costs. Significant parts of the...

Big data 4 HLS Conference

0
Top experts from Israel and abroad met today in the Israel Air Force Center in Herzliya for the Big Data 4 HLS Conference, organized...

Cyber Wars? Not So Fast

0
Cyber attacks are where the modern battles take place: Military cyber attacks, like those used by Russia during its invasion of Georgia or political...

MIT Invents A Messaging System More Anonymous Than Tor

0
Researchers at the Computer Science and Artificial Intelligence Laboratory (CSAIL) at the Massachusetts Institute of Technology (MIT) have developed a new online text messaging...

Hacking The Grid Through Air Conditioners

0
With the months long power outage in Crimea, the world saw how easy it is to leave an entire region with no electricity. Attacks...

Lawful interception

0
One of the world’s fastest growing technological fields is called ’Lawful Interception’, namely enforcing the law in cyberspace and gathering cyber intelligence, as well...

Drug Cartels Can Now Spoof Patrol Drones Along US Border

0
UAVs have become a common presence in the US military, but they have also spread to other US law enforcement agencies like local police...

Which are the most notorious hacking groups?

0
Anonymous is perhaps the most notorious of all hacker groups. It is a decentralized online community of tens of thousands of anonymous 'hacktivists', who...

Latest

image provided by pixabay

US’s New Nuclear Space Rocket Shortens Trip to Mars

0
NASA, DARPA, and Lockheed Martin are working together on nuclear-powered spacecraft, which could dramatically cut down travel times to space, and more specifically to...