Snowden Casts Doubt On ISIS Encryption Video

0
ISIS likes to tout itself as extremely technologically proficient. The organisation releases apps, instructions on online behaviour, and has recently released a video showing...

Air-Gapped Computers Proven To Be Penetrable

0
Researchers from the  Ben-Gurion University of the Negev (BGU) Cyber Security Research Center have discovered that virtually any cellphone infected with a malicious code can use GSM phone frequencies...

China Boosts Surveillance State Using (Not) Big Data

0
In a not surprising turn of events, China is employing ever more sophisticated technologies in its surveillance apparatus to allow authorities to profile and...

UK Announces Creation of the 77th Cyber warfare Battalion

0
Britain’s cyber unit for soldiers familiar with social media. Documents leaked by Edward Snowden demonstrate that the NSA and its allies are preparing for future...

New Study Ranks Nations On Cyber Vulnerability

0
Damaging cyberattacks on a global scale continue to surface every day. Some nations are better prepared than others to deal with online threats from...

Cloud computing and web-born IT threats

0
Kaspersky Lab Achieves VMware Ready - vCloud Air Status under Access Tier in vCloud Air Air ISV Program. Kaspersky Lab announced today that Kaspersky Anti-Virus...

Cyber war has arrived in New Zealand

0
The New Zealand Defense Force wants to spend $469 million creating itself a new cyber army. The kiwis have cut back on their defense force dramatically...
homeland security

Blockchain Technology Enters Homeland Security Department

0
The US Department of Homeland Security (DHS) is preparing to utilize Blockchain technology, an approach in technology that replaces data managers with encrypted blocks...

Cyberterrorism: Arab hackers attack Israel

0
Desert Falcons - First known Arabic Cyber Espionage group attacking victims in Israel and the Middle East. Kaspersky Lab’s Global Research and Analysis Team has...

Iran Warns Israel Of “Crushing Response” To Cyber Attack

0
An Iranian official has threatened Israel with a “crushing response” to any attemp to tamper with its technological infrastructures. According to the Irani Communications...

Cyber Caliphate or Kremlin False-Flag?

0
The so-called Cyber Caliphate, the supposed cyber army of jihadist organization ISIS, has featured prominently in the news in recent years with a string...

Cyber ​​Defense Is Essential To Assure Reliable Operation Of The Power...

0
Daniel Ehrenreich Cyber defense solution for Distributed Management Systems – DMS used by electric utilities are operating without interfering with the control process and therefore...

US Elections Implications on Global Cyber Security

0
US policies regarding cyber security raise interest in governments, organizations and businesses all over the world. Many wonder wheather the upcoming presidential elections in...

How Can Technology Reduce Crime?

0
London, Bristol and Milton Keynes are only some of the breakthrough cities in the “Smart City” revolution, already applying annitiatives such a a city-wide...

FBI Can Now Hack Computers Anywhere In The World

0
The FBI now has the powers to hack computers anywhere around the world, the Intercept reports. The US Supreme Court approved changes to regulations...

NATO To Hold Hybrid Combat Drill, Largest Since Cold War

0
NATO is preparing to hold its most complex military drills in decades — perhaps since the Cold War — as it readies allied troops...

Programming With The Enemy

0
In a cost-saving move, Pentagon contractors subcontracted their work to the Russians, a four-year probe concludes. The probe was started in 2011 after John C...

FBI Director Covers Webcam With Tape Against FBI

0
The FBI possesses the ability to activate cameras on computers around the world, and has been doing it for years, revealed Marcus Thomas, a...

New Software To Identify ISIS Recruiters On Social Media

0
ISIS is busy producing many videos to post online, trying to recruit more fighters to join its ranks, which is terrorizing Iraq and Syria....

Pentagon Concerned About Killer Robots

0
The Pentagon is concerned with adversarial nations giving robots and advanced weapons systems the power to act of their own accord, said Deputy Defense...

New Technology Can Detect Physical Attacks Using WiFi Signals

0
The Internet of Things (IoT) is fast becoming an everyday reality, with about half of enterprises set to deploy IoT solutions by the end...

Most cars are vulnerable to hacking or privacy intrusions

0
All a hacker needs to be able to break into your car is an iPad. This, according to a report which was recently released...

Latest

Image from video https://www.youtube.com/watch?v=M1Z5fCmJ1mE&t=1s&ab_channel=%D0%A1%D0%BB%D1%83%D0%B6%D0%B1%D0%B0%D0%B1%D0%B5%D0%B7%D0%BF%D0%B5%D0%BA%D0%B8%D0%A3%D0%BA%D1%80%D0%B0%D1%97%D0%BD%D0%B8

Ukraine’s Sea Baby Drones Just Got Deadlier

0
Ukraine improves its autonomous maritime capability by upgrading its “Sea Baby” multi-purpose unmanned surface vehicle (USV), which is now primarily focused on providing security...