Cyber Security

Cyber Security

The "smart city" sounds like a digital utopia, a place where data eliminates first-world hassles, dangers and injustices. But there are some problems with...

Militaries across the world should urgently work to avoid the "unanticipated interaction" between individual AI systems, an electronic rights organisation has warned. Targeted at the...
VPN

VPN ,or virtual private network, is a term we hear more and more. This is understandable if you take into consideration the many varied...
fax

A ground-breaking research dubbed Faxploit, conducted by CheckPoint, unfolds the shocking dangers of the seemingly simple and technologically innocent fax machine. The daunting news...

Major data breaches are a near-daily occurrence. Cyberthieves have been obtaining billions of passwords and other sensitive personal information. Behavioral biometrics is a new...

The proliferation of IoT technology has resulted in hundreds of thousands of connected systems being embedded in many a city’s critical infrastructures, enabling city...

The satellite communications that ships, planes and the military use to connect to the internet are vulnerable to hackers that, in the worst-case scenario,...
ea

Mobile devices contain access to all of our personal and corporate data. Eavesdropping is a prevailing threat among many on mobile phones, with technology...
fitness watches

Are fitness applications the new threat to military officers and Pentagon officials? A recent memo from Deputy Defense Secretary, Patrick Shanahan, states the dangers of...

The Israel Airports Authority has recently established a special Cyber defense center in Ben-Gurion international airport. The decision to establish the dedicated center was made...

The near-future battlefield will be characterized by the presence of Internet of Things: smart devices, soldier-worn sensors and unmanned aircraft will produce a nonstop...
unmanned systems

If you are part of the global and Israeli unmanned systems and robotics ecosystem, you cannot afford to miss the leading annual event in...

Cyber attacks against IoT devices can cause considerable damages. The US Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has signed a...

Cyberattacks have become a potent threat to US organizations and infrastructure. There is also a renewed concern over the possibility of Russian-sponsored meddling in...
gps jamming

$100B worth of damages is created by cargo theft every year, of which a major part involves using GPS jammers bought online for $20....
cyber technology

Information security and safety in Vietnam has been recently improved, however, potential risks remain, especially for small and medium-sized enterprises. Around 27% of recent...

Ransomware cyber attacks are intensifying in scale and sophistication, and the perpetrators are better at evading countermeasures. A recent NTT Security survey revealed that...
unmanned

If you are part of the global and Israeli unmanned systems and robotics ecosystem, you cannot afford to miss the leading annual event in...

Bluetooth is a widely deployed platform for wireless communications between mobile devices. As opposed to WiFi, it is not based on a network connecting...

Security cameras are exposed to cyber threats, including information theft and privacy breaching. The cameras have become more and more vulnerable to breaches and...

Protecting against phishing attacks, in which malicious actors attempt to gain access to a user’s credentials (and then to systems and networks) through social...

Germany wants to establish an agency like the American DARPA. Its Defense and Interior ministry officials are pushing for the creation of a new...

Latest