Cyber Security

Cyber Security

computer security

As hacking techniques are constantly improving, scientists have been trying to find new ways and authentication methods to secure computers. Researchers in South Korea...
biological malware

In what appears to be the first successful hack of a software program using DNA, researchers explained that the biological malware they inserted into...
autonomous vehicles

Will autonomous vehicles replace humans in the near future? Recent reports of major computer and bitcoin hacks have displayed the vulnerability of modern technologies...
mobile communication

The iHLS Security Accelerator is home to many innovative and successful startups. ListenApp is one of the first startups that's participated in the accelerator...
USB-connected devices

Security flaws found in USB-connected devices raise questions about the trustworthy of the devices. Apparently, USB connections should be redesigned to offer more security,...
cyber security rules

The United Kingdom has recently published a set of cyber security regulations, “Key principles of vehicle cyber security for connected and automated vehicles”. The...
cybersecurity platform

Recent cyber attacks have increased awareness security on the net. The cyber security market is one of the fastest growing industries in the past...
cyber security

  Driverless vehicles will be behind $7 trillion worth of economic activity and new efficiencies annually by 2050. That activity will include nearly $4 trillion...
hacking

The more digital the world becomes, the more hacking becomes a serious threat. The world's smallest "non-hackable" security chip that can be widely used...
drones

Recent years have seen the role of drones in criminal activity increasing significantly. In the area of cyber forensics, law enforcement faces a significant...
artificial intelligence

AI (Artificial Intelligence) related methods are being more and more applied in the next wave of cyber security techniques. Whether using deep learning for...
cybersecurity

With Blockchain becoming more popular these days, a significant number of US government departments are rapidly showing interest. The US Department of Homeland Security...
3d printing technology

The benefits of 3D printing technology are known, but less frequently discussed are the dangers. The open and accessible nature of the technology means...

As IoT matures, applications will be limited only by users’ imaginations. That’s the prediction of Lisa Litherland, a business architect who helps institutions create...
secure authentication

As organizations search for more secure authentication methods for data access, physical access and general security, many are turning to biometrics. The field has...
cyber

Japan’s Ministry of Defense (MoD) is considering increasing the number of soldiers in its Cyber Defense Unit (CDU) from around 110 to 1,000 and...
israeli air force

A unique technological initiative has been taken by the soldiers and graduates of the Israeli Air Force’s Ofek unit on behalf of children with...
ihls security accelerator

Side by side with the impressive weapon systems presented at the exhibition of the IAMD Missile Defense Conference, the hundreds of visitors had the...
cyber security

Not only Russia poses risks to power grid cybersecurity. Small- to mid-size energy companies are facing a variety of threats, says a new report...
electronic warfare

The US Army Research Lab has been increasingly focusing on fighting land wars against far more technologically sophisticated adversaries than it has in the...
military cybersecurity

Changes are expected in the US military cybersecurity infrastructure. After months of delay, the Trump administration is finalizing plans to revamp US military command...
biometric security

Recent years have shown that there are many difficulties in stopping attempts to evade or deceive biometric security systems. For this purpose IARPA’s (The...

Latest