As hacking techniques are constantly improving, scientists have been trying to find new ways and authentication methods to secure computers. Researchers in South Korea...
In what appears to be the first successful hack of a software program using DNA, researchers explained that the biological malware they inserted into...
Will autonomous vehicles replace humans in the near future? Recent reports of major computer and bitcoin hacks have displayed the vulnerability of modern technologies...
The iHLS Security Accelerator is home to many innovative and successful startups. ListenApp is one of the first startups that's participated in the accelerator...
Security flaws found in USB-connected devices raise questions about the trustworthy of the devices. Apparently, USB connections should be redesigned to offer more security,...
The United Kingdom has recently published a set of cyber security regulations, “Key principles of vehicle cyber security for connected and automated vehicles”. The...
Driverless vehicles will be behind $7 trillion worth of economic activity and new efficiencies annually by 2050. That activity will include nearly $4 trillion...
The more digital the world becomes, the more hacking becomes a serious threat. The world's smallest "non-hackable" security chip that can be widely used...
Recent years have seen the role of drones in criminal activity increasing significantly. In the area of cyber forensics, law enforcement faces a significant...
AI (Artificial Intelligence) related methods are being more and more applied in the next wave of cyber security techniques. Whether using deep learning for...
With Blockchain becoming more popular these days, a significant number of US government departments are rapidly showing interest. The US Department of Homeland Security...
The benefits of 3D printing technology are known, but less frequently discussed are the dangers. The open and accessible nature of the technology means...
As IoT matures, applications will be limited only by users’ imaginations. That’s the prediction of Lisa Litherland, a business architect who helps institutions create...
As organizations search for more secure authentication methods for data access, physical access and general security, many are turning to biometrics. The field has...
Side by side with the impressive weapon systems presented at the exhibition of the IAMD Missile Defense Conference, the hundreds of visitors had the...
The US Army Research Lab has been increasingly focusing on fighting land wars against far more technologically sophisticated adversaries than it has in the...
Changes are expected in the US military cybersecurity infrastructure. After months of delay, the Trump administration is finalizing plans to revamp US military command...
Recent years have shown that there are many difficulties in stopping attempts to evade or deceive biometric security systems. For this purpose IARPA’s (The...