China’s twenty-five technology companies have pledged to counter online terror activities.
Chinese search engine Baidu, Tencent investment holding company, Alibaba and JD.com - e-commerce companies,...
We’ve have written at length on these pages about the dismal state of security in most consumer-grade tech products. For many manufacturers, it seems,...
A new torjan horse malware called USB Thief, which is virtually undetectable before and after penetrating the computer, was detected by ESET. The software...
The US National Security Agency (NSA) has a serious concern: quantum computing. Last year, the NSA warned the general public that encryption algorithms that...
We’ve reported on the upgrades to the cybersecurity of Britain’s Trident nuclear deterrent, but the United Kingdom is stepping up its game in cyber-defence...
The Pentagon is concerned with adversarial nations giving robots and advanced weapons systems the power to act of their own accord, said Deputy Defense...
Britain’s Trident nuclear deterrent is getting a much needed upgrade to defend it from cyberattacks.
Potential attacks by hackers from Russia, China, ISIS, or...
Much has been said recently of preparedness for cyberattacks. Intelligence, homeland security, and defence departments and agencies are tasked with setting up defences, coming...
The US Department of Defence (DoD) has announced that it’s accepting applications for its “Hack the Pentagon” initiative. This would be the first time...
MadSec’s Cyber Intelligence team, which is investigating the cyber operation OpIsrael 2016 against Israel scheduled for April 7th, 2016, reports that the group of...
I-HLS is currently building a new and unique accelerator for Defense and Homeland Security. The accelerator is meant for technological projects after a feasibility...
When we think about protecting critical infrastructure, we usually imagine cameras, fences, men with guns, and other physical manifestations of security. But experts are...