Identifying the methods and strategies used by organized crime networks and individuals to avoid detection on the Darknet was the focus of a specialized...
Researchers from the Ben-Gurion University of the Negev (BGU) Cyber Security Research Center have discovered that virtually any cellphone infected with a malicious code can use GSM phone frequencies...
Unmanned Aerial Vehicles (UAV) have a range of capabilities for a variety for missions, from attack missions to intelligence missions. The possibility of a...
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) last week announced a $2.9 million cybersecurity mobile app security (MAS) research and...
By Lior Mazor
The year 2014 was a turning point for mobile applications, having surpassed all other softwares in accessing the internet from a personal...
Seven teams from around the country have earned the right to play in the final competition
of DARPA’s Cyber Grand Challenge (CGC), a first-of-its-kind tournament...
Today almost anything imaginable can be printed with 3D printing. Usually the prints are done for completely civilian fields, such as printing home untensils...
Large terror organizations, being an important target of world’s intelligence agencies, are well aware of their inferior situation in comparison to the national organizations,...
Biometric identification technology is a highly advanced security measure that allows a high level of protection from entrance of unauthorized persons to specific areas....
The US Army is seeking to equip its cyber warriors with cutting-edge networking hardware, and it is going outside the traditional acquisitions system to...