Cyber Security

Cyber Security

Identifying the methods and strategies used by organized crime networks and individuals to avoid detection on the Darknet was the focus of a specialized...

The Internet of Things (IoT) trend is becoming more central in our lives and surrounds us everywhere. In everyday life this means the smart...

Researchers from the  Ben-Gurion University of the Negev (BGU) Cyber Security Research Center have discovered that virtually any cellphone infected with a malicious code can use GSM phone frequencies...
video

About a month before the date of the 2015 AUS&R conference, it is already gaining wide interest in security industries in Israel and abroad,...

Unmanned Aerial Vehicles (UAV) have a range of capabilities for a variety for missions, from attack missions to intelligence missions. The possibility of a...

FBI Director, James Comey, gave a speech at a conference recently held in Colorado, U.S., where he revealed that the country is well aware...

Unmanned aerial vehicles are being widely used both in the public space and most certainly in the military space. Mostly, the world’s armies use...

The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) last week announced a $2.9 million cybersecurity mobile app security (MAS) research and...

The modern world presents us with difficult challenges which didn’t exist in the past. Nowadays, in an age where the internet is so developed...

By Lior Mazor The year 2014 was a turning point for mobile applications, having surpassed all other softwares in accessing the internet from a personal...

Many people are afraid to fly. Most of them fear than the plane will suffer a malfunction they have no control over midflight, as...

Seven teams from around the country have earned the right to play in the final competition of DARPA’s Cyber Grand Challenge (CGC), a first-of-its-kind tournament...

Today almost anything imaginable can be printed with 3D printing. Usually the prints are done for completely civilian fields, such as printing home untensils...

Large terror organizations, being an important target of world’s intelligence agencies, are well aware of their inferior situation in comparison to the national organizations,...

The meaning of Internet of Things (IoT) is basically a connection of all apects of our lives, anything technological (and not technological) in our...

Many times, when mentioning technological advancements, it is in the context of making tasks easier for man to do and keeping his life safe....

U.S. Army War College in Carlisle, Pa. has grouped together the best minds on cyber in order to brainstorm and create a new defense...

Biometric identification technology is a highly advanced security measure that allows a high level of protection from entrance of unauthorized persons to specific areas....

As cyber threats on countries of Europe are getting to be more present, more threatening and by the hands of more professional people, anything...

The US Army is seeking to equip its cyber warriors with cutting-edge networking hardware, and it is going outside the traditional acquisitions system to...

In an age where technology occupies a more central place in our lives as each day passes, there’s no doubt that everyday life get...

Let us do a little experiment: Try to close your eyes and think of the number of people you know that don’t have an...