Autonomous driving technology is trending towards becoming a big part of the future of the auto industry. However, the security challenges automakers and tech...
Law enforcement agencies in various countries are investigating drones used in crimes. These unmanned aerial vehicles deliver contraband, surveil military installations and sensitive institutions,...
Once again, the retail giant Wal-Mart is using blockchain in order to increase effectivity and security. After it was awarded patents for a crypto-powered...
We are delighted to invite ground-breaking startups in the unmanned systems and robotics fields to take part in the sixth unmanned vehicles & robotics...
The US has been enhancing its anti-terrorist coordination measures with its allies. An agreement was recently signed by the US Homeland Security Secretary (DHS)...
Stemming from the idea that disruptive technologies will change the character of warfare, the multidomain battle concept recognizes that the way armies will fight...
Artificial intelligence could pose both opportunities and challenges as reported by the Center for a New American Security (CNAS), one of America’s top defense...
With the advent of technologies such as artificial intelligence, robotics, quantum computing, the Internet of Things, augmented reality, materials science, 3-D printing, and data...
We are delighted to invite ground-breaking startups in the unmanned systems and robotics fields to take part in the sixth unmanned vehicles & robotics...
Cyberattacks and the methods by which the public and private sectors deter and counter them have occupied the headlines with increasing frequency in today’s...
The "smart city" sounds like a digital utopia, a place where data eliminates first-world hassles, dangers and injustices. But there are some problems with...
Militaries across the world should urgently work to avoid the "unanticipated interaction" between individual AI systems, an electronic rights organisation has warned.
Targeted at the...
A ground-breaking research dubbed Faxploit, conducted by CheckPoint, unfolds the shocking dangers of the seemingly simple and technologically innocent fax machine. The daunting news...
Major data breaches are a near-daily occurrence. Cyberthieves have been obtaining billions of passwords and other sensitive personal information. Behavioral biometrics is a new...
The proliferation of IoT technology has resulted in hundreds of thousands of connected systems being embedded in many a city’s critical infrastructures, enabling city...