Cyber

Cyber

intelligence

The US intelligence community guards some of the most closely held secrets and helps defend the country from attacks. However, even it needs protection,...
cyber security

India has been advancing one more stage on the way to mobile phone cyber security. The Indian government is finalising cyber security standards to...
biometric identification

Innovation in biometric identification offer an exciting new frontier in security, with the global biometric system market expected to reach an estimated $32.4 billion...
ISIS

The Islamic State group and other militant organizations have been creating precedents in terms of discussing cyber activities almost from the start. Most cyber...
cyber security

The cyber security sphere has become first priority in various organizations, and many resources have been invested in it. But what is the situation...
casualty evacuation

The developers of the latest technologies in the robotic vehicle and drone field are about to showcase the systems’ advanced capabilities during the unmanned...
autonomous car

The autonomous car revolution taking place right now increases the need to secure these vehicles from any jamming and spoofing of the autonomous navigation....
secure communication

Today, mathematical algorithms are used to encrypt text messages, banking transactions and health information. Intercepting these encrypted messages requires figuring out the exact algorithm...
drone

Advanced features have been recently introduced into familiar drone models, allowing lower noise flight, increased flight time and more advanced photography capabilities. Drone manufacturer DJI...
emergency

Apple's new operating system will come with an option to lock your iPhone's fingerprint scanner and bring up a hotline to the police. The...

Sensitive information conveyed by military mobile communication networks requires high levels of protection. A new cybersecurity software will secure mobile devices in the battlefield....
blockchain

The digital currency Bitcoin caught the Pentagon’s eyes as a potential cybersecurity shield. The US military has been open about their interest in Blockchain...
information security

By Ilan Segelman VP Sales & Business Development, Power Communications, and Operation Manager, Sophos Israel Machine Learning has become a buzzword that many suppliers use as...
cloud computing

When disaster strikes, it’s crucial that first responders have reliable access to a controlled network, allowing them to receive and deliver critical information while...
original approach to cyber security

New methods for cyber security have been trying to offer an original approach to cyber security. Cyber behavioral pattern analysis, a state-of-the-art commercial method,...
cyber crime

The US Homeland Security department has been increasing its fight against cyber crime. Infoblox Inc., the network control company that provides Actionable Network Intelligence,...
protect the protectors

First responders are constantly looking to improve, sharpen their senses and abilities and put their hands on the most innovative and useful equipment. Now,...
3d printers

All sorts of new cyberattacks have been rising in popularity over the last few years. Due to the rise in attacks on 3D printers,...
IT security

Researchers at New York University Abu Dhabi’s Design for Excellence lab (NYUAD) have developed new innovations in computer chip technology that present landmark achievements...
computer security

As hacking techniques are constantly improving, scientists have been trying to find new ways and authentication methods to secure computers. Researchers in South Korea...
biological malware

In what appears to be the first successful hack of a software program using DNA, researchers explained that the biological malware they inserted into...
autonomous vehicles

Will autonomous vehicles replace humans in the near future? Recent reports of major computer and bitcoin hacks have displayed the vulnerability of modern technologies...

Latest