Cyber

Cyber

AMX, a supplier of audio-visual and building control equipment among whose clients you’ll find the US Army and the White House, built in a...

Sci-fi films of the past predicted that by this time the world would be inundated with hackers crashing whole financial systems, power grid, and...

The Internet of Things (IoT) is growing, soon to be a permanent feature of our lives, but there are some things about it which...

Tech Giant SAP has recently declared the launch of a new accelerator in collaboration with Sela in the field of Big Data and the...

Jared Cohen, director at Google Ideas and an advisor to the heads of parent company Alphabet Google, said ISIS should be kicked off the...
video

Flint, Michigan has had a fraught history. In the past the city was a major manufacturing centre of the American automotive industry, but the...

The US Air Force Intranet Control (AFINC) Weapon System reached full operational capability this month. This is the first cyberspace weapons system to reach...

According to the US Department of Homeland Security, the number of investigations into cyber attacks on the America’s critical manufacturing sector nearly doubled last...

The South Korean Police recently announced that it has opened an investigation into what appear to be fraudulent emails sent to S Korean officials....

ISIS is known for its strong affinity to modern technological solutions, using encrypted apps like Telegram to communicate in secret from prying eyes, and...

by Konstantin Bodragin A vocal and at times fierce debate over encryption has developed in recent months. On the one side are those proposing the...

About two weeks after publishing the draft of the export law for supervision on cyber export, and as part of the talks between exporters...

Computer vision has made great strides over recent years. Machines can now recognise objects nearly as well as humans. However, the similarity does not...

Two German researchers recently ran an analysis of North Korea’s homegrown operating system, Red Star OS. Turns out, Red Star mirrors quite closely the...

A second high-ranking American intelligence official has had his personal accounts breached in roughly three months. The personal online accounts of James Clapper, director...

Top officials of the Obama administration have met leading Internet companies in Silicon Valley in an effort to build cooperation with them in combating...

Yahoo is now starting to warn users if they’ve been targeted by state-sponsored hackers, following similar moves by Google, Facebook, and Twitter. The announcement came...

Researchers at the Computer Science and Artificial Intelligence Laboratory (CSAIL) at the Massachusetts Institute of Technology (MIT) have developed a new online text messaging...

Researchers from the Centre for Security Communication and Network Research (CSCAN) at Plymouth University have developed a new system for secure, multi-level authentication that...

UAVs have become a common presence in the US military, but they have also spread to other US law enforcement agencies like local police...

Criminals are earning around $70 million a year by installing malware on users’ devices, a new study RiskIQ study reveals. The “Digital Bait” study,...

One of the most popular gifts this year is the Hello Barbie, an internet-connected doll that actively listens and responds to children, using fairly...