Cyber

Cyber

Canadian company Nymi has managed to develop a unique, first of its kind, technological solution: Paying with a wrist-bracelet that can detect the heartbeat...

If you are a manager of a company, you should know that it is already under attack. Though not your fault, this is certainly...

In the past, wars took place only in the real world: Armies battled each other in the physical spaces while using guns, cannons set...

It seems as though the U.S. Department of Defense feels that brains employed in the army, Pentagon and research institutes are unable to keep...
video

In the 1970’s, Israel was the world’s pioneer in the field of unmanned aerial vehicles (UAV). Today, Israel is still at the global forefront...

A group of hackers, supposedly originating in China, has comitted a cyber attack and managed to break into the American Airlines computer system, as...

Department of Homeland Security (DHS) intends to create an automated information sharing platform where all “cyber threat indicators” would be collected and disseminated to...

The rush to automate more factory processes may look like it’s saving money, but to Ken Westin, a senior security analyst at Tripwire, it’s...

Maxim Rupp, a information security researcher for the german company Cure53, has managed to penetrate the bimetric security of the Taiwanese company Chiuy Technology....

When thinking about cyber attacks, usually the first thing that comes to mind would breaking into some large company’s computer system, government’s networkd or...

Researchers from the College of Computing at the Georgia Institute of Technology were awarded $4.2 million from the Defense Advanced Research Projects Agency (DARPA)...

The modern military is heading step by step in a more tehcnological direction. With each day, as more experience is gained, technology is implemented...

Identifying the methods and strategies used by organized crime networks and individuals to avoid detection on the Darknet was the focus of a specialized...

The Internet of Things (IoT) trend is becoming more central in our lives and surrounds us everywhere. In everyday life this means the smart...

A workshop held with leaders from the US Defence Department, Army Research Lab, Institute for Defence Analysis and a select number of academics in...

Researchers from the  Ben-Gurion University of the Negev (BGU) Cyber Security Research Center have discovered that virtually any cellphone infected with a malicious code can use GSM phone frequencies...
video

About a month before the date of the 2015 AUS&R conference, it is already gaining wide interest in security industries in Israel and abroad,...

Unmanned Aerial Vehicles (UAV) have a range of capabilities for a variety for missions, from attack missions to intelligence missions. The possibility of a...

FBI Director, James Comey, gave a speech at a conference recently held in Colorado, U.S., where he revealed that the country is well aware...

Unmanned aerial vehicles are being widely used both in the public space and most certainly in the military space. Mostly, the world’s armies use...

The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) last week announced a $2.9 million cybersecurity mobile app security (MAS) research and...

The modern world presents us with difficult challenges which didn’t exist in the past. Nowadays, in an age where the internet is so developed...