By Lior Mazor
The year 2014 was a turning point for mobile applications, having surpassed all other softwares in accessing the internet from a personal...
Seven teams from around the country have earned the right to play in the final competition
of DARPA’s Cyber Grand Challenge (CGC), a first-of-its-kind tournament...
Today almost anything imaginable can be printed with 3D printing. Usually the prints are done for completely civilian fields, such as printing home untensils...
Large terror organizations, being an important target of world’s intelligence agencies, are well aware of their inferior situation in comparison to the national organizations,...
Biometric identification technology is a highly advanced security measure that allows a high level of protection from entrance of unauthorized persons to specific areas....
The US Army is seeking to equip its cyber warriors with cutting-edge networking hardware, and it is going outside the traditional acquisitions system to...
By Rachel Ehrenfeld
Shutting down the background check system of the Office of Personnel Management employees will do little to prevent the abuse of millions...
Earlier this year a new malware was detected in Kaspersky company’s labs which spread and affected the company’s systems.
Following this finding, the company launched...
By ARIE EGOZI
The Israel defense forces (IDF) decision to officially establish a cyber command is a symbolic act. According to foreign sources Israel has...