Cyber

Cyber

North Korea continues to be a main source for global and regional instability due to its reckless behaviour. Every so often threats are made...

By Lior Mazor The year 2014 was a turning point for mobile applications, having surpassed all other softwares in accessing the internet from a personal...

Many people are afraid to fly. Most of them fear than the plane will suffer a malfunction they have no control over midflight, as...

Seven teams from around the country have earned the right to play in the final competition of DARPA’s Cyber Grand Challenge (CGC), a first-of-its-kind tournament...

Today almost anything imaginable can be printed with 3D printing. Usually the prints are done for completely civilian fields, such as printing home untensils...

Large terror organizations, being an important target of world’s intelligence agencies, are well aware of their inferior situation in comparison to the national organizations,...

The meaning of Internet of Things (IoT) is basically a connection of all apects of our lives, anything technological (and not technological) in our...

Many times, when mentioning technological advancements, it is in the context of making tasks easier for man to do and keeping his life safe....

U.S. Army War College in Carlisle, Pa. has grouped together the best minds on cyber in order to brainstorm and create a new defense...

Biometric identification technology is a highly advanced security measure that allows a high level of protection from entrance of unauthorized persons to specific areas....

As cyber threats on countries of Europe are getting to be more present, more threatening and by the hands of more professional people, anything...

The US Army is seeking to equip its cyber warriors with cutting-edge networking hardware, and it is going outside the traditional acquisitions system to...

In an age where technology occupies a more central place in our lives as each day passes, there’s no doubt that everyday life get...

Let us do a little experiment: Try to close your eyes and think of the number of people you know that don’t have an...

By Rachel Ehrenfeld Shutting down the background check system of the Office of Personnel Management employees will do little to prevent the abuse of millions...

Earlier this year a new malware was detected in Kaspersky company’s labs which spread and affected the company’s systems. Following this finding, the company launched...

In a conference recently held in the state of Wyoming, U.S., an FBI official of the criminal and national cyber security squad said that...

Many cities around the United States have begun using LED lightbulbs in their street lamps in order to save energy and money, as the...

For some time now a wide and passionate debate is conducted in Israel regarding the Biometric databse the country plans to implement on its...
video

Future Forces For HLS Future Forces 4 HLS   The upcoming conference for the HLS Future Forces is to be held on July 21st, bringing with...

By ARIE EGOZI The Israel defense forces (IDF) decision to officially establish a cyber command is a symbolic act. According to foreign sources Israel has...

In light of several successful cyber attacks on U.S. goverment systems, it is clear that the issue of defence against cyber attacks isn’t at...