Islamic State

Islamic State in India – Recruitment Patterns and Technology Use

0
Technologically-advanced Islamist terror groups gain momentum in India. India’s intelligence agencies and state police forces coordinated to bust a hitherto unknown jihadist cell, apparently...
IoT security

IOT Security – An American Top Priority

0
The U.S. Department of Homeland Security (DHS) is planning to invest $1 million in five IoT security startups selected through its program Securing the...
threat calls

Threat Calls Against US Jewish Institutions – Using Masking Technologies

0
Federal investigators believe the latest wave of threat calls against Jewish centers and schools around the country was a coordinated attack perpetrated using sophisticated...
smartphone

Which Smartphone Will Serve for Secure Military Communications?

0
  The UK military chose the smartphone that warrants the utmost security against malicious actors, for its sensitive communications. The iPhone 7 is being turned into...
digital identity

Digital Identity to Go Through Security Revolution

0
A national digital identity network is to be built in Canada. SecureKey Technologies and a Canadian non-profit coalition have received a grant from a...
startup festival

Startup Festival – Call for Pitches in All Technology Fields

0
We are delighted to invite you to participate in a unique event and present on our stage your original ideas to investors, customers and...
homeland security

Blockchain Technology Enters Homeland Security Department

0
The US Department of Homeland Security (DHS) is preparing to utilize Blockchain technology, an approach in technology that replaces data managers with encrypted blocks...

An Equivalent to License plates – for UAV’s?

0
AirMap, a world leader in airspace management for unmanned aircraft, recently announced a partnership with DigiCert that will enable, for the first time, instant...

Women Suspected to Attempt Next Terror Attack

0
Europe is preparing for its next Islamic State-inspired terror attack to be carried out by a female assassin after a string of arrests of...

New Encryption Solution for Microsoft

0
WinMagic Inc., a data encryption firm, announced recently the availability of SecureDoc for Microsoft’s BitLocker, an intelligent key management and encryption solution that improves...

Cyber Security Researchers Exfiltrated Data from Isolated Computers

0
Researchers from the Ben-Gurion University of the Negev (BGU) have demonstrated that an unmodified USB connected to a computer with malicious code can be...

New Anti-Terror Tools Sought in Encrypted Messaging  

0
France and Germany are insisting makers of encrypted messaging apps such as Telegram to help governments monitor communications among suspected extremists. Privacy advocates argue that...

Defending Encryption? In France, It Could Start Costing you

0
A new French law would impose penalties and fines on smartphone manufacturers who refuse to hand over encrypted information to law enforcement in terrorism...

Latest

3D-Printed Antennas Bend Without Breaking the Signal

0
A new type of 3D-printed antenna could transform how vehicles, drones, and wearable devices maintain wireless communication while in motion. Developed by researchers at...