Women Suspected to Attempt Next Terror Attack

0
Europe is preparing for its next Islamic State-inspired terror attack to be carried out by a female assassin after a string of arrests of...
digital identity

Digital Identity to Go Through Security Revolution

0
A national digital identity network is to be built in Canada. SecureKey Technologies and a Canadian non-profit coalition have received a grant from a...
USB-connected devices

USB-Connected Devices Are Not Secure As Thought

0
Security flaws found in USB-connected devices raise questions about the trustworthy of the devices. Apparently, USB connections should be redesigned to offer more security,...
IoT security

IOT Security – An American Top Priority

0
The U.S. Department of Homeland Security (DHS) is planning to invest $1 million in five IoT security startups selected through its program Securing the...
computer security

Computer Security to Be Achieved by Mini-Mazes

0
As hacking techniques are constantly improving, scientists have been trying to find new ways and authentication methods to secure computers. Researchers in South Korea...
Islamic State

Islamic State in India – Recruitment Patterns and Technology Use

0
Technologically-advanced Islamist terror groups gain momentum in India. India’s intelligence agencies and state police forces coordinated to bust a hitherto unknown jihadist cell, apparently...

New Encryption Solution for Microsoft

0
WinMagic Inc., a data encryption firm, announced recently the availability of SecureDoc for Microsoft’s BitLocker, an intelligent key management and encryption solution that improves...

New Anti-Terror Tools Sought in Encrypted Messaging  

0
France and Germany are insisting makers of encrypted messaging apps such as Telegram to help governments monitor communications among suspected extremists. Privacy advocates argue that...
iot security

Current IoT Security Industry Trends

0
Internet of Things - IoT security breaches have been dominating headlines lately. Even if you personally don’t suffer consequences of the mediocre security of...

Defending Encryption? In France, It Could Start Costing you

0
A new French law would impose penalties and fines on smartphone manufacturers who refuse to hand over encrypted information to law enforcement in terrorism...
IoT security

Digital Identity and Cryptographic Technology to Enhance IoT Security

0
Recent cybercrime and hacking exploits have shown clearly that much of the IoT – devices, services and applications – is coming online largely in...
emergency

New Emergency Function by Smartphone Giants

0
Apple's new operating system will come with an option to lock your iPhone's fingerprint scanner and bring up a hotline to the police. The...
communication encryption

Communication Encryption Dilemma

0
The past few years have been rough on law enforcement agencies around the world. Online communication is encrypted most of the time, making it...
cyber security rules

Cyber Security Rules for Autonomous Vehicles Set by UK

0
The United Kingdom has recently published a set of cyber security regulations, “Key principles of vehicle cyber security for connected and automated vehicles”. The...
threat calls

Threat Calls Against US Jewish Institutions – Using Masking Technologies

0
Federal investigators believe the latest wave of threat calls against Jewish centers and schools around the country was a coordinated attack perpetrated using sophisticated...

An Equivalent to License plates – for UAV’s?

0
AirMap, a world leader in airspace management for unmanned aircraft, recently announced a partnership with DigiCert that will enable, for the first time, instant...
Command and Control Capabilities

Encryption Tech Enhances Marines’ Command and Control Capabilities

0
  The US Marine Corps has been enhancing its command and control capabilities. Since July 2016, the corps has rolled out 1,100 units of its...
cybersecurity

Will Blockchain Tech Revolutionize Cybersecurity?

0
With Blockchain becoming more popular these days, a significant number of US government departments are rapidly showing interest. The US Department of Homeland Security...
device encryption

Device Encryption Frustrates Enforcement Agencies

0
The FBI had been unable to access data from 7,775 devices in fiscal year 2017, a growing figure causing setbacks in cases from terrorism...
hacking

Meet the World’s Smallest Non-Hackable Chip

0
The more digital the world becomes, the more hacking becomes a serious threat. The world's smallest "non-hackable" security chip that can be widely used...
secure communication

The Secure Communication of the Future City

0
Today, mathematical algorithms are used to encrypt text messages, banking transactions and health information. Intercepting these encrypted messages requires figuring out the exact algorithm...
cybersecurity law

China’s Cybersecurity Law Influences Tech Giants

0
There has been a growing global trend regarding the security and sovereignty of digital data - building facilities that store online data closer to...

Latest

Image from video https://www.youtube.com/watch?v=M1Z5fCmJ1mE&t=1s&ab_channel=%D0%A1%D0%BB%D1%83%D0%B6%D0%B1%D0%B0%D0%B1%D0%B5%D0%B7%D0%BF%D0%B5%D0%BA%D0%B8%D0%A3%D0%BA%D1%80%D0%B0%D1%97%D0%BD%D0%B8

Ukraine’s Sea Baby Drones Just Got Deadlier

0
Ukraine improves its autonomous maritime capability by upgrading its “Sea Baby” multi-purpose unmanned surface vehicle (USV), which is now primarily focused on providing security...