cyber security rules

Cyber Security Rules for Autonomous Vehicles Set by UK

0
The United Kingdom has recently published a set of cyber security regulations, “Key principles of vehicle cyber security for connected and automated vehicles”. The...
dual-use technologies

Europe to Increase Control on Dual-Use Products Export

0
Lawmakers in the European Union have advanced plans to subject hacking tools to export controls currently reserved for depleted uranium, human pathogens and other...
cybersecurity

Will Blockchain Tech Revolutionize Cybersecurity?

0
With Blockchain becoming more popular these days, a significant number of US government departments are rapidly showing interest. The US Department of Homeland Security...
digital identity

Digital Identity to Go Through Security Revolution

0
A national digital identity network is to be built in Canada. SecureKey Technologies and a Canadian non-profit coalition have received a grant from a...
airport

Severe Security Breach at London Heathrow Airport

0
Heathrow Airport’s secret security planning has been revealed in files on a memory stick found in a London street. The documents outline routes and...
iot security

Mounting Efforts to Regulate IoT Security

0
While IoT devices and the data they collect and transmit present enormous benefits to consumers and industry, the relative insecurity of many devices presents...
iot security

Current IoT Security Industry Trends

0
Internet of Things - IoT security breaches have been dominating headlines lately. Even if you personally don’t suffer consequences of the mediocre security of...
cybersecurity law

China’s Cybersecurity Law Influences Tech Giants

0
There has been a growing global trend regarding the security and sovereignty of digital data - building facilities that store online data closer to...
hacking

Meet the World’s Smallest Non-Hackable Chip

0
The more digital the world becomes, the more hacking becomes a serious threat. The world's smallest "non-hackable" security chip that can be widely used...
IoT security

IOT Security – An American Top Priority

0
The U.S. Department of Homeland Security (DHS) is planning to invest $1 million in five IoT security startups selected through its program Securing the...
USB-connected devices

USB-Connected Devices Are Not Secure As Thought

0
Security flaws found in USB-connected devices raise questions about the trustworthy of the devices. Apparently, USB connections should be redesigned to offer more security,...
Islamic State

Islamic State in India – Recruitment Patterns and Technology Use

0
Technologically-advanced Islamist terror groups gain momentum in India. India’s intelligence agencies and state police forces coordinated to bust a hitherto unknown jihadist cell, apparently...
homeland security

Blockchain Technology Enters Homeland Security Department

0
The US Department of Homeland Security (DHS) is preparing to utilize Blockchain technology, an approach in technology that replaces data managers with encrypted blocks...
video streaming

New Video Streaming Solutions for the Battlefield

0
The video and metadata requirements of modern military and defense missions have been evolving rapidly, making live, real-time video delivery and management in the...
smartphone encryption

Smartphone Encryption Frustrates Law Enforcement

0
Many smartphones encrypt their contents when locked, as standard - a security feature that often prevents even the phones' manufacturers from accessing data. Such...
emergency

New Emergency Function by Smartphone Giants

0
Apple's new operating system will come with an option to lock your iPhone's fingerprint scanner and bring up a hotline to the police. The...

Women Suspected to Attempt Next Terror Attack

0
Europe is preparing for its next Islamic State-inspired terror attack to be carried out by a female assassin after a string of arrests of...
blockchain

World’s First Blockchain Secured Smartphone

0
More and more industries have been discovering the blockchain technology advantages in the field of enhanced security against hackers. Blockchain is a secure database...
smartphone

Which Smartphone Will Serve for Secure Military Communications?

0
  The UK military chose the smartphone that warrants the utmost security against malicious actors, for its sensitive communications. The iPhone 7 is being turned into...

Defending Encryption? In France, It Could Start Costing you

0
A new French law would impose penalties and fines on smartphone manufacturers who refuse to hand over encrypted information to law enforcement in terrorism...

Cyber Security Researchers Exfiltrated Data from Isolated Computers

0
Researchers from the Ben-Gurion University of the Negev (BGU) have demonstrated that an unmodified USB connected to a computer with malicious code can be...
Command and Control Capabilities

Encryption Tech Enhances Marines’ Command and Control Capabilities

0
  The US Marine Corps has been enhancing its command and control capabilities. Since July 2016, the corps has rolled out 1,100 units of its...

Latest

Image from video https://www.youtube.com/watch?v=M1Z5fCmJ1mE&t=1s&ab_channel=%D0%A1%D0%BB%D1%83%D0%B6%D0%B1%D0%B0%D0%B1%D0%B5%D0%B7%D0%BF%D0%B5%D0%BA%D0%B8%D0%A3%D0%BA%D1%80%D0%B0%D1%97%D0%BD%D0%B8

Ukraine’s Sea Baby Drones Just Got Deadlier

0
Ukraine improves its autonomous maritime capability by upgrading its “Sea Baby” multi-purpose unmanned surface vehicle (USV), which is now primarily focused on providing security...