Online Extortion And Hacker Activity Expected To Rise In 2016
                Trend Micro, a global leader in security information solutions, presents its annual security information forecast report. The expected trends include a rise in online...            
            
        Will China Become An IoT International Power?
                The Internet of Things (IoT) is network of uniquely identifiable endpoints (or "things" that communicate without human interaction using IP (Internet Protocol) connectivity. The...            
            
        Man Charged With Smuggling US UAV Parts to Pakistan
                The United States is trying to prosecute a man accused of trying to smuggle parts for military-grade drones to the Pakistani military. 
Syed Vaqar...            
            
        Drones For Agriculture Might Mark It As Target
                The field of unmanned aviation is becoming even more central around the world. Many countries are using Unmanned aerial vehicles for operational needs, both...            
            
        New Cargo Radiation Detection Technology
                Seaports customs and security professionals might sometimes miss contraband attempts, including radiological materials. The problem was hightened during a US congressional hearing, when officials...            
            
        The Future of Security, Robots?
                Robots might be the next trend for private security. For the moment, the robots are essentially designed to patrol a certain area. They've got...            
            
        Cyber Security: Why Aren’t Public Companies Using Military Security?
                Have you ever stopped to think why defense companies have a classified network to prevent cyber attack, whereas companies handling our critical systems -...            
            
        So what is the Duqu2 malware?
                Earlier this year a new malware was detected in Kaspersky company’s labs which spread and affected the company’s systems.
Following this finding, the company launched...            
            
        Critical Infrastructure In Danger From Hackers
                When we think about protecting critical infrastructure, we usually imagine cameras, fences, men with guns, and other physical manifestations of security. But experts are...            
            
        IAI to build a professional network for the cyber community in...
                Israel Aerospace Industries (IAI) was recently awarded a contract by the Israel National Cyber Bureau in the Prime Minister's Office, to establish an innovative...            
            
        Major Hack in Juniper Networks Equipment
                US officials are worried that hackers backed by foreign governments were able to spy on communications between the US government and private companies for...            
            
        Internet of Things – for Smart and Secure City Management
                The Internet of Things (IoT) merges software and hardware with network connectivity, for the benefit of creating smart cities and safe cities.
IoT devices -...            
            
        Four DARPA projects that could change the world
                Forty years ago, a group of researchers with military money set out to test the wacky idea of making computers talk to one another...            
            
        Ransomware Could Target Medical Devices
                Medical devices may not be ever-present in headlines, but that does not mean no new developments in the field happen. Rather, in recent years...            
            
        The New Cryptography: Carbon Nanotubes
                Carbon nanotubes - is there anything they can’t do? They’re strong, hard, loaded with unique electrical, thermal, and optical properties, and have been heralded...            
            
        Fast Draw – The threat from Lebanon
                Hezbollah's open preparations for another round against Israel are extremely worrying. They are not only worrying due to the dozens of rockets the terror...            
            
        The Secrets of Security Video Analytics
                Due to improvements in the field, the demands of connected cameras today are increasing.
One of the technologies that security cameras offer us today is...            
            
        Can Hackers Leave Us Cold This Winter?
                If a hacker is capable of breaking in to our computer systems, with a little more effort surely they could disrupt larger targets as...            
            
        Of Cyber And Regulation
                Avi Yariv
At the Cyber and Regulation conference, which took place in the University of Haifa last week, special attention was given to the regulatory...            
            
        This Electronic Chip Will Self Destruct in…
                A new chip built on strained glass can shatter within 10 seconds when remotely triggered. Such technology could prove tremendously useful for the U.S....            
            
        Watch: The Security Guard of the Future
                Meet the robot which could well be the security guard of the future: A patrol robot with infrared vision, laser radar navigation, 360 degree...            
            
        U.S. responds to cyber threats.
                U.S. Army War College in Carlisle, Pa. has grouped together the best minds on cyber in order to brainstorm and create a new defense...            
            
        
 
            
