For years digital security experts have worried over possible backdoors implemented into equipment manufactured at Chinese factories. Over the years there have been several...
Trend Micro, a global leader in security information solutions, presents its annual security information forecast report. The expected trends include a rise in online...
The Obama administration and lawmakers are looking to South Korea to help thwart Pyongyang’s attempts to upgrade and strengthen its cyber capabilities. The country’s...
The last few weeks saw a number of financial companies become a target for cyber attacks and attempted blackmail using threats. The companies attacked...
At the beginning of October Siemens introduced RailFusion - a software designed to make our trains infrastructures safer and more efficient.
This new software, already at...
The European Court of Justice (ECJ) in Luxembourg has ruled that U.S. digital data storage systems fail to provide sufficient privacy from state surveillance.
According...
Food safety is a growing concern, and the World Health Organization claims that nearly three-quarters of new infectious diseases are communicable between animals and...
The Internet of Things (IoT) is network of uniquely identifiable endpoints (or "things" that communicate without human interaction using IP (Internet Protocol) connectivity. The...
A new chip built on strained glass can shatter within 10 seconds when remotely triggered. Such technology could prove tremendously useful for the U.S....
James Clapper, director of U.S. intelligence, and other senior intelligence officers, have warned Congress that the next phase of escalating online data theft will...
Have you ever stopped to think why defense companies have a classified network to prevent cyber attack, whereas companies handling our critical systems -...
Israel Aerospace Industries (IAI) was recently awarded a contract by the Israel National Cyber Bureau in the Prime Minister's Office, to establish an innovative...
The field of unmanned aviation is becoming even more central around the world. Many countries are using Unmanned aerial vehicles for operational needs, both...
Researchers from the Ben-Gurion University of the Negev (BGU) Cyber Security Research Center have discovered that virtually any cellphone infected with a malicious code can use GSM phone frequencies...