American power plants and utility companies face a growing cyber vulnerability. No U.S. power plant has so far suffered a significant cyberattack, but experts...
In light of the recent developments in the Middle East Israel stepped up its intelligence-gathering efforts, mostly by electronic means, in order to detect...
The leaked information about the operations of the N.S.A. in the U.S. have foiled a huge Cyber defense plan.
Even while rapidly expanding its electronic...
The Department of Homeland Security just awarded contracts to 17 vendors for tools and services to continuously monitor federal systems and networks for cyber...
Real science is quickly catching up to science fiction, especially when it comes to the latest amazing advances in miniaturization.
Some time ago a new...
Insitu is planning to launch the first U.S. commercial unmanned aircraft system operation following receipt of FAA type certification for its ScanEagle UAS on...
The European Union is pondering an EU Commission proposal to acquire a fleet of surveillance drones, satellites, and planes as part of an “ambitious...
Often seen as inflexible, slow and failing to deliver on the promise of Security Information and Event Management (SIEM), the traditional SIEMs of yesterday...
China has recently been accused of intense spying activity in cyberspace, following claims that the country uses cyber tactics to gain access to military...
By Amir Averbuch and Gabi Siboni
INSS – CYBER Warfare Program
The classic defense methods employed throughout the world in recent decades are proving unsuccessful in halting modern...
The Land Division will focus on land systems development, including weapon systems, armored combat vehicle defenses, shoulder-launched systems and naval combat systems. The division...
Automatic license plate readers are the most widespread location tracking technology available to law enforcement. Mounted on patrol cars or stationary objects like bridges,...
A source at Russia's Federal Guard Service (FSO), which is in charge of safeguarding Kremlin communications and protecting President Vladimir Putin, claimed that the return...
Researchers at Carnegie Mellon University have developed a method for tracking the locations of multiple individuals in complex, indoor settings using a network of...
Raytheon Company was awarded a contract with the U.S. Naval Air Systems Command (NAVAIR) to build an integrated multi-intelligence (Multi-INT) system to safeguard forward...
North Carolina State University researchers are using video game technology to remotely control cockroaches on autopilot, with a computer steering the cockroach through a...
RSA introduced the next generation of its Silver Tail web threat detection solution, with the ability to quickly separate the activities of friend from...
Israeli sources confirmed that Israeli weapons system may be added to the package for the MC-27J aircraft equipped with a 30 mm gun.
The planned gunship...
"Senso Optics", an Israeli company in the market of design, development and production of innovative thermal imaging technologies and advanced electro-optical solutions for military,...
IBM is merging two worlds into one. Big Data world and Cyber Security into “Security Intelligence”. IBMs "Security Intelligence" takes on the collection of data...