Facebook has released its biannual report on government data requests, indicating that total law enforcement requests are at their highest level ever at 41,214...
Gad Elkin, EMEA Security Information Director, F5
DDoS and ransomware are two well-established methods for cyber attacks, but a newly appeared tactic combines elements of...
In an interview for I-HLS after AUS&R 2015, Ophir Gamliel, CEO of ITL spoke about the company’s certification process, helping companies distribute their products...
Several high-profile, suspected government-backed cyber attacks on the US might have caused a bit of a shift in the American combat strategy. After countless...
In light of recent events in Paris and the growing of terror threats, occurring simultaneously with the waves of migration coming from conflict centers...
French President Francois Hollande closed the country’s borders late Friday night in response to deadly terror attacks that gripped Paris. "We have to assure...
Arie Egozi
The intelligence departments of Europe’s security services are suffering failure after failure when it comes to receiving alerts on preparations for large attacks.
Europe...
We’ve all heard about China’s internet censorship programme, nicknamed “The Great Firewall of China”, a sophisticated system that monitors all access to the wider...
A standardisation of common protocols and interconnections is required if the US Department of Defense (DoD) is to take advantage of the Internet of...
Scientists have discovered a way to authenticate or identify any object by generating an unbreakable ID based on atoms. The technology, which is being...
Microwave absorbers are a kind of material that can effectively absorb incident microwave energy to make objects invisible to radar; therefore they are commonly...
ARIE EGOZI
This is a revolution: The importance shifts from the platforms to the systems they carry.
Rafael the Israeli company, that developed some of the...
In a cost-saving move, Pentagon contractors subcontracted their work to the Russians, a four-year probe concludes.
The probe was started in 2011 after John C...
by Konstantin Bodragin
Satellite surveillance is commonly thought of as belonging to the realm of spies, spooks, and secretive military intelligence types. Command, Control, Communications,...