Technology

Technology

Dubai has sealed a deal with Martin Jetpack in order to have its firefighters armed with technology that could allow them to fly up...

Facebook has released its biannual report on government data requests, indicating that total law enforcement requests are at their highest level ever at 41,214...

Gad Elkin, EMEA Security Information Director, F5 DDoS and ransomware are two well-established methods for cyber attacks, but a newly appeared tactic combines elements of...
video

In a world first, the US Air Force’s EQ-4 Global Hawk drone has completed its 500th flight. After nearly 13,000 flight hours, the Global Hawk...
video

In an interview for I-HLS after AUS&R 2015, Ophir Gamliel, CEO of ITL spoke about the company’s certification process, helping companies distribute their products...

Paz Shabtai While around 250 Jihadists have returned to France from Syria, England is reported to expect almost double that. As of now, MI5 and...

The Carrington event was a powerful geomagnetic solar storm that hit the Earth 156 years ago. Unlike now, back then electricity did not rule...

Several high-profile, suspected government-backed cyber attacks on the US might have caused a bit of a shift in the American combat strategy. After countless...

In light of recent events in Paris and the growing of terror threats, occurring simultaneously with the waves of migration coming from conflict centers...

Arie Egozi Is France closing the stable after the horses escaped? Basically yes, but that stable was so rickety that closing its gate wouldn’t have...

Due to recent events - terror attacks in Europe, Africa and the Middle East and terror threats and alerts in most parts of the...
video

French President Francois Hollande closed the country’s borders late Friday night in response to deadly terror attacks that gripped Paris. "We have to assure...

Arie Egozi The intelligence departments of Europe’s security services are suffering failure after failure when it comes to receiving alerts on preparations for large attacks. Europe...

The problem with nuclear radiation is that by the time you can detect it, it’s usually too late. By the time seismographs, infrasound sensors,...

We’ve all heard about China’s internet censorship programme, nicknamed “The Great Firewall of China”, a sophisticated system that monitors all access to the wider...

A standardisation of common protocols and interconnections is required if the US Department of Defense (DoD) is to take advantage of the Internet of...

Scientists have discovered a way to authenticate or identify any object by generating an unbreakable ID based on atoms. The technology, which is being...

Microwave absorbers are a kind of material that can effectively absorb incident microwave energy to make objects invisible to radar; therefore they are commonly...

As part of an ongoing effort of protecting soldiers from radiation caused by equipment and tools used by the military, the Israeli Medical Corps...

ARIE EGOZI This is a revolution: The importance shifts from the platforms to the systems they carry. Rafael the Israeli company, that developed some of the...

In a cost-saving move, Pentagon contractors subcontracted their work to the Russians, a four-year probe concludes. The probe was started in 2011 after John C...

by Konstantin Bodragin Satellite surveillance is commonly thought of as belonging to the realm of spies, spooks, and secretive military intelligence types. Command, Control, Communications,...