Hacker de-anonymizes taxi data

0
How did a software engineer de-anonymized data on 173 Million NYC taxi trips? When New York City released a treasure trove of data about fare...
cybersecurity

C-Level Responsibility for Cybersecurity in Organizations

0
By Ilan Segelman, Power Communication The multiple cyber attacks have led to an increasing awareness of the senior executives in organizations to the cyber attacks’...

iHLS TV – UAS, Amazon & the CIA , stolen Uranium...

0
AERMATICA announced the ANTEOS Unmanned Air System. Amazon Web Services finished its secure cloud-computing system for all seventeen intelligence agencies of the CIA Iraqi terrorists have...

iHLS TV – Special Video Report : Airport perimeter security

0
It is amazing to learn that perimeter security of U.S airport is so not efficient. Several hundred times over the last decade, intruders have hopped...
image provided by pixabay

Germany Signs Deal with Israel for Arrow 3 Defense System

0
Arrow 3 is the top layer of Israel's air defense net, and it recently made its first operational interception. Israel’s Ministry of Defense has...

From IBM to the defense department

0
The Defense Department is bringing in IBM executive Daniel Prieto III to serve as its new director of cybersecurity and technology, the department announced...

Stuxnet Virus Detected in Russian Nuclear Facility

0
Eugene Kaspersky of Kaspersky Antivirus has revealed that a staffer at a Russian nuclear plant informed him that the infection that was introduced to...
autonomous and remote-controlled ships

Rolls Royce’s Next Step – Autonomous Ships

0
ESA (The European Space Agency) signed a Memorandum of Intent with Rolls-Royce to investigate how space technology can be used to develop autonomous and...
image provided by pixabay

Flood of Lawsuits in Germany Possibly Driven by AI

0
The Regional Court of Frankfurt was faced with an increasing number of cases and suspects that law firms are using AI to attract large...
counter-terror

Camera-Mounted Dogs to Enhance Counter-Terror Efforts

0
Sensor technology mounted on security dogs has been enhancing India’s fight against terrorism. India’s Elite counter-terror force National Security Guard (NSG) has procured head-mounted...

Research Incorporates AI into Neural Interfaces

0
What seems to belong to the far future of military technology is already in the process of significant research. The Defense Advanced Research Projects...
pipelines

Drone Completes One of Longest Inspection Flights in Its Class

0
More than $38 billion is spent annually monitoring oil and gas pipelines using less efficient means, which often identify problems only long after they’ve...
Photo illust. US DVID Wikimedia

Manned-Unmanned Teaming has Unique Advantage 

0
Unmanned ground and aerial vehicles can provide many advantageous abilities to soldiers on the battlefield. The US Defense Advanced Research Projects Agency (DARPA) has...

F-35 Pilots Worldwide Will Use Israeli-Developed Helmets

0
Israeli-developed technologies have proved their superiority once again. The F-35 Joint Program Office (JPO) decided to halt development of the alternate F-35 helmet and...

ICT Cyber-Desk Review: Report #9

0
This report covers the period of April - June 2014, the report covers two main subjects: cyber-terrorism (offensive, defensive, and the media, and the main topics...

What Is The Defense Export Controls Agency And Who Needs It?

0
Recently we’ve been asked continuously by startup companies - What is the DECA (Defense Export Controls Agency)? Who needs to go there? When should...

Large Exercise Brings Together Tech-Giants

0
The US Navy conducts a comprehensive exercise. Fleet operators from Submarine Development Squadron Five and the Explosive Disposal Mobile Unit, participated in a multi-site...
Image provided by pixabay

Large Language Models Are Dangerously Easy to Manipulate into Giving Harmful...

0
Most large language models can be easily tricked into revealing dangerous or unethical information, according to a paper by researchers from AWS AI Labs,...

Lockdown Mode – Solution for Government and Global Spyware

0
A new extreme solution for Apple users to protect their data – lockdown mode. This new security feature will be available to safeguard high-risk...
image provided by pixabay

Reptilian Robots for Disaster Response Efforts

0
A pair of reptilian robots originally built for a documentary on the BBC in 2016 are to be used for disaster efforts and possibly...

New Excellence Center to Advance Research on CyberSecurity

0
The University of Connecticut’s (UConn) School of Engineering and Synchrony Financial, a consumer financial services company headquartered in the state, have announced earlier this...

The IBM Spark

0
 IBM has announced that from now on it will put its energies in the open source code project, Apache Spark, and defines is at...

Latest

Fighter Jet Without a Runway? X-BAT Makes It Real

0
A new unmanned vertical take-off and landing (VTOL) fighter platform has been revealed, designed to operate from ships, islands, and austere locations while carrying...