Software

Software

Last month, some of the world’s foremost experts on cybersecurity gathered in Lille, France for the International Forum on Cybersecurity, as well as politicians,...

More widespread use of encryption in software will not make the internet “go dark,” nor will it hamper law enforcement investigations into crime and...

ISIS likes to tout itself as extremely technologically proficient. The organisation releases apps, instructions on online behaviour, and has recently released a video showing...

ISIS is known for its strong affinity to modern technological solutions, using encrypted apps like Telegram to communicate in secret from prying eyes, and...

Two German researchers recently ran an analysis of North Korea’s homegrown operating system, Red Star OS. Turns out, Red Star mirrors quite closely the...

Avi Yariv Different cities around the world face different security challenges. Those challenges are a outcome of many parameters: economy, poverty, the Culture, the attitude...

Researchers at the Computer Science and Artificial Intelligence Laboratory (CSAIL) at the Massachusetts Institute of Technology (MIT) have developed a new online text messaging...

Researchers from the Centre for Security Communication and Network Research (CSCAN) at Plymouth University have developed a new system for secure, multi-level authentication that...

ISIS is known for its advanced application of propaganda techniques, far more so than their predecessors. Ghost Security Group, an online hacktivist collective whose...

In today’s world of terror threats and subversive elements operating within countries’ borders, intelligence has never been more crucial. With no opposing country to...

  In April this year Tesla announced another one of its revolutionary technologies - the Powerwall. The announcement immediately garnered much attention and in the...

Medical devices may not be ever-present in headlines, but that does not mean no new developments in the field happen. Rather, in recent years...

If you live in the state of New York, reporting crimes and suspicious activity has just gotten a whole lot simpler. The New York...
video

Researchers at Tufts University Human-Robot Interaction Lab are working on an issue that has been troubling science fiction fans for decades: when can (and...

We have written before about China building its own secure smartphone ecosystem - including a homegrown operating system and even processing chips - all...

Apps have become ubiquitous. They provide us with tools for nearly every task imaginable. From shopping lists to fully fledged remotes to control drones....

Wireless technology has revolutionised our lives. The now ubiquitous WiFi connects us instantaneously to the wider internet, but soon it will be able to...
video

Virtual and augmented reality have advanced leaps and bounds in recent years. In the 80s we imagined virtual reality (VR) as us donning huge,...

Toyota is set to invest $1 billion to create a new research institute focusing on AI and robotics in the United States. Slated to...

Encrypted communications specialist Silent Circle said that in the wake of the Paris terrorist attacks,  it was tightening access to its mobile apps and secure smartphone...

Paz Shabtai Following the Paris attacks, apparently planned under the noses of French and Belgian authorities, one possibility is that Islamic State militants have found...

The UEFA European Football Championship is one of the world’s most prestigious football tournaments, second only to the World Cup. The competition is held...