The US Department of Homeland Security (DHS) is embracing cloud technology, agile methodology and open-source development in an effort to better carry out its...
Cybersecurity negotiations were a key part of U.S. National Security Adviser Susan Rice's recent trip to Beijing in an effort to strengthen U.S.-China relations...
UAVs can replace quality inspectors looking for defects on the external part of an aircraft.
The European aircraft manufacturer Airbus has demonstrated aircraft visual inspection...
Bastille cybersecurity company unveiled a massive vulnerability affecting the vast majority of low-cost wireless keyboards.
Using a new attack that Bastille has named “KeySniffer,”...
New sentiment analysis algorithms are able to monitor the social network Twitter in search of violent groups. The system analyses both the messages they...
Are manufacturers of internet-connected devices putting functionality over security?
The Internet of Things opens up a world of possibilities, but using interconnected devices such as...
During the operation in Syria, the Russian Aerospace Defence Forces (VKO) has tested hydrogen-powered unmanned aircraft (UAV), the RIA Novosti news agency reported. According...
Physics student Darius Merk has used an insect-inspired algorithm to develop a drone that can navigate around obstacles. His research could prove particularly useful...
Biometric scanning technologies are becoming more and more widespread in airports, stadiums etc., turning check-in procedures more efficient and quick.
Iris and fingerprints scans will...
Mobile device security evolved rapidly over the last few years to address the new challenges and requirements of a mobile workforce.
User authentication has...
Today's complex Intelligence, Surveillance and Reconnaissance (ISR) environment requires complete end-to-end solutions tailored to fit various mission requirements
SPYDR II is a next-generation small manned...
The Egyptian government has recently launched a new cybersecurity division in order to defend its institutions from cyber attacks. When one understands the scope...
Observation systems are a vital tool in every battlefield. They span from personal systems to portable systems by soldiers or vehicles. The systems enable...
A first of its kind memorandum of understanding (MOU) was signed between iHLS and Global Tech Korea, a Korean governmental program.
GT (GlobalTech) is the international program...
Seaports customs and security professionals might sometimes miss contraband attempts, including radiological materials. The problem was hightened during a US congressional hearing, when officials...
Hacking has become one of the auto industry's biggest concerns, especially as modern cars add more electronic controls and infotainment systems. Last March, the...