Technology News

Technology News

The US Department of Homeland Security (DHS) is embracing cloud technology, agile methodology and open-source development in an effort to better carry out its...

The web has many advantages for everyone, in every age, around the globe. But as always there are darker sides that can cause severe...

Cybersecurity negotiations were a key part of U.S. National Security Adviser Susan Rice's recent trip to Beijing in an effort to strengthen U.S.-China relations...

Delft Aerial Robotics (DAR) announced in May that the company plans to execute an autonomous drone network in the Netherlands within the next year....

UAVs can replace quality inspectors looking for defects on the external part of an aircraft. The European aircraft manufacturer Airbus has demonstrated aircraft visual inspection...

Bastille cybersecurity company unveiled a massive vulnerability affecting the vast majority of low-cost wireless keyboards. Using a new attack that Bastille has named “KeySniffer,”...

Russia is now one of the world leaders in the development and application of EW (Electronic Warfare), even though 20 years ago it was...

New sentiment analysis algorithms are able to monitor the social network Twitter in search of violent groups. The system analyses both the messages they...

Are manufacturers of internet-connected devices putting functionality over security? The Internet of Things opens up a world of possibilities, but using interconnected devices such as...

During the operation in Syria, the Russian Aerospace Defence Forces (VKO) has tested hydrogen-powered unmanned aircraft (UAV), the RIA Novosti news agency reported. According...

There are still 4 billion people without Internet access in the world. As many as 1.6 billion of those unconnected people live in remote...

Swarm technology enables unmanned ground or aerial vehicles to move together in swarms of dozens of vehicles at the same time and in coordination....

Physics student Darius Merk has used an insect-inspired algorithm to develop a drone that can navigate around obstacles. His research could prove particularly useful...

Biometric scanning technologies are becoming more and more widespread in airports, stadiums etc., turning check-in procedures more efficient and quick. Iris and fingerprints scans will...

After numerous changes, the final RfP for the Stingray unmanned aerial vehicle (UAS) has been set for 2018. The US Navy hopes to have...

Mobile device security evolved rapidly over the last few years to address the new challenges and requirements of a mobile workforce. User authentication has...

  Today's complex Intelligence, Surveillance and Reconnaissance (ISR) environment requires complete end-to-end solutions tailored to fit various mission requirements SPYDR II is a next-generation small manned...

The Egyptian government has recently launched a new cybersecurity division in order to defend its institutions from cyber attacks. When one understands the scope...

Observation systems are a vital tool in every battlefield. They span from personal systems to portable systems by soldiers or vehicles. The systems enable...

A first of its kind memorandum of understanding (MOU) was signed between iHLS and Global Tech Korea, a Korean governmental program. GT (GlobalTech) is the international program...

Seaports customs and security professionals might sometimes miss contraband attempts, including radiological materials. The problem was hightened during a US congressional hearing, when officials...

Hacking has become one of the auto industry's biggest concerns, especially as modern cars add more electronic controls and infotainment systems. Last March, the...

Latest