Autonomy and Interconnectivity Are Subject To Cyber Threats
Although emerging automation technologies are predicted to bring a range of benefits, their development also raises a wide range of concerns around safety and...
Cyber Threats Call For Offensive Cyber Security
We need to shift from ‘Defense-in-Depth’ strategies to incorporate ‘Resilience-in-Depth’ strategies, which offers a new cyber defense strategy that places multiple layers of security...
Humans And AI – More Intertwined Than You Think
A closer look reveals that artificial intelligence is almost everywhere. It is likely that artificial intelligence will be present in our lives even more...
Network Traffic Analysis – How?
By using machine learning and rule-based algorithms, network traffic analysis is the process of analyzing network traffic. It enables the network to be monitored...
AI And Security – Higher Level Of Safety
As new technologies and capabilities have emerged in recent years, artificial intelligence and security have become intertwined, leading to a high level of safety.
Artificial...
AI Automation – By 2025
Despite technological developments and progress toward digitization, IT technology developers continue to work hard on developing software that will simplify manual tasks. In order...
I Can Walk Again! – New Technology Opens Previously Shut Doors
Cerebral palsy, strokes, traumatic brain and spine injuries, all of these are examples of conditions that may affect mobility and the way in which...
Infamous Ransomware Group Apologizes for Attack Against Children’s Hospital
One of the most infamous ransomware groups has recently issued a formal apology after it carried out an attack against Toronto’s Hospital for Sick...
Have We Lost The Battle For Our Privacy?
It’s time to blow the whistle on a well-known secret shared among the cyber security researchers’ community: The digital world security has reached The...
Can Smartphones Recognize You By Your Ear?
The ubiquity of smartphones combined with the developing trend toward smart living will make biometrics an important element to incorporate into homes of the...
Machine Learning Systems And Their Security Vulnerabilities
While training a neural network, we usually use backpropagation to compute the derivative of the cost function with respect to the network’s weights. In...
Look Out For New Collaboration in IoT Technology
The global Internet of Things (IoT) market was valued at $190 billion in 2018 and is projected to reach $1.102.6 billion by 2026, at...
Ransomware Attacks Are Back on The Rise – Why?
Researchers from NCC Group counted 198 successful ransomware campaigns in July – up 47 percent from June. Sharp as that incline may be, it...
INNOTECH Event 2023 VIP Registration
March 29-30 , 2023 - Expo Tel Aviv, Pavilion 2 - 101 Rokach Blvd., Tel Aviv
INNOTECH Event 2023 VIP Registration - Conference and exhibition...
Military IoT Devices Might Be Too Valnurable
Due partly to the low cost of internet of things equipment, the US military has been able to adopt “unprecedented numbers” of IoT-enabled devices....
Deepfake Detectors Have This Vulnarability
In a research paper, Electrical and Computer Engineering masters students Apurva Gandhi and Shomik Jain from USC Viterbi School of Engineering, Los Angeles, showed...
What Is IoV?
The Internet of Vehicle (IoV) field allows vehicles to communicate with drivers, other vehicles, management systems, pedestrians, other smart devices, and infrastructure, all in...
The IoT Revolution And Supply Chains
The IoT revolution has been transforming the logistics and supply chain industries. From fleet management through in-vehicle sensors to remote temperature monitoring, and automated...
New Tool To Secure IoT Devices Developed By Tech Giants
Allowing devices to connect to the internet opens them up to a number of serious vulnerabilities if they are not properly protected. Internet of...
Innovative New Platform For Military Simulation
As the military continues utilizing simulation technology as a way to train its recruits, legacy technologies might be holding back huge opportunities for collaboration...









































