You Should Worry About Privacy – Here’s Why
t is now possible to automate the analysis of filmed content thanks to various technologies, including machine learning tools, even when there are large...
New AI System Enables Multiple Robots to Recognize YOU
A new AI system will enable multiple robots to recognize people. A Japanese company has developed an AI system that makes it possible for...
Top 5 Possible Trends in OT Security Market (emphasis on ICS)...
By: Or Shalom, HLS expert
OT networks are continuing to pose a security risk for cyber security personnel. In addition to routine attacks, ransomware attacks...
Robots Will Replace These Workers By 2025
How soon will we be seeing robots walking about the street? How soon will robots join medical staff in hospitals and aid real people...
UK Government Offers Free Cyber Security Service
The United Kingdom's National Cyber Security Centre (NCSC) has announced a new email security check service to help organizations identify vulnerabilities that could allow...
Privacy Settings – NOT As Private As You Think
After years of Apple claiming the iPhone to be the most secure smartphone device on the market, a new privacy lawsuit might show otherwise....
What Happened to BlackBerry?
If we look back a decade ago, to the early 2010s, we would be able to see many adults and youths alike using the...
What About Automotive Cyber Security?
The autonomous, connected, electric and shared (ACES) trends bring new requirements that modern automotive operating systems need to be capable of handling. The growing...
How Body Camera Footage Is Processed By Natural Language Technology
The technology used for salespeople documentation and evaluation is now helping police departments. The vast majority of police body camera footage never gets reviewed,...
Vulnerabilities Exposed in Popular Home Devices
As Internet of Things (IoT) devices such as connected locks, motion sensors, security cameras and smart speakers become increasingly ubiquitous in households, their surging...
Giant Corporation To Invest In Quantum Technology
Random numbers are the basis of cryptography keys. These keys can in turn be used to encrypt critical data, by encoding information into an...
Secure Your Platforms NOW
Industry 4.0 brings into the industrial manufacturing process growing automation and data exchange. But industry 4.0 also introduces more risk for operational technology (OT)...
How Accurate Is Facial Recognition?
The Federal Bureau of Investigation (FBI) has run over 390,000 facial recognition searches since 2011. The Department of Homeland Security has also said it...
This Will Revolutionize Robotics
A new smart glass development will contribute to various commercial and security applications, ranging from imaging to advanced robotics. Photodetectors, also known as photosensors,...
Imagine – Human Eye With Artificial Intelligence
A new type of technology has recently been developed. AI technology that mimics the human eye. Researchers at the University of Central Florida have...
China’s Super Soldier – By 2025
China has developed the world's largest electric-powered quadruped bionic robot, which is expected to join logistics delivery and reconnaissance missions in complex environments that...
The Fight Against Terrorism Continues
The fight against terrorism continues, and this time india is leading the charge.
A master database of 21 databases will provide real-time information against terror...
This Micro Controller Can Protect The Most SENSITIVE Devices
Cn a new micro controller really overcome product development security threats? Some think this one will! Microchip Technology released the PIC32CM LS60, a micro...
Have You Heard of The ‘Atomic Clock’?
Synchronizing time in modern warfare – down to billionths and trillionths of a second – is critical for mission success. High-tech missiles, sensors, aircraft,...
What Is THOR?
The Tactical Humanitarian Operations Response vehicle (THOR) was built to operate under any network in any environment, from dense forests during wildfires to remote...
Unmanned Vessels – Influencing Wars By 2030
The US Navy Chief of Operations is interested in deploying unmanned or minimally manned vessels with strike groups as soon as the next five...
No Longer Fictional – Robot Swarms
Robot swarms provide robots with capabilities that are not possible in individual robot activity, such as splitting work among themselves, responding to different risks,...












































