Home Blog Page 176
FirstNet

COVID-19 Tracing Apps – New Evaluation Tool

0
As the COVID-19 pandemic started, private industries and tech sectors around the world developed smartphone-based solutions to automate the manual contact tracing process. While...

Increased Survivability to US Soldiers Thanks to New System

0
The US Military’s Family of Medium Tactical Vehicles will be equipped with a new Underbody Armor Kit, also known as Underbody Protection Kit which...
Photo illust. Wikimedia

New Platform for Digital Evidence Management

0
With digital devices becoming ubiquitous, digital evidence is increasingly important to the investigation and prosecution of many types of crimes. These devices often contain...

Taking Guesswork Out of Cybersecurity

0
While cybersecurity budgets of companies and organizations increase, security resilience decreases. An Israeli cybersecurity startup helps companies shore up their security posture, and strives ...

Nuclear Site Surveilled by Drone Tech

0
An autonomous surveillance UAV solution has been protecting a sensitive nuclear site. The Skeyetech drone, developed by French company Azur Drones, has been surveying...

IAI Unveils Next-Gen Aerial Surveillance System

0
Israel Aerospace Industries (IAI) unveils WASP, a new generation surveillance system that provides a high-resolution situational awareness picture of moving targets day and night...
3d printing

Full Drone Manufacturing by 3D Printer

0
In the future, people shouldn’t be expected to have an engineering degree to build robots, any more than they should have a computer science...
IoT

More Security to Connected Medical Devices   

0
Connected medical devices remotely monitoring patient data are exposed to various threats, including data breaches if the information is not properly encrypted, viruses and...
smart city

SmartSafe City: Market Growth Expected 

0
Until not long ago, smart security technologies were not necessarily connected with the other municipal aspects, such as smart traffic management, waste management, etc....
photo illust quantum Pixabay

Data Encryption Security – Is It Possible in Quantum Era?

0
With an information society that transfers an increasingly large amount of personal data over public channels, information security has become a global challenge. Security...

Next-Gen Squad Weapon has Revolutionary Ammunition 

0
The final delivery of the Sig Sauer’s prototypes of Next Generation Squad Weapons systems, or NGSW, has been delivered to the U. S. Army....

Watch: Instant Delivery of COVID-19 Tests 

0
The first FDA-authorized at-home COVID-19 test was successfully delivered by drone. Within the framework of a partnership between Flirtey, a drone delivery company, and Vault...
cybersecurity

Honeypot – Cybersecurity Tool for Military Networks

0
Honeypots are not a new technique in cybersecurity. A honeypot is a computer system that’s intended to attract cyberattacks, like a decoy. It mimics...
resupply

NASA Funding Autonomous Supply Chain

0
The COVID-19 vaccine rollout has underscored the importance of increasing efficiencies in the global supply chain infrastructure. In fact, the pandemic has changed the...

Digital Sharing – IDF Establishes New Software and Information Array 

0
In recent years, the digital and multi-dimensional aspects have become an essential component of IDF’s military concept, and numerous operations involve aerial vehicles, maritime...
biometric identification

Face ID with Masks at Airport Checkpoints – Unexpected Results

0
Due to the COVID-19 pandemic, people all over the world are required to wear face masks in every public venue. Beginning this month, the...
Photo illustration US Navy

New Focus on Military-Civilian Collaboration 

0
Over the last two decades, the nature of security threats has shifted from the emergence of networked insurgency to the growth of cyber threats,...

Indian Army Getting New Rifle Assault

0
The Indian Army has been diversifying its small arms inventory, as part of an attempt to phase out its aging assault rifles and light...
drone swarm

Drone Project – More Technological Flexibility is Needed

0
The US Air Force is planning new demonstrations of its swarming drone technology following recent setbacks. The Golden Horde weapons system will undergo a...

Amphibious Vessel Reflects Unique Advantage

0
A unique amphibious craft uses caterpillar tracks to move into and out of water allowing the versatile boat to be used for a wide...
photo illus. cyber attack by Pixabay

New Solution to Confront Most Dangerous Cyber Threat

0
Zero-day cyber attacks are among the most dangerous threats to computer systems and can cause serious and lasting damage. As an example, the WannaCry...
delivery drone

Next Stage in Israel’s Drone Delivery Revolution

0
The Israel Innovation Authority envisions autonomous drone flights throughout Israel’s airspace, delivering medical supplies and tests, post, food, etc. to customers’ houses. The framework...

Latest

Image by Unsplash

Iranian Hackers from the 2024 Elections Resume Cyber Attacks

0
A new wave of cyber activity from Iran-linked hackers has emerged, with the group responsible for the 2024 U.S. election email leaks reportedly gearing...