Home Blog Page 227
hardware vulnerabilities

Hackers Called to Look for Hardware Vulnerabilities

0
About 70 percent of all cyberattacks are due to hardware vulnerabilities. The US Defense Advanced Research Projects Agency (DARPA) has developed a new generation...

IAI Signed Special Mission Aircraft Contract 

0
Israel Aerospace Industries has received a 350$ Million Special Mission Aircraft related contract from a major European country. The Contract will be executed by...
coronavirus

Interested in Fighting COVID-19 Pandemic Effectively and in Real-Time? 

0
The coronavirus pandemic is a global emergency scenario that requires readiness as part of the national preparedness strategy for emergency and crisis situations.  The suitable...
unmanned systems demonstration

Demonstrations of Unmanned Systems – Soon at Leading AUS&R 2020 and...

0
Demonstrations of innovative platforms, drone swarms on security missions, a robot-drones collaboration in an agricultural mission, drones in delivery missions, indoor drones, etc. Thanks to...
cybersecurity

New Cyber Regiment Established by UK Military

0
More and more Military Forces have been establishing dedicated cyber organizations. Cyber attacks are as deadly as those faced on the physical battlefield, British...
MQ-9

In Search for Next-Generation Replacement for Old UAV

0
The US Air Force is searching for its next medium-altitude UAV for intelligence, surveillance and reconnaissance (ISR), as well as air-to-ground strike missions. The...
coronavirus

AI-Based Corona Status Model Developed by IAI

0
Israel’s defense industries continue to mobilize their technological resources for the benefit of the fight against the COVID-19 pandemic. Israel Aerospace Industries (IAI) has...

Manned-Unmanned Duel

0
The U.S. military is planning to put its combat drones to the test: a battle with human fighter pilots. The challenge set for July...
5g

Augmented Reality to Play Role in 5G Infrastructure 

0
5G cellular network technology signifies the connectivity of everything and everyone everywhere - through wireless communications. The US DoD had been focusing efforts on...
autonomous drone

iHLS Accelerator Startup: Breakthrough in GPS-Denied Autonomous Flight

0
The world of autonomous flight opens up numerous possibilities and applications, as drones will be able to fly autonomously from one place to another...
invisible drone

Invisible Drone to Monitor Suspects

0
A drone that can disappear into thin air thanks to cutting-edge technology has been developed and is already operational, sporting its dispersion shields that...

Unexpected Tool Helped Organize US Protests

0
Communities are using Google Docs software to organize politically and socially and list resources for protestors. While protests over George Floyd’s murder are still...
simulation

New Method to Coping with Shifting Enemy Tactics

0
U.S. military is looking to develop artificial intelligence (AI) algorithms to simulate challenging enemy behavior during war games that reacts in ways not easily...

Collaboration in Counter-Drone Technology

0
Drones already fulfill many roles in various fields, but they are also one of the many IoT endpoints that add to the growing chaos...
US riots

Growing Use of This Technology During US Riots

0
Facial recognition is becoming a key investigative tool for police departments across the United States as protestors fill the streets following the killing of...

Ocean Search and Rescue Algorithm Developed

0
When an object or person goes missing at sea, the complex, constantly changing conditions of the ocean can confound and delay critical search-and-rescue operations....
drone delivery

Drone to Deliver Corona Tests

0
Drones offer the opportunity to quickly and easily take corona tests, drugs or personal protective equipment to places that are difficult to reach by...

Was Sensitive Nuclear Data Exposed to Cyber Attack?

0
A cyber attack on nuclear data is one of the highest concerns of states. Cyber threats to nuclear materials, facilities, command, control and communications...

Chemicals Database Now Available to Law Enforcement

0
An illicit chemistry database is now available to law enforcement personnel in the US even if they are on a crime scene. The Chemical...

Squad-X Program Moving Forward

0
Modern military engagements increasingly take place in complex and uncertain battlefield conditions where attacks can come from multiple directions at once, and in the...

Unprecedented Development in 5G Frequencies

0
Extending battery life has been a challenge preoccupying all sectors. Researchers have now built a new component that will more efficiently allow access to...

Towards Flights Renewal – More Security is Needed

0
As the incident at Gatwick Airport in December 2018 and other airports demonstrate, the capability to locate both the drone and its controller would...

Latest

New Wearable Links Human Gestures to Machines

0
A new wearable system developed by engineers at the University of California San Diego is redefining how humans can interact with machines. The device...