Home Blog Page 526

Who Has Been Cyber Attacking India For Years?

0
Cyber Security firm FireEye has published a report revealing that India has been the victim of an advanced capaign of cyber attacks over the...

The People’s Drone: Ukraine Citizens Raise Production Money On Facebook

0
The civil war in Ukraine start at the start of 2014 following the rise of pro-western and nationalist Ukrainian circles to power, who impeached...

ISIS’ Chemical Weapons

0
By Rachel Ehrenfeld* It is surprising that the Islamic State’s use of chemical warfare has taken this long. On August 11, ISIS shelled the northern...

Autonomous Snake-Robot Could Decrease Terror Threat

0
The Gaza strip tunnels are tuneels being dug by the Hamas and other terror organizations inside the strip as part of their fight against...

Will The IDF Acquire The New JLTV ?

0
Oshkosh has won a $6.7 billion contract to manufacture the Joint Light Tactical Vehicle (JLTV) to replace US Army’s Humvee fleet. The contract awarded by...

Increase In Use Of Dark Web For Data Unlock Ransom Demands

0
IBM’s security division has published its security threats reports for the third quarter of 2015 which it pointing out to an increasing danger of...

It’s Time To Make An Anti-Civilian-UAV System

0
We’ve heard about anti-tanks and anti-planes missile systems, but now, due to increasing security dangers caused by UAVs flying in restricted areas, the United...

Next Generation of Cyber Security: Behavior Based Security System

0
Security leaks have reached an all-time high these days, and are causing great concern among financial advisors, business owners and consumers. Nowadays there are...

IAI to Supply Its Cyber Training Center to DNP in Japan

0
Israel Aerospace Industries (IAI) has signed a contract to supply Dai Nippon Printing (DNP) of Tokyo, Japan, its TAME™ Range, the Cyber Range training...

What Can We Expect From The Unmanned Vehicles Event?

0
Why  is this event different from similar events? The main difference is the air, sea and land show. Israel is celebrating this year, as you...

Astra And Rafael Form Joint Venture Company

0
Hyderabad-based Astra Microwave Products said it will form a joint venture company with Israel's Rafael Advanced Defence Systems for production and supply of tactical...

Do We Trust China-Russia’s Cyber Nonaggression Pact?

0
Nonaggression pacts signed between countries in the past, such as the Ribbentrop-Molotov agreement between the USSR and Nazi Germany, were meant to prevent a...

What has Changed In Railroad Security?

0
Paz Shabtai The attempted attack by an armed man aboard a train in Europe has brought attention in the United States and Europe to the...

Unmanned Maritime System For Search and Rescue: As Soon As 2016

0
The name Icarus is the name of a character from the greek mythology. Icarus was a rash boy who didn’t heed his father’s warnings,...

Will RPAS Replace Helictopters As Well?

0
Remotely Operated Aircraft Systems (RPAS) offer new opportunities for helicopter operaters and some in the aerial industry in Europe propose to add them to...

Israeli manufacturers will have to form joint ventures to enjoy the...

0
East European militaries are increasingly deploying UAVs, with governments planning acquisitions and local defense companies developing systems to bid against Western manufacturers. Poland’s ongoing 139...

Iran Warns Israel Of “Crushing Response” To Cyber Attack

0
An Iranian official has threatened Israel with a “crushing response” to any attemp to tamper with its technological infrastructures. According to the Irani Communications...

Lone Wolf Terror In Europe? The Same Denial

0
Arie Egozi Europe has learned from Israel and is also treating recent terror attack as “Lone wolf terrorism”. Europe prefers to delude itself that isn’t...

No Early Warning: Iran Promises To Target Any UAV Entering Territory

0
Commander of the air defense unit in the Iranian Revolutionary Guard Corps (IRGC) in province of Kermanshah has stated that the Iranian air force...

Safety First: The UAV Version

0
Due to the rise in Unmanned Aerial Vehicles (UAV) being flown around other aerial vehicles, and due to the danger it poses, the American...

What If The Enemy Has Placed False Information In Military Communications?

0
Is this the worst nightmare of anyone whose job has to do with a reliable global communications system? Colbey Moore, who works for Synack...

Same War, Different Days: Is Hi-Tec War All That Different?

0
It’s been said often that the modern warfare is nothing like that of the past since in the past, war was between two trained...

Latest

Researchers Show How Hidden Commands Can Trick Google Gemini into Delivering...

0
Security researchers have uncovered a method that allows attackers to manipulate Google’s Gemini AI assistant by hiding invisible instructions within emails. The flaw enables...