Only two out of five organizations use efficient cyber protection technologies
According to a survey carried out by Kaspersky Labs and B2B international, 82% of organizations defend against malicious code, and 80% use anti-spam technologies....
India: Notification of National Cyber Security Policy – 2013
Ministry of Communication and Information Technology, Department of Electronics and Information Technology
New Delhi, July 2nd 2013
Vision
To build a secure and resilient cyberspace for citizens,...
Defense technology helps to predict killer storms
When the TV weatherman predicts sunshine and it rains, people get wet. When meteorologists are wrong about a hurricane, people can die. While forecasters...
Solar powered UAS
During a keynote at the small unmanned systems business expo in San Francisco, CA., Alta Devices’ CEO, Christopher Norris, explained that small unmanned air systems...
Al-Qaeda makes an effort to gain control in Iraq
Hundreds of extremists feared to have escaped and on the run in Iraq on Monday after al-Qaeda’s affiliate in the country launched a major...
UAS AeroVironment’s Puma AE Certified for Commercial Operations in the Arctic
This 'Restricted category' certification marks the first time the FAA has approved a hand-launched unmanned aircraft system for commercial missions.
The U.S. federal Aviation Authority...
Commercial unmanned air system (UAS) to be operational soon
Insitu is planning to launch the first U.S. commercial unmanned aircraft system operation following receipt of FAA type certification for its ScanEagle UAS on...
Turkey to develop ballistic missiles!
Turkey has approved construction of its first satellite launching center meant to cater to the country’s mushrooming satellite programs.
According to Defense News Ankara’s western...
An Exceptional Experience
The vulnerability of legacy networked computer systems was discussed in an earlier article. In addition to that, hackers can utilize social engineering to take...
Bi-monthly Report – Jihadi Forums
Bi-monthly Report: Summary from Jihadi Forums - The Second Half of April 2013
By ICT's Jihadi Websites Monitoring Group
This report summarizes the most notable events...
A European Spy Network
The European Union is pondering an EU Commission proposal to acquire a fleet of surveillance drones, satellites, and planes as part of an “ambitious...
The Al Qaeda undetected bomb
Al Qaeda engineers have been working on designing a sophisticated bomb powerful enough to bring down passenger planes, designed to avoid detection.
John Pistole, head...
A New Land Systems Division at Rafael – adapting systems for...
Giora Katz, head of the new Rafael Land Division, said: “We will use Rafael's many capabilities to meet the demands of modern warfare, including...
The illogical General
Gen. James Mattis, a former Marine and commander of the U.S. forces in the Middle East who recently retired from the military, was known...
The U.S. is worried about its missile defense capabilities
The Pentagon is quickly moving forward with deployments of key radar and missile defense systems to Japan, Guam, Jordan, Turkey and the United Arab...
Radar Coverage modeling –beyond the line of sight
A unique radar model estimates the radar’s clutter map and enables assessment of the true operational coverage of a radar sensor.
The deployment of radar...
Splunk Named A Leader In The 2013 Gartner Magic Quadrant For...
Often seen as inflexible, slow and failing to deliver on the promise of Security Information and Event Management (SIEM), the traditional SIEMs of yesterday...
Fire retardants made safe
Fire retardants are often extremely harmful to health. Despite this, they are found in many types of synthetic materials which could otherwise ignite quickly. Swiss...
New water purifier for Marines and First Responders
A new, easy-to-carry water purifier that could give Marines and first-responders access to clean water wherever they go has successfully completed its first operational...
The U.N and cell phone vulnerability
The United Nations is warning telecommunications regulators and government agencies about significant vulnerabilities in cell phone technology which would allow hackers to attack at least half...
The Danger of confusing Cyberespionage with Cyberwarfare
China has recently been accused of intense spying activity in cyberspace, following claims that the country uses cyber tactics to gain access to military...
The Heron-1, flying in Afghanistan non stop
At the beginning of July, Israeli Aerospace Industries (IAI) Heron 1 unmanned air systems (UAS) logged its 15,000th operational flight hour in Afghanistan.
The three...












































