Home Blog Page 706

Can You Trust A Robot?

0
When they come — and they are coming — will the robots we deploy into human culture be capable of evil? Well, perhaps "evil"...

Cyber Attacks Against Israelis

0
InnoCom warns against repeated cyber attacks , propagated through viral malware embedded in various files. Most of the files ended with the extension .scr,...

INSS Global Cyber Review – July 2013

0
    Israel Israel: An increase of cyber security to investigate incidents 94% of hackers attack discover too late after the damage was done. These things were said...

Cyber Training and Simulation – Getting Ready

0
“In the last few years, cyber threats have undergone an evolutionary – and even revolutionary – process. We’ve seen escalations like never before”, said...

Lessons from the Iron Dome

0
By Yiftah S. Shapir INSS – Military and Strategic Affairs Program Israel has been under rocket attack for many years. Particularly memorable are the shelling of Galilee panhandle...

The Classic Cyber Defense Methods Have Failed – What Comes Next?

0
By Amir Averbuch and Gabi Siboni INSS – CYBER Warfare Program   The classic defense methods employed throughout the world in recent decades are proving unsuccessful in halting modern...

Security guards and guns are a bad mix!

0
Yesterday’s murder of a Jerusalem lawyer and his daughter proves that guns in the hands of security guards spell danger rather than security. A disgruntled...

Computer immunity failure

0
As discussed in a previous article, the mechanisms available to hackers allow them to create a phased plan to take over computer systems, particularly...

Determining Norms for Warfare in New Situations

0
By Asa Kasher and Amos Yadlin INSS – Military and Strategic Affairs Program Between Military Ethics and the Laws of War The ethical doctrine of the war on terror...

Are nuclear weapons safe from cyber-attacks?

0
Researchers are looking into whether today’s nuclear weapons are safe from computer hacking. The research seeks to address the question of whether the ability...

Israel is among the global leaders in security export

0
According to data revealed by the Israeli Ministry of Defense Israel is among the top ten security exporters, 25% of the exports being missile...

A ridiculous decision that won’t change anything

0
The European union again made a decision that is not worth the paper it is printed on. The Foreign Affairs Council of the European Union...

The Hydro Camel Unmanned Submarine

0
Today, there are many remotely operated submarines that handle important tasks, such as checking underwater pipelines, mapping underwater minefields, searching for locations to place...

New Home for Indian Navy Searchers

0
India’s Behala Airport will become an operating base for Indian Navy Heron and Searcher MK II unmanned aerial vehicles (UAVs). According to officials, discussions...

EU to reshape it’s defense industry

0
 A reshaping plan of the EU defense industries may create additional problems for the Israeli defense industries, according to the Israeli Defense Ministry officials. AFP...

The smart gun

0
Just weeks after the firing off the world's first 3D printed handgun, a smart rifle that allows the user to accurately hit targets up to...

Can cars be hacked?

0
In the early hours of  June 18th, a Mercedes coupé travelling at an extremely high speed along a Los Angeles street smashed into a...

The Security Market Communications Trends

0
Very often one can learn about international market trends simply by speaking to the technology providers, that way you also get a wider perspective...

The new division at Rafael will strengthen homeland defense development

0
The Land Division will focus on land systems development, including weapon systems, armored combat vehicle defenses, shoulder-launched systems and naval combat systems. The division...

ATLAS the humanoid robot is looking for a brain

0
Like the Scarecrow from “The Wizard of Oz” in search of a brain, Boston Dynamics Atlas robot created for the DARPA challenge, is also...

U.S. port facilities vulnerable to cyber attack!

0
In a 50-page policy paper just released by the Brookings Institute and authored by Commander Joseph Kramek of the U.S. Coast Guard and a...

Using fingerprints more efficiently

0
 Researchers in the United Kingdom and France have developed a new and extremely sensitive method for visualizing fingerprints left on metal surfaces such as...

Latest

Rising Global Tensions Fuel a Boom in Israeli DefenseTech

0
In recent years, the global system has experienced growing regional and international tension, driving many countries to seek solutions that ensure intelligence and operational...