Home Blog Page 84
image provided by pixabay

Hacking Wind Energy – Offshore Wind Farms Vulnerable to Cyberattacks

0
Offshore wind farms require robust cyberinfrastructure to operate and communicate with, which unfortunately means they are vulnerable to cyber threats. A new study by researchers...
image provided by pixabay

Technology in 2040 – What Do Experts Think?

0
Expert futurists forecast how rapid technological changes might shape our world by 2040. A team of cyber security researchers led by academics from Lancaster...
image provided by pixabay

New Heat Shield Ceramic Revolutionizes Hypersonic Aircraft

0
Chinese scientists from the Guangzhou University’s School of Materials Science and Engineering have developed a new porous ceramic that could revolutionize aerospace, energy, and...
Images provided by Pixabay and wikipedia

The Organization Monitoring Social Media for Posts Denying October 7th

0
CyberWell is an innovative tech nonprofit that is focused on monitoring and combating the spread of antisemitism on social media. It recently reviewed and...
image provided by pixabay

Countering Smartphone ‘Account Takeover’ Attacks

0
Account takeover attacks consist of a hacker gaining unauthorized access to online accounts. Computer science researchers developed a new way to identify security weaknesses...
image provided by pixabay

New Revolutionary Drug Delivering Wireless Patch

0
A wireless user-friendly solution for controlling chronic diseases- the Spatiotemporal On-Demand Patch, or SOP. Researchers from the University of North Carolina introduced this wireless drug...
image provided by pixabay

Human Rights Groups Oppose EU’s AI Act

0
The EU has proposed a law to regulate AI, but human rights activists warn that it won’t be enough to protect the public from...
image provided by pixabay

‘Drone-in-a-box’ – New Drone-Truck Tag Team

0
A new partnership between Rheinmetall Canada and Elistair aims to provide military customers with an on-the-move ISR solution that will combine Elistair’s fully automated...
image provided by pixabay

Microsoft Suffers Severe Attack by Russian Cyberespionage Group

0
Microsoft was attacked by the Russian hacking group Midnight Blizzard, which reportedly broke into its corporate networks on January 12 and stole some sensitive...
image provided by pixabay

UK’s New Powerful Laser Weapon Hits Aerial Targets

0
The UK Armed Forces are closer than ever to having a powerful laser weapon that can hit targets with both high accuracy and low cost- the...
image provided by pixabay

iHLS Innovation Centre Calls for Dual-Use Security Startups

0
Are you a startup company related to the security sector? Are you looking for recognition, international exposure, access to investors, and the ability to...
image provided by Ray Techniques

Revolutionizing the World of Nanodiamonds

0
Diamonds, the most precious of stones, have far more uses than you might think, and the Israeli company Ray Techniques is giving them away...
image provided by pixabay

Smartphones Can Spy on You Without Using Your Camera

0
Smartphone ambient light sensors are used to automatically adjust screen brightness, but researchers reveal that they can be turned into cameras and used to...
image provided by pixabay

World’s Fastest, Smallest Robot

0
Washington State University develops two insect-like robots – a mini-bug and a water strider are the smallest, lightest, and fastest fully functional micro-robots ever...
image provided by pixabay

Australia’s Plan to Regulate ‘High-Risk’ AI

0
The Australian government revealed its response to managing safe and responsible AI this week, as was announced by federal Minister for Industry and Science,...

North Korea’s Tsunami-Causing Underwater Nuclear Drone

0
Korea Central News Agency (KCNA) claims the country has tested an underwater nuclear-capable drone-based weapons system, which is yet another declaration the country has made...
image provided by pixabay

Will Quantum Computing Spark Cybersecurity Armageddon?

0
IBM claims that quantum computers will wreak havoc on the world of cybersecurity by the end of the decade, and governments and businesses are...
image provided by pixabay

AI Urbanism and Autonomous Cities – Future and Danger

0
AI urbanism is a new field of research looking at the impact of AI on cities. It is different from a "smart city," which...
image provided by pixabay

EU Armies to Collaborate and Test AI Battle Tech

0
The European Commission (EC) signed an agreement to launch the Land Tactical Collaborative Combat (LATACC), bringing together around 34 companies and research institutions to...
image provided by pixabay

An Innovative Solution to Protect ChatGPT from Jailbreak Attacks

0
Large language models (known as LLMs) are deep learning-based models that are trained to generate, summarize, translate, and process written texts. While such models...
IoT. Image by pixabay

Fog Computing – The Future of IoT

0
IoT (Internet of Things) networks connect user devices with everyday household and professional devices, but the challenge is reaching a balance between functionality and...
Image provided by Guard From Above

‘Evolution Eagle’ Military Spy Drone

0
The Evolution Eagle is a revolutionary covert drone that looks like a bird of prey. Guard From Above is a Dutch company known for its...

Latest

AI Model Could Make Future Aircraft Engines Far More Efficient

0
Aviation faces mounting pressure to lower fuel use and emissions, but improving engine efficiency remains an expensive and time-consuming challenge. Engine components must be...