Home Blog Page 99
image provided by pixabay

Ongoing Breach of International Criminal Court

0
The International Criminal Court (ICC) was hit last week in an ongoing cyberattack that is still being investigated. A spokesman for ICC released a statement...
image provided by pixabay

Swiss Company Unveils Autonomous Outdoor Security Robot

0
The Swiss startup Ascento has recently unveiled its new autonomous outdoor security robot called “the Ascento Guard”, which has two wheeled “legs” and a...
image provided by pixabay

New IoT Security Initiative Raises Questions

0
The Federal Communications Commission (FCC) has proposed a cybersecurity labeling program to better protect users of smart devices, with the new initiative covering any...
image provided by pixabay

Starlink Lost Over 200 Satellites in Just Two Months

0
Satellite tracking data shows an increase in burned Starlink satellites over the summer. Starlink is a satellite constellation operated by the aerospace company SpaceX, and...
images provided by pixabay

The Pentagon Is Developing a Language for Drones

0
The U.S. military hopes to get drone swarms from different manufacturers to talk to one another during warfare, and the key might be a...
Image provided by Frenel Imaging

The Power Of Polarimetry – A Revolution In Thermal Applications

0
The world of thermal imaging is prevalent in countless fields, including agriculture, infrastructure, medicine, automotive, security, etc. Applications that use thermal sensing build a...
image provided by pixabay

NASA Report on Unidentified Anomalous Phenomena Research

0
NASA announced it intends to take steps to understand unidentified anomalous phenomena (UAP, also referred to as UFO). The space agency released mid-September the final...
image provided by pixabay

The Hacker of FBI and Airbus Talks Goals and Intentions

0
Threat actor USDoD is behind the recent cyberattacks on the FBI and Airbus. He later claimed his targets are “not political”, but stated he...
images provided by pixabay

New Revolutionary ‘Lab-on-a-Drone’ System for Air Pollution

0
Researchers made a breakthrough towards better understanding and combating air pollution, unveiling an innovative "lab-on-a-drone" system for real-time air pollution detection. This invention is designed...
image provided by pixabay

Base for Space Object Identification Built in China

0
China is setting up a new military base to enhance the People’s Liberation Army’s (PLA) “space situational awareness,” an initiative led by the PLA’s...
image provided by pixabay

Building AI An Artificial, Multisensory Integrated Neuron “Brain”

0
Penn State researchers have recently harnessed the biological concept for application in artificial intelligence to develop the first artificial, multisensory integrated neuron, which may...
image provided by pixabay

The Plague of Unprotected Security Cameras

0
A badly defended security camera is an easy target for hackers, as there are tools for easily hacking internet protocol (IP) cameras, and research...
image provided by pixabay

Meet The New Jet-Propelled Hydra 400 Drone

0
The British Ministry of Defense (MoD) has displayed its latest jet-propelled, heavy-lift drone at the DSEI conference. Called the Hydra 400, it is compact...
image provided by pixabay

New Disposable ‘Jackdaw’ Combat UAS

0
UK-based company QinetiQ unveiled its concept for a new disposable, cheap and effective unmanned aerial system (UAS) called the "Jackdaw," which is reportedly designed...
image provided by pixabay

ESA Says- Stop Crowding Earth’s Orbital Environment

0
ESA’s Space Environment report highlights space debris as a major problem, stating that the problem will worsen even if we stop sending objects into...
images provided by pixabay

Europol Reveals Top Cyberthreat

0
A new threat report from Europol states that malware-based ransomware cyberattacks have been a major threat, and that ransomware affiliate programs have established themselves...
images provided by pixabay

Microsoft Teams Phishing Attacks Target Corporate World

0
Microsoft Teams is reportedly being used by a threat actor known for working with ransomware groups to distribute phishing lures through the chats. The financially...
image provided by pixabay

What is Neuromorphic Computing, and How Will It Change the World...

0
Research institutions have been working for the past few years to find new concepts of how computers can better process data in the future....
images provided by pixabay

Sea Drones and the Russia-Ukraine War

0
While aerial drones have been extensively used throughout the Russian-Ukrainian war, the emerging sea drone technology may change this war and maybe even the...
image provided by pixabay

Using Free WiFi? Better Watch Your Passwords

0
Researchers from universities in China and Singapore revealed a security gap that permits malicious snoops to steal your password through keystroke identification, in what...
image provided by pixabay

New And Improved Ghost-X Drone Displays Operational Autonomy

0
The Ghost-X by Anduril Industries shows enhanced payload capacity, flight time, and a long-range resilient communications kit, making it essential for operational use. The company’s...
image provided by pixabay

A New Breed of Malware Hides in Plain Sight

0
A new cyber threat labeled ‘web app engaged’ (WAE) malware is hiding within popular applications like Dropbox and Discord, and has apparently seen an...

Latest

The Future of Submarine Steering Starts Here

0
Modern submarines rely on increasingly complex control systems to maneuver safely in three dimensions, manage propulsion, and coordinate onboard sensors. As underwater missions expand...