Related topics: cyber attack · security · google · cyber attacks

Roadmap for cyber security research

In their secUnity roadmap, 30 renowned European IT security experts of the BMBF-funded secUnity collaboration outlined how digital threats on the European level can be responded to more efficiently in the future. Among these ...

Efforts to control cyber weapons ignore the agents who use them

Reports of malicious and targeted cyber attacks are becoming increasingly common around the world. In early February, for example, Australia's security agencies revealed there were investigating an attempted hack on the country's ...

First method to detect illicit drone filming developed

The first technique to detect a drone camera illicitly capturing video is revealed in a new study published by Ben-Gurion University of the Negev (BGU) and Weizmann Institute of Science cyber security researchers. The study ...

page 8 from 34