A red line appears on the computer screen as a man with a dummy gun and a fake suicide vest under his jacket demonstrates a body scanner at a counter-terrorism technology fair in London on Tuesday.
In its battle with Apple over an extremist's iPhone, the FBI says neither the company nor anyone else has anything to fear. Although they want to compel assistance from Apple to unlock a phone used by San Bernardino mass ...
The Department of Defense is embarking on a program to update millions of its computers to Windows 10, an unusually quick move for one of Microsoft's massive government customers.
Everyone has experienced passing through security screening in airports. Not only is the process slow and intrusive, but you may also wonder whether it is reliable or just a waste of time.
Your phone is getting better and better at protecting your privacy. But Uncle Sam isn't totally comfortable with that, because it's also complicating the work of tracking criminals and potential national-security threats.
Encryption can be a terrorist's tool. But it's also a key for those hunting attackers, and for many others.
Google is set to invest in secure messaging start up Symphony, primarily used by major financial entities and valued at $650 million, the Wall Street Journal said Tuesday.
Saudi Arabia's newest communications satellite, the Lockheed Martin-built Hellas-Sat-4/SaudiGeoSat-1, will not only be one of the most powerful ever built, it will be among the most agile thanks to new flexible payload technology.
Production processes are becoming increasingly interconnected with digital communications technologies, opening new gateways for criminals operating on the Internet. The IT Security Technology Field at Siemens Corporate Technology ...
Researchers at the Ben-Gurion University of the Negev (BGU) Cyber Security Research Center have discovered that virtually any cellphone infected with a malicious code can use GSM phone frequencies to steal critical information ...