Illustration: Bigstock

Smartphones under Attack

Malware and weaknesses in communication network protocols enable attacks against smartphones. Locating, eavesdropping and monitoring are among the objectives of such attacks. A peek into the world of tactical protection

Illustration: Bigstock

The Threat of Connected Devices to the Internet

The use of armies of connected devices has the capability to harm the routine performance of governments and disrupt performance during emergencies and in wartime. INSS researchers discuss the challenge of defending connected devices
Subscribe to Cybertech