Search Results

Find News Photos that contain the words:

Search Tips: You can use AND, OR, etc.

Click Here To Search For News

1929 - 1936 of 11230
  • A replica of the Trojan horse designed by 'No, No, No, No, No, Yes' and made up of thousands of computer and mobile phone components infected with various viruses and malware, named the "Cyber Horse" is displayed at the entrance to the annual Cyber Week conference at the Tel Aviv University in the Israeli city of Tel Aviv on June 20, 2016. The Cyber Horse is a piece of art composed of devices that can be harmed by malware and was created in order to prompt national and international awareness of the dangers of cyber-attacks. / AFP PHOTO / JACK GUEZ / RESTRICTED TO EDITORIAL USE - MANDATORY MENTION OF THE DESIGNER UPON PUBLICATION - TO ILLUSTRATE THE EVENT AS SPECIFIED IN THE CAPTIONJACK GUEZ/AFP/Getty Images

  • A man takes a picture of a replica of the Trojan horse designed by 'No, No, No, No, No, Yes' and made up of thousands of computer and mobile phone components infected with various viruses and malware, named the "Cyber Horse" displayed at the entrance to the annual Cyber Week conference at the Tel Aviv University in the Israeli city of Tel Aviv on June 20, 2016. The Cyber Horse is a piece of art composed of devices that can be harmed by malware and was created in order to prompt national and international awareness of the dangers of cyber-attacks. / AFP PHOTO / JACK GUEZ / RESTRICTED TO EDITORIAL USE - MANDATORY MENTION OF THE DESIGNER UPON PUBLICATION - TO ILLUSTRATE THE EVENT AS SPECIFIED IN THE CAPTIONJACK GUEZ/AFP/Getty Images

  • A replica of the Trojan horse designed by 'No, No, No, No, No, Yes' amd made up of thousands of computer and mobile phone components infected with various viruses and malware, named the "Cyber Horse" is displayed at the entrance to the annual Cyber Week conference at the Tel Aviv University in the Israeli city of Tel Aviv on June 20, 2016. The Cyber Horse is a piece of art composed of devices that can be harmed by malware and was created in order to prompt national and international awareness of the dangers of cyber-attacks. / AFP PHOTO / JACK GUEZ / RESTRICTED TO EDITORIAL USE - MANDATORY MENTION OF THE DESIGNER UPON PUBLICATION - TO ILLUSTRATE THE EVENT AS SPECIFIED IN THE CAPTIONJACK GUEZ/AFP/Getty Images

  • A replica of the Trojan horse designed by 'No, No, No, No, No, Yes' and made up of thousands of computer and mobile phone components infected with various viruses and malware, named the "Cyber Horse" is displayed at the entrance to the annual Cyber Week conference at the Tel Aviv University in the Israeli city of Tel Aviv on June 20, 2016. The Cyber Horse is a piece of art composed of devices that can be harmed by malware and was created in order to prompt national and international awareness of the dangers of cyber-attacks. / AFP PHOTO / JACK GUEZ / RESTRICTED TO EDITORIAL USE - MANDATORY MENTION OF THE DESIGNER UPON PUBLICATION - TO ILLUSTRATE THE EVENT AS SPECIFIED IN THE CAPTIONJACK GUEZ/AFP/Getty Images

  • A replica of the Trojan horse designed by 'No, No, No, No, No, Yes' and made up of thousands of computer and mobile phone components infected with various viruses and malware, named the "Cyber Horse" is displayed at the entrance to the annual Cyber Week conference at the Tel Aviv University in the Israeli city of Tel Aviv on June 20, 2016. The Cyber Horse is a piece of art composed of devices that can be harmed by malware and was created in order to prompt national and international awareness of the dangers of cyber-attacks. / AFP PHOTO / JACK GUEZ / RESTRICTED TO EDITORIAL USE - MANDATORY MENTION OF THE DESIGNER UPON PUBLICATION - TO ILLUSTRATE THE EVENT AS SPECIFIED IN THE CAPTIONJACK GUEZ/AFP/Getty Images

  • A replica of the Trojan horse designed by 'No, No, No, No, No, Yes' and made up of thousands of computer and mobile phone components infected with various viruses and malware, named the "Cyber Horse" is displayed at the entrance to the annual Cyber Week conference at the Tel Aviv University in the Israeli city of Tel Aviv on June 20, 2016. The Cyber Horse is a piece of art composed of devices that can be harmed by malware and was created in order to prompt national and international awareness of the dangers of cyber-attacks. / AFP PHOTO / JACK GUEZ / RESTRICTED TO EDITORIAL USE - MANDATORY MENTION OF THE DESIGNER UPON PUBLICATION - TO ILLUSTRATE THE EVENT AS SPECIFIED IN THE CAPTIONJACK GUEZ/AFP/Getty Images

  • Gil Shwed, Chief Executive of Network security provider Check Point Software Technologies, speaks during the annual Cyber Week conference at the Tel Aviv University in the Israeli coastal city on June 20, 2016. / AFP PHOTO / JACK GUEZJACK GUEZ/AFP/Getty Images

  • Gil Shwed, Chief Executive of Network security provider Check Point Software Technologies, speaks during the annual Cyber Week conference at the Tel Aviv University in the Israeli coastal city on June 20, 2016. / AFP PHOTO / JACK GUEZJACK GUEZ/AFP/Getty Images

1929 - 1936 of 11230

News, Photo and Web Search

FEATURED SOFTWARE DISCOUNT!

Each month, WUGNET selects great software discounts exclusively for members of the Gadgets and Tech Channel. Save 30% Remo Recover for Android™ Remo Recover for Android is specially designed to recover data from Android phones. The application vigorously scans both the internal and external phone memory of the device, to identify lost or deleted files, including Android application package files (APK), and restores them for reuse. Click here to see the latest offer or coupon and save money on great software.