Search Results
Find News Photos that contain the words:
Search Tips: You can use AND, OR, etc.
A replica of the Trojan horse designed by 'No, No, No, No, No, Yes' and made up of thousands of computer and mobile phone components infected with various viruses and malware, named the "Cyber Horse" is displayed at the entrance to the annual Cyber Week conference at the Tel Aviv University in the Israeli city of Tel Aviv on June 20, 2016. The Cyber Horse is a piece of art composed of devices that can be harmed by malware and was created in order to prompt national and international awareness of the dangers of cyber-attacks. / AFP PHOTO / JACK GUEZ / RESTRICTED TO EDITORIAL USE - MANDATORY MENTION OF THE DESIGNER UPON PUBLICATION - TO ILLUSTRATE THE EVENT AS SPECIFIED IN THE CAPTIONJACK GUEZ/AFP/Getty Images
A man takes a picture of a replica of the Trojan horse designed by 'No, No, No, No, No, Yes' and made up of thousands of computer and mobile phone components infected with various viruses and malware, named the "Cyber Horse" displayed at the entrance to the annual Cyber Week conference at the Tel Aviv University in the Israeli city of Tel Aviv on June 20, 2016. The Cyber Horse is a piece of art composed of devices that can be harmed by malware and was created in order to prompt national and international awareness of the dangers of cyber-attacks. / AFP PHOTO / JACK GUEZ / RESTRICTED TO EDITORIAL USE - MANDATORY MENTION OF THE DESIGNER UPON PUBLICATION - TO ILLUSTRATE THE EVENT AS SPECIFIED IN THE CAPTIONJACK GUEZ/AFP/Getty Images
A replica of the Trojan horse designed by 'No, No, No, No, No, Yes' amd made up of thousands of computer and mobile phone components infected with various viruses and malware, named the "Cyber Horse" is displayed at the entrance to the annual Cyber Week conference at the Tel Aviv University in the Israeli city of Tel Aviv on June 20, 2016. The Cyber Horse is a piece of art composed of devices that can be harmed by malware and was created in order to prompt national and international awareness of the dangers of cyber-attacks. / AFP PHOTO / JACK GUEZ / RESTRICTED TO EDITORIAL USE - MANDATORY MENTION OF THE DESIGNER UPON PUBLICATION - TO ILLUSTRATE THE EVENT AS SPECIFIED IN THE CAPTIONJACK GUEZ/AFP/Getty Images
A replica of the Trojan horse designed by 'No, No, No, No, No, Yes' and made up of thousands of computer and mobile phone components infected with various viruses and malware, named the "Cyber Horse" is displayed at the entrance to the annual Cyber Week conference at the Tel Aviv University in the Israeli city of Tel Aviv on June 20, 2016. The Cyber Horse is a piece of art composed of devices that can be harmed by malware and was created in order to prompt national and international awareness of the dangers of cyber-attacks. / AFP PHOTO / JACK GUEZ / RESTRICTED TO EDITORIAL USE - MANDATORY MENTION OF THE DESIGNER UPON PUBLICATION - TO ILLUSTRATE THE EVENT AS SPECIFIED IN THE CAPTIONJACK GUEZ/AFP/Getty Images
A replica of the Trojan horse designed by 'No, No, No, No, No, Yes' and made up of thousands of computer and mobile phone components infected with various viruses and malware, named the "Cyber Horse" is displayed at the entrance to the annual Cyber Week conference at the Tel Aviv University in the Israeli city of Tel Aviv on June 20, 2016. The Cyber Horse is a piece of art composed of devices that can be harmed by malware and was created in order to prompt national and international awareness of the dangers of cyber-attacks. / AFP PHOTO / JACK GUEZ / RESTRICTED TO EDITORIAL USE - MANDATORY MENTION OF THE DESIGNER UPON PUBLICATION - TO ILLUSTRATE THE EVENT AS SPECIFIED IN THE CAPTIONJACK GUEZ/AFP/Getty Images
A replica of the Trojan horse designed by 'No, No, No, No, No, Yes' and made up of thousands of computer and mobile phone components infected with various viruses and malware, named the "Cyber Horse" is displayed at the entrance to the annual Cyber Week conference at the Tel Aviv University in the Israeli city of Tel Aviv on June 20, 2016. The Cyber Horse is a piece of art composed of devices that can be harmed by malware and was created in order to prompt national and international awareness of the dangers of cyber-attacks. / AFP PHOTO / JACK GUEZ / RESTRICTED TO EDITORIAL USE - MANDATORY MENTION OF THE DESIGNER UPON PUBLICATION - TO ILLUSTRATE THE EVENT AS SPECIFIED IN THE CAPTIONJACK GUEZ/AFP/Getty Images
Gil Shwed, Chief Executive of Network security provider Check Point Software Technologies, speaks during the annual Cyber Week conference at the Tel Aviv University in the Israeli coastal city on June 20, 2016. / AFP PHOTO / JACK GUEZJACK GUEZ/AFP/Getty Images
Gil Shwed, Chief Executive of Network security provider Check Point Software Technologies, speaks during the annual Cyber Week conference at the Tel Aviv University in the Israeli coastal city on June 20, 2016. / AFP PHOTO / JACK GUEZJACK GUEZ/AFP/Getty Images











