Internet of Things (IoT)

Internet of Things (IoT)

520
Kaspersky Lab discovers the ancestor of Stuxnet and Flame – powerful threat actor with an absolute dominance in terms of cyber-tools and techniques. For several...

2456
American companies welcome next year's budget for Cyber security. Massachusetts cyber security firms applauded President Barack Obama proposed $14 billion allocation toward cybersecurity initiatives...

661
Nowadays, everything is available at the palm of our hand. Nevertheless, these amazing capabilities, combined with our instinctive fear of the "Big Sister Syndrome"...

136
Register to iHLS Israel Homeland Security In this weekly Video report (February 3rd 2015): Coalition against Isis: Too Little Too Late Kaspersky Technology Forecast for 2045 The US...

69
The U.S. is realizing step by step to what degree it is vulnerable to Cyber attacks. According to HomeLand Security News Wire, while most cybersecurity...

110
Human-controlled robotic systems anywhere in the world and even in space constitute the solution to various logistic and other barriers to human presence. Dr. Andre...

113
Yoram Hacohen Three interesting processes are underway as a direct result of Edward Snowden’s revelations about the extent of the access by US security services...

123
2015 will see an increase in Cyber Warfare incidents. McAfee Labs' 2015 Threats Predictions report sees increased cyber-warfare and espionage, along with new strategies from...

14
Analysis of Firsthand Experiences of the World’s Most Renowned Cybersecurity Forensics Teams Pinpoints Exploitation of Privileged Accounts as a “Signature” in Targeted Attacks. A new...

69
In a recent C-SPAN interview by Mary Jordon from the Washington Post, Dr. Arati Prabhakar, director of the Defense Advanced Research Projects Agency (DARPA), conducted stated:...

173
Forty years ago, a group of researchers with military money set out to test the wacky idea of making computers talk to one another...

15
By Gad Elkin "The next phase of the internet will be focused on information and powered by connectivity. Cloud computing, big data and Internet of...

27
This problem is getting more serious - the inadequacy of current network security systems, which require expert programmers to identify and repair system weaknesses...

19
We're entering a new age, an age where our devices are connected to the internet, communicating through the net to fulfill various needs. When...

12
Due to expanding cyber-attack vectors on the energy grid and the significant growth in popularity of electric vehicles (EV’s), Nation-E, a provider of energy...

114
Mr. Paul P. Chen is the MILS Senior dirctor and product manager for Wind River, the VxWorks Multiple Independent Levels of Security technology vendor. I...

39
Internet of Things, a business growing at a compound annual rate of 7,9% that is a privileged target for hackers and cyber criminals. The Internet...

26
On the first day of Intel's annual convention, the Intel Developers Forum (IDF), the company revealed a new processor family – Intel Quark, talking...

iHLS Events