Cyber Security

Cyber Security

Bluetooth is a widely deployed platform for wireless communications between mobile devices. As opposed to WiFi, it is not based on a network connecting...

Security cameras are exposed to cyber threats, including information theft and privacy breaching. The cameras have become more and more vulnerable to breaches and...

Protecting against phishing attacks, in which malicious actors attempt to gain access to a user’s credentials (and then to systems and networks) through social...

Germany wants to establish an agency like the American DARPA. Its Defense and Interior ministry officials are pushing for the creation of a new...
autonomous systems

The US Pentagon is planning to apply mind-controlled technology in military environments. The Defense Advanced Research Projects Agency DARPA is selecting teams to develop a...
supply chains

A recent research report from Accenture demonstrates that 86 percent of aerospace and defense companies (A&D) expect to integrate blockchain technology into their corporate...

Hackers from China have successfully infiltrated the IT systems at the Australian National University, potentially compromising the home of Australia's leading national security college...

If you are part of the global and Israeli unmanned systems and robotics ecosystem, you cannot afford to miss the leading annual event in...

Cybersecurity giant McAfee investigated into underground and nefarious hacker marketplaces on the internet, the Dark Web. The company found that the access to an...
fingerprint

Future smartphones will feature a temperature-sensitive fingerprint sensor placed under the screen. Finger sensor could be the safer, more efficient solution to authentication problems....
startup compet

Security, defense & HLS disruptive Startup Competition - startup nation at its best. Yesterday’s Startup Competition for Security, Defense & HLS stood out as one...
chips

Electronic devices that are critical to everyday life and to national defense are dependent on increasingly sophisticated semiconductor integrated circuits, or “chips”. From laptop...
unmanned systems

iHLS is delighted to announce the Conference and Exhibition on Unmanned Systems and Robotics - AUS&R 2018, the leading event held for the sixth...
phishing

The theft of user credentials, i.e. phishing, or delivery of malware through bogus links, has been a major cybersecurity problem. While emails have been...
startup competition

The prestigious iHLS Startup Competition for Security, Defense & Homeland Security will be held next Wednesday, July 11, 2018 at the Dan Panorama Hotel,...
iot

The realm of IoT (Internet of Things) is based on the vision of connectivity among all the devices as well as with various servers...
cybersecurity

Russia has decided to take a closer look at blockchain technology applications for security. The Russian Ministry of Defense has been launching a research...
unmanned systems

iHLS is delighted to announce the Conference and Exhibition on Unmanned Systems and Robotics - AUS&R 2018, the leading event held for the sixth...
startup competition

iHLS is delighted to host for the first time the prestigious Startup Competition for innovative technologies in the security, defense and homeland security fields,...
iot security

The Internet of Things (IoT) revolution - connected devices at home, industry and military - has been accompanied by evolving security challenges. The vast...
blockchain

The US Department of Homeland Security (DHS) is supporting a technology that integrates blockchain with existing solutions for border security applications. Blockchain is a technology...
identity platform

GMO GlobalSign, a global Certificate Authority and leading provider of identity and security solutions for the Internet of Things (IoT), launched its IoT Identity...