Cyber

Cyber

device encryption

The FBI had been unable to access data from 7,775 devices in fiscal year 2017, a growing figure causing setbacks in cases from terrorism...
security flaws

Hackers now have a growing number of avenues by which to access personal information, and securing that information will only become more and more...
cyber capabilities

The recent protests in Iran and the regime’s attempts to block them shed light also on Tehran’s cyber capabilities. Offensive cyber operations have become...
big data

The IDF has been dealing daily with missions involving the extraction of information and insights from large masses of data collected by its vast...
satellite-drone communications

A new beam-switching technology was recently tested proving data transfer and anti-jamming measures between satellites and drones are more successful when two beams are...
cybersecurity

Blockchain technology has recently caught the world's attention because of the central role it plays in enabling cryptocurrencies. It enables secure information transmission on...
defense industries

The Israeli defense industries have been actively participating in the Make in India initiative launched in 2014 and in other initiatives many years before....

The U.S Navy is about to equip it’s Littoral Combat Ship (a class of relatively small surface vessels intended for operations close to shore)...
cyberattacks

What were the major trends in the global cyberspace during 2017? According to a report by Clear Sky Cyber Security, the main attacks were...
smartphone password security

New study from Nanyang Technological University, Singapore (NTU Singapore) has found a new security breach that hackers could use to guess your phone's PIN...
big data

Big data technologies enable us to identify patterns, trends and new details by automatically screening huge amounts of data. In the intelligence, security and...
iot

As we approach the end of 2017, we begin to ponder what will 2018 look like, technologically speaking. One of the hottest trends today...
terrorist groups

As the bitcoin concept gains more and more supporters around the globe, there are concerns that this digital currency considered a highly secure method...
big data

Gathering insights from big data regarding future trends requires data scientists’ expertise and can take weeks or even months. Now, an MIT spinout has...
iot 2017 conference

The IoT 2017 Conference and Exhibition held today at the Lago Conference Center have attracted all the leading figures in the IoT sector, technology,...
3d printing

The US Armed Forces have been using 3D printing technologies more and more often. They have been manufacturing 3D printed grenade launchers called RAMBO,...
iot conference and exhibition

Have you registered for the IoT 2017 Conference and Exhibition?  The event organized by iHLS will be held next Monday, December 25th, 2017 with the attendance of all the...
internet of things

As IoT adds more and more devices to the digital fold every day, organizations of all types and sizes are recognizing IoT's potential to...
cyber attack

While cyber attacks often stay at the non-physical cyber world, some of them can attack industrial control systems and cause physical damage. It is...
mobile apps

In emergency and disaster situations, mobile apps and devices enable public-safety professionals to receive and share critical information in real-time, which enhances the delivery...
internet of things

The forthcoming IoT 2017 Conference and Exhibition organized by iHLS will shed light on a lesser-known aspect of the Internet of Things: Security and...
cyber

Israel’s national cyber agencies (the National Cyber Bureau and the National Cybersecurity Authority) will be merged into one entity, the National Cyber Array, which...