Authentication

Authentication

eye tracking technology. image by pixabay

Only this year Apple was granted a patent for one of their acquired eye-tracking patents from SMI SensoMotoric Instruments GmbH. The company's top engineer,...
biometric. image by pixabay

Advancing wearable technology for user authentication - that’s the focus of a new mission of the U.S. Army’s tactical network modernization team. “Try to...
Top Secret. image by pixabay

With so many employees now working remotely, the cyber attack surface has been increasingly expanding. Officials at the US Defense Information Systems Agency say...
image by pixabay

A report by the Public Utilities Regulatory Authority found that phishing attacks remained the largest source of successful cyberattacks and pose a significant risk...
Virtual Reality. image by pixabay

Voice command features on virtual reality headsets could lead to major privacy leakages, known as “eavesdropping attacks.” Built-in motion sensors within common VR headsets...
cyber. image by pixabay

Deepfakes, an AI-based technology to create false content, have become easier than ever to make. The FBI suspects Russian and Chinese actors are using...
IoT. image by pixabay

Blockchain is the new solution for Internet of Things (IoT) interoperability. IoT is all the sensors and smart devices that use the internet to...
Deep web. image by pixabay

A recent report has shown that many social media databases are currently being sold on Breach Forums, a popular hacking forum on the Dark...

Protecting healthcare organizations from cyber-attacks can be a matter of life and death. Healthcare organizations are vulnerable to various cybersecurity threats demanding from them...
Photo illus. by Pixabay cyber-security

In a move aimed at reducing the risk of cyberattacks against US government infrastructure, the White House instructed federal agencies to beef up cybersecurity....

Gait recognition could be a viable technique for protecting individuals and their data. Smartphone device users repeatedly need to authenticate both their smartphones and...
Photo illustration Wikimedia US Marines

Increasing new security concerns worldwide have accelerated the development of a wide range of innovative solutions in the fields of first response, air defense,...

5G systems provide accelerated communications, but they can be a target to cyber-attacks if they are not properly secured.  Major US federal agencies have released...

iHLS is proud to present INNOTECH 2021 - the International Cyber, Homeland Security Technologies and Innovation event. A large two-day exhibition with national pavilions...
photo illust Pixabay

125,698,496 people were pawned in the LinkedIn Scraped Data data breach during the first half of 2021, according to haveibeenpwned.com website. Attackers scraped data...

Startup! This is your opportunity to get a $50K grant. If you are developing a groundbreaking technology we invite you to apply to INNOFENSE...
innovation

iHLS is proud to present INNOTECH 2021 - the International Cyber, Homeland Security Technologies, and Innovation event. A giant two-day exhibition with national pavilions...
Photo illust US Marine Corps

If your startup is developing a groundbreaking technology we invite you to apply to INNOFENSE Innovation Center. Applications are open to the second cycle of...

If your startup is developing a groundbreaking technology we invite you to apply to INNOFENSE Innovation Center. Applications are open to the second cycle of...

Call for Startups: Apply to INNOFENSE Innovation Center - with Israel DDR&D, IMoD.  Applications are open to the second cycle of the INNOFENSE Innovation Center...
INNOTECH

iHLS is proud to present INNOTECH 2021 - the International Cyber, Homeland Security Technologies, and Innovation event. A giant two-day exhibition with national pavilions...
INNOTECH

iHLS is proud to present INNOTECH 2021 - the International Cyber, Homeland Security Technologies, and Innovation event. A giant two-day exhibition with national pavilions...