hackathon

Life-Saving Dog Tag – Developed at IDF Technological Hackathon

0
Innovative technologies in the military and security fields were showcased at a recent hackathon attended by the IDF technological teleprocessing officers. The exercise was...
drone

Unexpected Player Joins The Drone Arena

0
The FAA provides to those who register their drone a 10-digit code which must be legibly printed on the frame of the device. However,...
B-21 Stealth Bombers

US Air Force Rolls Out New Stealth Bombers

0
The U.S. Air Force has rolled out plans to phase out the B-1B and B-2 bomber fleets as it makes way for the new...
ihls security accelerator

Application Open for Startups to Join iHLS Security Accelerator 5th Cycle

0
We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for civilian defense, securing government institutions, vital infrastructure and borders,...
future forces

Harsh Competition over Future Forces Combat Outfit

0
The Russian Ground Forces have been equipping their troops with an advanced future soldier combat outfit. The latest version of the Ratnik, the Russian...
Swarms Wil Challenge US Infantry

Drone Swarms Are A Big Threat To Infantry

0
The emergence of inexpensive small unmanned aircraft systems (sUASs) that operate without a human pilot has led to adversarial groups threatening deployed U.S. forces,...
CH-53K

CH-53K Helicopter Tripled its Predecessor External Load Capacity

0
Built to thrive on the modern battlefield, including shipboard operations, the Sikorsky CH-53K helicopter is designed to be intelligent, reliable, low maintenance and survivable...
Drone Pilots

Watch: New Sensor Will Detect Drone Pilots

0
A new sensor called RF-300 was released by Dedrone, that automatically locates drones and their pilots. The current ubiquity of drones makes for a very...
airport security

Major Improvement Expected in Airport Security Queues

0
Going through airport security can be a nerve-wracking process. In the US, whether it’s adhering to Transportation Security Administration (TSA) rules of removing laptops...
Space Warfare Includes Satellites

Russia Eyes Space Superiority Through Satellite Grouping

0
Recently, US Air Force top official stated that America must prepare to fight and win wars in outer space. Now, Russia makes sure it...
autonomous

Quantum Technology to Secure Autonomous Car

0
Autonomous vehicle technology is an emerging global market. By 2025, the partially autonomous vehicles market is expected to be at 36 billion U.S. dollars...
avatars

New Tech Lets Users Create Their Own Avatars

0
A new artificial intelligence technology allows users to create their own virtual avatars, for a wide array of uses, including military training. The technology...
unmanned

Successful Maiden Flight to Leonardo’s Unmanned Helicopter

0
Leonardo Helicopter Division has been heavily investing in the development of Rotary Wing Unmanned Air Vehicles (RUAV) and Optionally Piloted Helicopters (OPH), which provide...

Market Trends of Future Forces Wearable Devices

0
The future forces will be equipped with a wide array of wearable devices for various purposes. One of these categories will be monitoring systems....
analyze defense footage

In Controversial Move, Google is Helping Analyze Defense Footage

0
The US Defense Department is getting assistance from Google’s open-source AI software. The search giant’s AI will be helping the agency to analyze defense...
less-lethal

New Game-Changer in Less-Lethal Munitions for Law Enforcement

0
A new munition product addressing the less-lethal market was recently launched. The patented technology allows for delivering a significantly greater kinetic energy in a...
armed drones

Future Armed Drones will Turn Deterrence Theory on Its Head

0
Evolving drone technology will enable countries to make credible threats against states and groups that do not possess drones, a new research found. Stanford...
DDoS Attack Launched against GitHub

Largest Known Cyber Attack Launched Against GitHub

0
GitHub has become the target of the largest-known cyber attack in history. The web-hosting service revealed the attack in a blog post according to...

Video Security Cameras Need Protection

0
The number of video security cameras is increasing every hour and everywhere. Private people and organization want to have their eye on their property...
autonomous car

Autonomous Car Security Tech to Be Implemented in UAVs

0
With the increasing automation and widespread use of unmanned aerial systems, potential cyber-attacks on aerial fleets are already a major concern. A recent collaboration...
data fusion

Data Fusion Helps Prediction in Criminal Cases

0
Law enforcement organizations store information in numerous databases with no way to access, search, and view their information in one place. Officers and agents...
cybersecurity

iHLS Accelerator Startup: Accessible IoT Cybersecurity for All Devices

0
Just a few days before the President Trump inauguration, 70% of Washington DC’s CCTV cameras had been infected with a ransomware causing the system...

Latest

Bugs for Better Health: A Biological Route to Gout Prevention

0
For centuries, gout has been associated with painful joints. In reality, it’s the outcome of years of elevated uric acid levels—known as hyperuricaemia—that gradually...