Security

Security

 The Israeli company HTS, specializing in computerized reading solutions for identification of vehicles and containers, with a variety of solutions for sea ports automation...

Raytheon Company was awarded a contract with the U.S. Naval Air Systems Command (NAVAIR) to build an integrated multi-intelligence (Multi-INT) system to safeguard forward...

France has decided to buy two MQ-9 Reaper medium-altitude long endurance (MALE) drones from the USA, to extend the strategic reconnaissance capability of the...

The Northrop Grumman X-47B, an aircraft designed to prove that unmanned jets could operate from aircraft carriers, completed its primary mission Wednesday when it...

Deputy assistant secretary of defense for cyber policy Eric Rosenbach cited Defense Department progress in creating a concept for operating in the newest warfare...

Sierra Nevada Corporation (SNC) successfully completed its second airborne demonstration for the Air Force Research Lab under its Multi Sensor Detect Sense and Avoid...

A new system has been introduced to get passengers through airport security faster. The program, called Global, was developed by the Customs and Border Patrol (CBP)...

On February 25, 2013, a 26-year-old Syrian "hacktivist" who had fled Damascus was sitting up late in his apartment in a Washington suburb watching...

 Every time someone points to Israel and claims "this country has nuclear weapons" the most commonly heard response is "Israel will not be the...

Cyber attacks on U.S. infrastructure or networks could be met with a conventional military response, the chairman of the Joint Chiefs of Staff Army...

The budgetary limitations imposed by recent economic turmoil has seen Romanian defense expenditure contract from US$3 billion in 2008 to US$1.7 billion in 2013....

On the heels of a delivery to the Royal Netherlands Air Force, Environmental Tectonics Corp. has signed a contract for an additional disaster-management simulation...

The hacking problem just got worse. The defenders are losing the race of protecting computer users. One of their great successes is summarized in...

Airports are known as potential targets for many terror organizations. As a result huge sums of money are invested in the perimeter defense of...

The global yearly survey of cyber threats performed by “Cyber Arc”: 80% of senior managers consider cyber attacks as a greater national threat than...

North Carolina State University researchers are using video game technology to remotely control cockroaches on autopilot, with a computer steering the cockroach through a...

By Meidata The issue of Arctic defense politics hits the headlines every couple of months, and then is quickly forgotten. The cold tundra is certainly...

 Nine leading British defense companies are collaborating with the government in a partnering scheme to prevent cyber attackers from stealing the industry’s secrets. This...

This report summarizes notable events discussed on jihadist Web forums during the first half of march 2013. Following are the main points covered in...

The Iron Dome intercept system has a new job, according to Rafael’s sources. These sources told i-HLS that the Iron Dome, deployed to protect...

Islamic rebels threaten to attack the winter Olympics next year, according to HLS News Wire. On Wednesday Doku Umarov, a leading Chechen Islamic rebel, issued...

 Al Qaeda plotted to hijack or sink oil tankers last year to prompt a spike in prices and trigger an economic crisis in the...

Latest