What Can We Learn From The COVID-19 Pandemic?
It can be easily agreed upon that the COVID-19 pandamic has had a destroctive effect on many of our lives, whether it be losing...
Using VR to Treat Addiction
An unexpected use of virtual reality is using it to treat addition. The combination between technology and psychology is not a new one but...
Protection Against Ransomware In The Medical Sector
Ransomware attacks on US healthcare have drastically increased in their sophistication and intensity over the last year, which is expected to continue into 2022....
Critical Infrastructures Are Vulnerable to a Major Threat
Following several biohazard epidemics, the COVID-19 pandemic and the 2001 anthrax attacks in the US, a critical infrastructure biodefense program will be established at...
LiDAR And Deep Learning – A Recommended Combination
A new LiDAR perception system delivers highly accurate object detection, tracking, and classification, bringing the enhanced capabilities that enable autonomous vehicles to new industries. Endeavor...
Powering Wearable Devices Using Unexpected Source
Researchers have found a way to harvest electricity from radio waves. From microwave ovens to Wi-Fi connections, the radio waves that permeate the environment...
AI Offers Unbelievable Next-Gen Video Analytics
While artificial intelligence offers the power to drive a vast array of analytics solutions, many of the newest technology developments have been driven by...
Radiation Control Is Led By Drones
UAV-based technologies will be crucial for advancing radiation monitoring, including enhancing the application of environmental mapping and improving long-term monitoring of contaminated areas.
In the...
This Drone Will Save Lives When All Hope Is Lost
The survival rate for people with cardiac arrest depends on the time patients get defibrillation. The defibrillator is a portable electronic device that automatically...
Protect These Devices From Cyber Attacks
Cybersecurity for medical devices is critical in retaining the trust consumers place in health care companies for how the technology is used, and how...
The Medical Field Must Increase Cyber Security
A recent report done on cyber security in healthcare concluded that the increased access to data creates more opportunities for security vulnerabilities in the...
Suicide Prevention Via Technology – We Must Act Now!
As of today, suicide by firearm is by far the most lethal method of ending your own life, especially in the US. In 2020,...
Deep Learning Model to Detect Eye Diseases
Researchers from Tohoku University in Japan have developed a lightweight deep learning model called LWBNA_Unet for automatic segmentation and analysis of eye images to...
Drones Delivering Medicine – Can Be Used in Combat?
To many of us, drones delivering commercial goods is a not so far off distant future. In reality, it's already happening. Drones, developed by...
Wearable Device to Prevent Heat Stroke Among Military Servicemen
Heat stroke or heat exhaustion injuries pose a significant health threat to soldiers, and young or inexperienced recruits are especially vulnerable. Hundreds of US...
Challenges and Major Concerns in Health Sector Cybersecurity
By Or Shalom
Cyberattacks targeting the health sector have intensified following the COVID-19 crisis. The US Department of Health and Human Services and the Office...
Let’s Face it – Smart Mask
Face masks that cover the mouth and nose to prevent COVID-19 contamination could soon become a lot more useful for the wearer. Researchers are...
Detector Dogs Have New Role in Airports
Studies have demonstrated that detector dogs are one of the most reliable tools available to identify substances based on the odors they emit. Previous...
Israeli Medical Center Targeted by Ransomware Attack
The Hillel Yaffe Medical Center in Hadera has been targeted by a ransomware attack without prior notice. The medical center announced today that the...
Under Development: Dual-Use Health Monitoring Tech
Accurate, proactive monitoring has long been recognized as key to preventing injury and mortality in personnel exposed to a wide range of harmful conditions...
Remote Work – How to Protect from Cyber Attacks?
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently released a draft of its “Zero Trust Maturity Model” as US agencies are asked...
Don’t Miss Out on INNOTECH – the International Cyber, HLS and...
iHLS is proud to present INNOTECH 2021 - the International Cyber, Homeland Security Technologies, and Innovation event. A giant two-day exhibition with national pavilions...