Technology’s answer to e-crime
Cyber crime, aka e-Crime, presents a highly complex and sophisticated threat that has been evolving rapidly recently. The unfolding legitimate cyber world makes for...
Innovative Face Recognition technology
In this day and age of highly advanced crimes on the one hand, and intensifying terrorism on the other, the sense among intelligence service,...
Israel’s Air Force unveils new intelligence system
New data collecting system for the Israeli Air Force: The variety of unmanned air systems (UAS) over Israel and neighboring areas has created a...
DHS to rely on big data to protect critical infrastructure, networks
DHS officials responsible for protecting federal civilian networks and critical industries from cyberattacks have recently referred to this issue. They said they are going...
Equation Group: The Crown Creator of Cyber-Espionage
Kaspersky Lab discovers the ancestor of Stuxnet and Flame – powerful threat actor with an absolute dominance in terms of cyber-tools and techniques.
For several...
Most cars are vulnerable to hacking or privacy intrusions
All a hacker needs to be able to break into your car is an iPad. This, according to a report which was recently released...
Obama’s $14 billion cybersecurity initiatives for the 2016 budget
American companies welcome next year's budget for Cyber security. Massachusetts cyber security firms applauded President Barack Obama proposed $14 billion allocation toward cybersecurity initiatives...
“Internet of Things” – an end to privacy?
Experts caution against the so-called digital electronic “Internet of Things” (IoT). Along with “Smart Grid Technologies” it "could fully eviscerate privacy". Does technological innovation...
Big data 4 HLS Conference
Top experts from Israel and abroad met today in the Israel Air Force Center in Herzliya for the Big Data 4 HLS Conference, organized...
Israeli system intercepts cloud-stored data
Nowadays, everything is available at the palm of our hand. Nevertheless, these amazing capabilities, combined with our instinctive fear of the "Big Sister Syndrome"...
iHLS TV Weekly Video Report – February 3rd 2015
Register to iHLS Israel Homeland Security
In this weekly Video report (February 3rd 2015):
Coalition against Isis: Too Little Too Late
Kaspersky Technology Forecast for 2045
The US...
Cyber attacks on drones
The number of missions unmanned systems are tasked with, as well as their diversity, is expanding each year. The roles they play include a...
A single DDoS attack can cost a company more than $400,000
According to the results of a study conducted by Kaspersky Lab and B2B International, a DDoS (Distributed Denial of Service) attack on a company’s...
China hacked U.S classified systems and stole F-35 data
China obtained more than 50 terabytes of data from U.S. defense and government networks, notably the Joint Strike Fighter’s stealth F-35 radar and engine...
A Multidisciplinary Analysis of Cyber Information Sharing
The emergence of the cyber threat phenomenon is forcing organizations to change the way they think about security. One of these changes relates to...
Secured Robotic vehicle – the future is here
Secured robots are becoming more commonplace in the framework of military service, as well as other forces, including HLS. Being able to send out...
Israel: Doubts Concerning the Performance of the National Cyber Bureau
The public uproar over the establishment of the National Cyber Bureau is far from subsiding. Following the request made by security, legal and technology...
Cyber: Endpoint Protection Platforms
Kaspersky Lab improved its position as a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms.
Kaspersky Lab has been named a “Leader” in the...
Safe City meets Big Data on the corner of Video Analytics
With the advent of technological development and the significant reduction in the cost of video end user devices, one would be hard pressed to...
2014: Greater awareness of security breaches
2014 will be seen as the “Year of the Breach,” or at the least, the “Year of Raised Awareness of Breaches,” according to observers...
Kaspersky Lab: Half of companies underestimate DDoS
Half of Companies Put Themselves at Risk by Undervaluing DDoS Countermeasures
According to the research carried out by Kaspersky Lab and B2B International, only 50%...
New strategic project to implement cyber security platform for advanced applications
A new joint collaboration with CELARE, cyber security subsidiary of the BATM Advanced Communications, to implement cyber security platform for large enterprises based on...