Businesses are Harvesting our Biometric Data – Should We Be Worried?
In our highly digital age, biometric data is everywhere- from facial recognition on our phones to fingerprints unlocking our laptops.
Facial recognition is the most...
INNOFENSE Open Call For Dual-Use Technologies
INNOFENSE Call for startups – Dual-Use Technologies:
Following the immense success of the previous four cycles and their integration into the defense sector, iHLS invites...
Police Use Facial Recognition, Arrests Wrong Man
A police department in Detroit announced it will no longer be using facial recognition technology as the basis for arrest after wrongfully jailing the...
Face-Detecting Camera Can Recognize Drunk Drivers
Researchers from Edith Cowan University have developed a new computer tracking technology that uses camera footage to detect drunk drivers.
The scientists took data and...
Using AI to Conceal Confidential Information in Images
Researchers from Japan, China, and Finland created a system that replaces confidential parts of images with visually similar alternatives using GenAI. The researchers created...
The Danger of Wearable Devices and Harvested Personal Data
Wearable devices can collect continuous data about their wearer, even without their knowledge, from sleep patterns to heart fitness. This makes them increasingly prominent...
Revolutionary Contact Lenses Can Control Human-Machine Interaction
These smart contact lenses for human-machine interaction (HMI) track eye movements and can be used for health care and augmented reality (AR) applications. They...
Revolutionary High-Resolution Satellites Raise Privacy Concerns
Startup company Albedo is setting out to collect and provide the highest resolution optical and thermal imagery from the sky. The images will have...
A Cyberattack Every 39 Seconds – The Dangers of the ‘Remember...
The Remember Me checkbox promises online users a convenient, one-time log in, but using this feature has various security implications. Research released by the...
Hackers Can Use the Sound of Swiping to Steal Your Fingerprints
Nowadays, fingerprints are one of the most popular forms of personal identification, whether it’s unlocking your phone, approving online payments, access control, and many...
Can AI be Controlled? Expert Opinion
Some experts claim that there is no current evidence that AI can be controlled safely. And if so, should it even be developed?
AI Safety...
A Camera That Protects Your Face from Unauthorized Recognition
Facial recognition is technology that can identify or verify a person's identity based on their face, and can be used for various purposes, like unlocking smartphones,...
Smarter eco-cities, AI and AI of Things
Smarter eco-cities are intelligent urban environments that leverage cutting-edge Artificial Intelligence of Things (AIoT) solutions to address and mitigate environmental challenges.
The integration of AIoT...
Deep Fakes and Identity Decentralization
The growing trend of AI-generated content and deep fakes is making us lose our trust in the internet. Can identity decentralization be the solution?...
AI’s Impact on Cybersecurity
The impact of AI on cybersecurity is transforming the methods we use to secure digital platforms. It is both providing attackers with sophisticated new...
Call for Dual Use Technology Startups
Are you a startup company related to the security sector? Are you looking for recognition, international exposure, access to investors, and the ability to...
Human Rights Groups Oppose EU’s AI Act
The EU has proposed a law to regulate AI, but human rights activists warn that it won’t be enough to protect the public from...
iHLS Innovation Centre Calls for Dual-Use Security Startups
Are you a startup company related to the security sector? Are you looking for recognition, international exposure, access to investors, and the ability to...
Robot Dogs and AI Inspectors- The Future of Border Security
US Customs and Border Protection (CBP) recently began working with leading trade and travel technology company “Pangiam” to bring cutting-edge artificial intelligence, computer vision, and...
Charging Your Heart Monitor- Wireless Charger for Implants
This revolutionary prototype paves the way for wireless charging of implants.
Medical technology advancements have allowed us to implant bioelectronic devices like pacemakers into human...
Call for Startups – iHLS Innovation Centre
iHLS is an accelerator for the security sector and its various unique characteristics that provides startups with recognition, international exposure, access to investors and...
Password Reuse is Still a Major Threat
44% of users worldwide reportedly reuse their passwords on multiple accounts, putting tons of sensitive data at risk.
Dashlane is a password manager, and its...














































