authentication

Selfies to Provide Strictest Level Authentication

0
Cybercrime will become one of the greatest threats of our time, and this is particularly true for banks and insurers, who will increasingly look...
authentication technology

Authentication Technology to Deliver Safer Transactions

0
Due to the rise of mobile transactions, passwords are not sufficiently secure as a means of authentication, and additional modes are required for next-generation...
mapping

New Mapping Solution for Improved Security Surveillance

0
A new geospatial mapping interface allows users to better comprehend physical location information. The use of static facility floor plans overlaid directly onto the...
cyber-defenses

Fostering Cyber-Defenses of Financial Institutions

0
The US Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has been fostering the cyber-defenses of financial institutions. This research-and-development effort will...
cyber

Public Sector Trying to Defend Itself in Cyber Environment

0
Distributed Denial of Service (DDoS) cyber attacks are a serious problem threatening companies and organizations across the globe. While weaponized data attacks on the...
situational awareness

Situational Awareness for Business Firms in War Zones

0
  A new security system which brings together up-to-the-minute information on key security developments in Iraq and the implications for companies operating in the region...
cyberthreats

Cyberthreats to UK Businesses – Industry Government Collaboration is Needed

0
The annual assessment of the biggest cyberthreats to U.K. businesses has been published recently, after being produced jointly for the first time by the...

Energy Companies Attacked by Powerful Malware

0
The version of destructive computer virus Shamoon was being employed to attack computers in Saudi Arabia and other regions in mid-November, as revealed by...

Video Analytics – Innovative Technology with Civilian and Security Uses

0
Video analytics is a technology that is used to identify, record, and analyze video streams via electronic media. Intelligent video analytics (IVA) helps end-users...

Towards the IoT Conference

0
  The Internet of Things (IoT) is an innovative field developing rapidly. In daily life it is about connecting computers and various smart devices such...

Call For Proposals For Startups In Defense and HLS Fields

0
  iHLS, the global media leader in security technology, is inviting entrepreneurships in this field to join the second cycle of the world first accelerator...

New Video Analytics Technlogy for Business and Security

0
A new video analytics technology for both security and business, the sMart Data Warehouse, was showcased by Netavis Software at the Security Essen 2016...

Financial Cyber Attacks on the Rise

0
SWIFT, the global financial messaging system, announced that a few of it's member banks have been attacked by hackers. SWIFT pressured them to comply...

New Micro Chip Security Solution

0
With the outsourcing of microchip design and fabrication a worldwide, $350 billion business, bad actors along the supply chain have many opportunities to install...

First iHLS Startups Accelerator Company Raises Funds

0
First capital raise by a company participating in the iHLS Startups Accelerator. The Israeli startup company IMNA Solutions of entrepreneur Israel Haikin completed a...

DHS Funds New Bitcoin Analytics Tool

0
US Department of Homeland Security Science and Technology Directorate (DHS S&T) is funding the development of a new Bitcoin analytics tool. As Bitcoin becomes...

Hacking Risk At Rio Olympics, Warn US Officials

0
Before they’ve even started, the Rio Olympics are already plagued with numerous issues jeopardising the security of visitors, players, and residents alike. From the...

Every Single Organization Has At Least 1 Infected Mobile Device

0
Large organizations (companies or agencies with more than 200 iOS or Android mobile devices) are almost guaranteed to have at least one malware-infected device,...

US Air Force Loses Investigation Database

0
We have recently written about the mind staggering fact that the Pentagon still uses floppy disks to perform nuclear missions. This new story is...

How To Protect Your Cloud

0
Cloud computing has brought about a new age of convenience. You can store massive amounts of data, share it easily, and most technical aspects...

US, Israel to Sign Agreement to Cooperate in Cyber Defense

0
Israel and the United States have recently signed a cyber defense declaration calling for real-time operational connectivity through respective Computer Emergency Response Teams (CERTS)...

Israeli CTERA to Provide Private Cloud System to US MoD

0
Israeli startup firm CTERA Networks has won a tender to provide a private cloud system for file sharing to the US Ministry of Defense....

Latest

image provided by pixabay

These Wearable Fibers can Generate and Store Energy

0
Researchers from the Johns Hopkins Applied Physics Laboratory (APL) have developed new battery and solar fibers for wearable electronics with an ambition to develop...