Watch: New Sensor Will Detect Drone Pilots
A new sensor called RF-300 was released by Dedrone, that automatically locates drones and their pilots.
The current ubiquity of drones makes for a very...
Selfies to Provide Strictest Level Authentication
Cybercrime will become one of the greatest threats of our time, and this is particularly true for banks and insurers, who will increasingly look...
Authentication Technology to Deliver Safer Transactions
Due to the rise of mobile transactions, passwords are not sufficiently secure as a means of authentication, and additional modes are required for next-generation...
New Mapping Solution for Improved Security Surveillance
A new geospatial mapping interface allows users to better comprehend physical location information. The use of static facility floor plans overlaid directly onto the...
Fostering Cyber-Defenses of Financial Institutions
The US Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has been fostering the cyber-defenses of financial institutions. This research-and-development effort will...
Public Sector Trying to Defend Itself in Cyber Environment
Distributed Denial of Service (DDoS) cyber attacks are a serious problem threatening companies and organizations across the globe. While weaponized data attacks on the...
Situational Awareness for Business Firms in War Zones
A new security system which brings together up-to-the-minute information on key security developments in Iraq and the implications for companies operating in the region...
Cyberthreats to UK Businesses – Industry Government Collaboration is Needed
The annual assessment of the biggest cyberthreats to U.K. businesses has been published recently, after being produced jointly for the first time by the...
Energy Companies Attacked by Powerful Malware
The version of destructive computer virus Shamoon was being employed to attack computers in Saudi Arabia and other regions in mid-November, as revealed by...
Video Analytics – Innovative Technology with Civilian and Security Uses
Video analytics is a technology that is used to identify, record, and analyze video streams via electronic media. Intelligent video analytics (IVA) helps end-users...
Towards the IoT Conference
The Internet of Things (IoT) is an innovative field developing rapidly. In daily life it is about connecting computers and various smart devices such...
Call For Proposals For Startups In Defense and HLS Fields
iHLS, the global media leader in security technology, is inviting entrepreneurships in this field to join the second cycle of the world first accelerator...
New Video Analytics Technlogy for Business and Security
A new video analytics technology for both security and business, the sMart Data Warehouse, was showcased by Netavis Software at the Security Essen 2016...
Financial Cyber Attacks on the Rise
SWIFT, the global financial messaging system, announced that a few of it's member banks have been attacked by hackers. SWIFT pressured them to comply...
New Micro Chip Security Solution
With the outsourcing of microchip design and fabrication a worldwide, $350 billion business, bad actors along the supply chain have many opportunities to install...
First iHLS Startups Accelerator Company Raises Funds
First capital raise by a company participating in the iHLS Startups Accelerator.
The Israeli startup company IMNA Solutions of entrepreneur Israel Haikin completed a...
DHS Funds New Bitcoin Analytics Tool
US Department of Homeland Security Science and Technology Directorate (DHS S&T) is funding the development of a new Bitcoin analytics tool.
As Bitcoin becomes...
Hacking Risk At Rio Olympics, Warn US Officials
Before they’ve even started, the Rio Olympics are already plagued with numerous issues jeopardising the security of visitors, players, and residents alike. From the...
Every Single Organization Has At Least 1 Infected Mobile Device
Large organizations (companies or agencies with more than 200 iOS or Android mobile devices) are almost guaranteed to have at least one malware-infected device,...
US Air Force Loses Investigation Database
We have recently written about the mind staggering fact that the Pentagon still uses floppy disks to perform nuclear missions. This new story is...
How To Protect Your Cloud
Cloud computing has brought about a new age of convenience. You can store massive amounts of data, share it easily, and most technical aspects...
US, Israel to Sign Agreement to Cooperate in Cyber Defense
Israel and the United States have recently signed a cyber defense declaration calling for real-time operational connectivity through respective Computer Emergency Response Teams (CERTS)...