Situational Awareness for Business Firms in War Zones
                 
A new security system which brings together up-to-the-minute information on key security developments in Iraq and the implications for companies operating in the region...            
            
        Heartbeat Based Biometric Identification
                Canadian company Nymi has managed to develop a unique, first of its kind, technological solution: Paying with a wrist-bracelet that can detect the heartbeat...            
            
        DARPA Looking For Blockchain-based Communications
                The US Defence Advanced Research Projects Agency (DARPA) is looking at ways it can utilise blockchain technology - the engine behind the Bitcoin cryptocurrency...            
            
        More than 1,000 Organizations Join IBM to Battle Cybercrime
                Participants across 16 Industries, Including Five of World's Top 10 banks, Six of Top 10 retailers, Use IBM X-Force Exchange Threat Intelligence
IBM (NYSE: IBM)...            
            
        Voice Biometrics Can Be Defeated
                Voice biometrics is based on the assumption that each person has a unique voice that depends not only on his or her physiological features...            
            
        Four DARPA projects that could change the world
                Forty years ago, a group of researchers with military money set out to test the wacky idea of making computers talk to one another...            
            
        Of Cyber And Regulation
                Avi Yariv
At the Cyber and Regulation conference, which took place in the University of Haifa last week, special attention was given to the regulatory...            
            
        Changing the way business is conducted
                THE FREEDOM TO WORK ANY TIME AND ANYWHERE
When we think about the work environment 30 years ago, it seems real changes have occurred since...            
            
        New Material to Protect from Electronic Surveillance
                Conductive Composites, a small Utah company, has developed an extremely thin, flexible material, to shield from electronic emissions and electromagnetic pulses.
Beyond traditional network-penetration, novel...            
            
        Ransomware Rises – The Growing Threat To International Security
                Over the last few years a new menace has emerged: ransomware. Hackers now routinely take control and hold hostage the computer systems of businesses,...            
            
        Next Generation of Cyber Security: Behavior Based Security System
                Security leaks have reached an all-time high these days, and are causing great concern among financial advisors, business owners and consumers. Nowadays there are...            
            
        Nearly Half Of Enterprises To Deploy IoT By End Of 2016
                Nearly half of enterprises are set to deploy Internet of Things (IoT) by the end of 2016, according to findings from 451 Research, an...            
            
        iHLS TV Interview – Gil Friedman , RED WAVES
                
Interview with Gil Friedman from RED WAVES
	What is Red Waves' main contribution ?
	The role of  manpower in such a system
	The main challenges in the development process
	The challenges Rad Waves faces in...            
            
        Your (Not So) Private Browsing With Microsoft Edge
                This last summer Microsoft’s Internet Explorer was superseded by the shiny and new Microsoft Edge browser, and everyone rejoiced. The aging IE, fraught with...            
            
        Authentication Technology to Deliver Safer Transactions
                Due to the rise of mobile transactions, passwords are not sufficiently secure as a means of authentication, and additional modes are required for next-generation...            
            
        China And US To Stop Cyber Attacks
                The US, though used to leading in the military and intelligence fronts, has found itself in the past year at a disadvantage when it...            
            
        Economic and Perceptual Change: Forecasts For The Internet of Things
                The Internet of Things (IoT) trend is becoming more central in our lives and surrounds us everywhere. In everyday life this means the smart...            
            
        Are There Solutions For Continuous Cyber Attacks?
                The last few weeks saw a number of financial companies become a target for cyber attacks and attempted blackmail using threats. The companies attacked...            
            
        Illusive’s Deception Ensnares Hackers
                In the field of cyber security, everyone has one main goal: staying ahead of the game. The hackers are constantly seeking out new avenues...            
            
        Energy Companies Attacked by Powerful Malware
                The version of destructive computer virus Shamoon was being employed to attack computers in Saudi Arabia and other regions in mid-November, as revealed by...            
            
        American Companies Vulnerable To Cyber Attacks
                A group of hackers, supposedly originating in China, has comitted a cyber attack and managed to break into the American Airlines computer system, as...            
            
        IBM report for 2014: More cyber security breaches by employees
                The IBM annual security survey for 2014 reveals that in that year the number of security related events that turned into full cyber attacks...            
            
        
 
            
