situational awareness

Situational Awareness for Business Firms in War Zones

0
  A new security system which brings together up-to-the-minute information on key security developments in Iraq and the implications for companies operating in the region...

Heartbeat Based Biometric Identification

0
Canadian company Nymi has managed to develop a unique, first of its kind, technological solution: Paying with a wrist-bracelet that can detect the heartbeat...

DARPA Looking For Blockchain-based Communications

0
The US Defence Advanced Research Projects Agency (DARPA) is looking at ways it can utilise blockchain technology - the engine behind the Bitcoin cryptocurrency...

More than 1,000 Organizations Join IBM to Battle Cybercrime

0
Participants across 16 Industries, Including Five of World's Top 10 banks, Six of Top 10 retailers, Use IBM X-Force Exchange Threat Intelligence IBM (NYSE: IBM)...

Voice Biometrics Can Be Defeated

0
Voice biometrics is based on the assumption that each person has a unique voice that depends not only on his or her physiological features...

Four DARPA projects that could change the world

0
Forty years ago, a group of researchers with military money set out to test the wacky idea of making computers talk to one another...

Of Cyber And Regulation

0
Avi Yariv At the Cyber and Regulation conference, which took place in the University of Haifa last week, special attention was given to the regulatory...

Changing the way business is conducted

0
THE FREEDOM TO WORK ANY TIME AND ANYWHERE When we think about the work environment 30 years ago, it seems real changes have occurred since...

New Material to Protect from Electronic Surveillance

0
Conductive Composites, a small Utah company, has developed an extremely thin, flexible material, to shield from electronic emissions and electromagnetic pulses. Beyond traditional network-penetration, novel...

Ransomware Rises – The Growing Threat To International Security

0
Over the last few years a new menace has emerged: ransomware. Hackers now routinely take control and hold hostage the computer systems of businesses,...

Next Generation of Cyber Security: Behavior Based Security System

0
Security leaks have reached an all-time high these days, and are causing great concern among financial advisors, business owners and consumers. Nowadays there are...

Nearly Half Of Enterprises To Deploy IoT By End Of 2016

0
Nearly half of enterprises are set to deploy Internet of Things (IoT) by the end of 2016, according to findings from 451 Research, an...

iHLS TV Interview – Gil Friedman , RED WAVES

0
Interview with Gil Friedman from RED WAVES What is Red Waves' main contribution ? The role of  manpower in such a system The main challenges in the development process The challenges Rad Waves faces in...

Your (Not So) Private Browsing With Microsoft Edge

0
This last summer Microsoft’s Internet Explorer was superseded by the shiny and new Microsoft Edge browser, and everyone rejoiced. The aging IE, fraught with...
authentication technology

Authentication Technology to Deliver Safer Transactions

0
Due to the rise of mobile transactions, passwords are not sufficiently secure as a means of authentication, and additional modes are required for next-generation...

China And US To Stop Cyber Attacks

0
The US, though used to leading in the military and intelligence fronts, has found itself in the past year at a disadvantage when it...

Economic and Perceptual Change: Forecasts For The Internet of Things

0
The Internet of Things (IoT) trend is becoming more central in our lives and surrounds us everywhere. In everyday life this means the smart...

Are There Solutions For Continuous Cyber Attacks?

0
The last few weeks saw a number of financial companies become a target for cyber attacks and attempted blackmail using threats. The companies attacked...

Illusive’s Deception Ensnares Hackers

0
In the field of cyber security, everyone has one main goal: staying ahead of the game. The hackers are constantly seeking out new avenues...

Energy Companies Attacked by Powerful Malware

0
The version of destructive computer virus Shamoon was being employed to attack computers in Saudi Arabia and other regions in mid-November, as revealed by...

American Companies Vulnerable To Cyber Attacks

0
A group of hackers, supposedly originating in China, has comitted a cyber attack and managed to break into the American Airlines computer system, as...

IBM report for 2014: More cyber security breaches by employees

0
The IBM annual security survey for 2014 reveals that in that year the number of security related events that turned into full cyber attacks...

Latest

Metal That Behaves Like a Gel Could Redefine High-Temperature Systems

0
A research team at Texas A&M University has developed the world’s first metallic gel — a new class of material that combines the strength...