American Companies Vulnerable To Cyber Attacks

0
A group of hackers, supposedly originating in China, has comitted a cyber attack and managed to break into the American Airlines computer system, as...

The Flaws In The System: Fingerprint Biometric Security

0
Maxim Rupp, a information security researcher for the german company Cure53, has managed to penetrate the bimetric security of the Taiwanese company Chiuy Technology....

Is The Data You Transfer Safe?

0
Researchers from the College of Computing at the Georgia Institute of Technology were awarded $4.2 million from the Defense Advanced Research Projects Agency (DARPA)...

Economic and Perceptual Change: Forecasts For The Internet of Things

0
The Internet of Things (IoT) trend is becoming more central in our lives and surrounds us everywhere. In everyday life this means the smart...

Air-Gapped Computers Proven To Be Penetrable

0
Researchers from the  Ben-Gurion University of the Negev (BGU) Cyber Security Research Center have discovered that virtually any cellphone infected with a malicious code can use GSM phone frequencies...

The Russian security market creates joint ventures

0
Rostec’s Security Technologies and ST Electronics from Singapore have signed a memorandum of understanding for cooperation in surveillance, integrated systems for security management, creation...

DARPA Cyber Grand Challenge’s Final Stage

0
Seven teams from around the country have earned the right to play in the final competition of DARPA’s Cyber Grand Challenge (CGC), a first-of-its-kind tournament...

The private and public dangers of identity theft

0
Let us do a little experiment: Try to close your eyes and think of the number of people you know that don’t have an...

Falling Behind in the Cyber War

0
By Rachel Ehrenfeld Shutting down the background check system of the Office of Personnel Management employees will do little to prevent the abuse of millions...

iHLS TV Future Forces For HLS

0
Future Forces For HLS Future Forces 4 HLS   The upcoming conference for the HLS Future Forces is to be held on July 21st, bringing with...

IBM report for 2014: More cyber security breaches by employees

0
The IBM annual security survey for 2014 reveals that in that year the number of security related events that turned into full cyber attacks...

Living in the future – technology as urban infrastructure

0
Google announces the formation of Sidewalk Labs, whose goal is finding technological solutions to issues rising in urban living such as living expenses, transportation...

How is planting a spyware in the nuclear talk possible

0
Following reports on Israel’s involvment in planting a spy software in the hotels where the nuclear talks took place, I-HLS was given the professional...

City Surveillance Cameras double the force for authorities

0
As city centers became more crowded, so did crime become more common. In dealing with rising crime rates in its region, the Orlando City...

Can Israel keep its position as top UAS exporter ?

0
The UAV market is changing rapidly - on one, hand the demand grows, but at the same time, the "rules" are changing. Unmanned air systems...

Israeli counter terror expertise to Kenya

0
Ten Israeli security firms have offered to provide security consultancy, intelligence and counter-terrorism expertise to Kenyan government and private security following a series of...

iHLS TV Interview – Gil Friedman , RED WAVES

0
Interview with Gil Friedman from RED WAVES What is Red Waves' main contribution ? The role of  manpower in such a system The main challenges in the development process The challenges Rad Waves faces in...

Changing the way business is conducted

0
THE FREEDOM TO WORK ANY TIME AND ANYWHERE When we think about the work environment 30 years ago, it seems real changes have occurred since...

More than 1,000 Organizations Join IBM to Battle Cybercrime

0
Participants across 16 Industries, Including Five of World's Top 10 banks, Six of Top 10 retailers, Use IBM X-Force Exchange Threat Intelligence IBM (NYSE: IBM)...

Communicating under water – a revolutionary Israeli development

0
Dolphins communicate under water using sound waves that travel great distances. Now, human beings can also communicate under water, using a small device, attached...

Elbit acquires NICE Systems Cyber and Intelligence division

0
Elbit Systems Ltd. announced today that it has signed an agreement to acquire  NICE Systems Cyber and Intelligence division for a total amount of...

Homeland Security seeking off-the-shelf applications to manage biometric data

0
The Department of Homeland Security’ Office of Biometric Identity Management is currently looking for off-the-shelf applications that can more effectively store, match and analyze...

Latest

Gmail Data Leak: 183 Million Reasons to Rethink Your Password Security

0
A new trove of stolen login credentials has surfaced online, with 183 million email addresses and passwords added to the “Have I Been Pwned”...