American Companies Vulnerable To Cyber Attacks
                A group of hackers, supposedly originating in China, has comitted a cyber attack and managed to break into the American Airlines computer system, as...            
            
        The Flaws In The System: Fingerprint Biometric Security
                Maxim Rupp, a information security researcher for the german company Cure53, has managed to penetrate the bimetric security of the Taiwanese company Chiuy Technology....            
            
        Is The Data You Transfer Safe?
                Researchers from the College of Computing at the Georgia Institute of Technology were awarded $4.2 million from the Defense Advanced Research Projects Agency (DARPA)...            
            
        Economic and Perceptual Change: Forecasts For The Internet of Things
                The Internet of Things (IoT) trend is becoming more central in our lives and surrounds us everywhere. In everyday life this means the smart...            
            
        Air-Gapped Computers Proven To Be Penetrable
                Researchers from the  Ben-Gurion University of the Negev (BGU) Cyber Security Research Center have discovered that virtually any cellphone infected with a malicious code can use GSM phone frequencies...            
            
        The Russian security market creates joint ventures
                
Rostec’s Security Technologies and ST Electronics from Singapore have signed a memorandum of understanding for cooperation in surveillance, integrated systems for security management, creation...            
            
        DARPA Cyber Grand Challenge’s Final Stage
                
Seven teams from around the country have earned the right to play in the final competition
of DARPA’s Cyber Grand Challenge (CGC), a first-of-its-kind tournament...            
            
        The private and public dangers of identity theft
                Let us do a little experiment: Try to close your eyes and think of the number of people you know that don’t have an...            
            
        Falling Behind in the Cyber War
                By Rachel Ehrenfeld
Shutting down the background check system of the Office of Personnel Management employees will do little to prevent the abuse of millions...            
            
        iHLS TV Future Forces For HLS
                Future Forces For HLS
Future Forces 4 HLS  
The upcoming conference for the HLS Future Forces is to be held on July 21st, bringing with...            
            
        IBM report for 2014: More cyber security breaches by employees
                The IBM annual security survey for 2014 reveals that in that year the number of security related events that turned into full cyber attacks...            
            
        Living in the future – technology as urban infrastructure
                Google announces the formation of Sidewalk Labs, whose goal is finding technological solutions to issues rising in urban living such as living expenses, transportation...            
            
        How is planting a spyware in the nuclear talk possible
                Following reports on Israel’s involvment in planting a spy software in the hotels where the nuclear talks took place, I-HLS was given the professional...            
            
        City Surveillance Cameras double the force for authorities
                As city centers became more crowded, so did crime become more common. In dealing with rising crime rates in its region, the Orlando City...            
            
        Can Israel keep its position as top UAS exporter ?
                The UAV market is changing rapidly - on one, hand the demand grows, but at the same time, the "rules" are changing.
Unmanned air systems...            
            
        Israeli counter terror expertise to Kenya
                Ten Israeli security firms have offered to provide security consultancy, intelligence and counter-terrorism expertise to Kenyan government and private security following a series of...            
            
        iHLS TV Interview – Gil Friedman , RED WAVES
                
Interview with Gil Friedman from RED WAVES
	What is Red Waves' main contribution ?
	The role of  manpower in such a system
	The main challenges in the development process
	The challenges Rad Waves faces in...            
            
        Changing the way business is conducted
                THE FREEDOM TO WORK ANY TIME AND ANYWHERE
When we think about the work environment 30 years ago, it seems real changes have occurred since...            
            
        More than 1,000 Organizations Join IBM to Battle Cybercrime
                Participants across 16 Industries, Including Five of World's Top 10 banks, Six of Top 10 retailers, Use IBM X-Force Exchange Threat Intelligence
IBM (NYSE: IBM)...            
            
        Communicating under water – a revolutionary Israeli development
                Dolphins communicate under water using sound waves that travel great distances. Now, human beings can also communicate under water, using a small device, attached...            
            
        Elbit acquires NICE Systems Cyber and Intelligence division
                Elbit Systems Ltd. announced today that it has signed an agreement to acquire  NICE Systems Cyber and Intelligence division for a total amount of...            
            
        Homeland Security seeking off-the-shelf applications to manage biometric data
                The Department of Homeland Security’ Office of Biometric Identity Management is currently looking for off-the-shelf applications that can more effectively store, match and analyze...            
            
        
 
            
