Home Technology Business Security

Business Security

DHS Funds New Bitcoin Analytics Tool

0
US Department of Homeland Security Science and Technology Directorate (DHS S&T) is funding the development of a new Bitcoin analytics tool. As Bitcoin becomes...

First iHLS Startups Accelerator Company Raises Funds

0
First capital raise by a company participating in the iHLS Startups Accelerator. The Israeli startup company IMNA Solutions of entrepreneur Israel Haikin completed a...

Cyber ​​Defense Is Essential To Assure Reliable Operation Of The Power...

0
Daniel Ehrenreich Cyber defense solution for Distributed Management Systems – DMS used by electric utilities are operating without interfering with the control process and therefore...

Microsoft Admits: Windows 10 Spying Cannot Be Stopped

0
 Windows 10 constantly calls home - a lot. Back in August, Ars Technica reported on a list of features in Microsoft Windows 10 that...

Israeli system intercepts cloud-stored data

0
Nowadays, everything is available at the palm of our hand. Nevertheless, these amazing capabilities, combined with our instinctive fear of the "Big Sister Syndrome"...

Video Analytics – Innovative Technology with Civilian and Security Uses

0
Video analytics is a technology that is used to identify, record, and analyze video streams via electronic media. Intelligent video analytics (IVA) helps end-users...

The Flaws In The System: Fingerprint Biometric Security

0
Maxim Rupp, a information security researcher for the german company Cure53, has managed to penetrate the bimetric security of the Taiwanese company Chiuy Technology....

The Israeli Startups: Maximum Security in Minimum Effort

0
While organizations spend tens of billions of dollars every year to protect themselves from cyber attacks, the disturbing truth is that in most cases,...

The New Cryptography: Carbon Nanotubes

0
Carbon nanotubes - is there anything they can’t do? They’re strong, hard, loaded with unique electrical, thermal, and optical properties, and have been heralded...

DHS to rely on big data to protect critical infrastructure, networks

0
DHS officials responsible for protecting federal civilian networks and critical industries from cyberattacks have recently referred to this issue. They said they are going...

Israeli CTERA to Provide Private Cloud System to US MoD

0
Israeli startup firm CTERA Networks has won a tender to provide a private cloud system for file sharing to the US Ministry of Defense....

Perimeter Security Market Expected To Grow Significantly

0
A new global forecast predicts that the market for perimeter intrusion detection systems will grow from its $2.36bn last year to $3.37bn by 2020,...

Elbit acquires NICE Systems Cyber and Intelligence division

0
Elbit Systems Ltd. announced today that it has signed an agreement to acquire  NICE Systems Cyber and Intelligence division for a total amount of...

Ariel University to Establish Training Center For Cyber Protectors

0
Ariel University is currently establishing a training center for cyber protectors based on technology by Cyberbit, a subsidiary of Elbit Systems. The center will be...

The private and public dangers of identity theft

0
Let us do a little experiment: Try to close your eyes and think of the number of people you know that don’t have an...

DARPA Cyber Grand Challenge’s Final Stage

0
Seven teams from around the country have earned the right to play in the final competition of DARPA’s Cyber Grand Challenge (CGC), a first-of-its-kind tournament...

Home depot all but confirms doozy of a data breach

0
Home Depot may have experienced a massive security breach, which affected an estimated 110 million people. Home Depot on Wednesday said it was investigating the possibility,...

The Russian security market creates joint ventures

0
Rostec’s Security Technologies and ST Electronics from Singapore have signed a memorandum of understanding for cooperation in surveillance, integrated systems for security management, creation...

iHLS Moved Its Offices to State-Of-the-Art Complex In Ra’anana

0
iHLS has moved into its offices in Ra’anana this week. Such a move is certainly cause for celebration, especially when the new offices are...

Image-Based System Could Replace Multi-Factor Authentication

0
Researchers from the Centre for Security Communication and Network Research (CSCAN) at Plymouth University have developed a new system for secure, multi-level authentication that...

Harvard: US Can’t Ban Encryption

0
US can’t be successful in banning encryption as it is a global phenomenon, according to Harvard study. Despite over two years’ efforts by the...

Smart Watches Allow Hackers to Collect Users’ Data

0
They Look like the latest rage in jewelry and gadgetry, but like all computer devices, smart watches are vulnerable to hackers, say researchers at...

Latest

Image from video https://www.youtube.com/watch?v=M1Z5fCmJ1mE&t=1s&ab_channel=%D0%A1%D0%BB%D1%83%D0%B6%D0%B1%D0%B0%D0%B1%D0%B5%D0%B7%D0%BF%D0%B5%D0%BA%D0%B8%D0%A3%D0%BA%D1%80%D0%B0%D1%97%D0%BD%D0%B8

Ukraine’s Sea Baby Drones Just Got Deadlier

0
Ukraine improves its autonomous maritime capability by upgrading its “Sea Baby” multi-purpose unmanned surface vehicle (USV), which is now primarily focused on providing security...