Home Technology Business Security

Business Security

First iHLS Startups Accelerator Company Raises Funds

0
First capital raise by a company participating in the iHLS Startups Accelerator. The Israeli startup company IMNA Solutions of entrepreneur Israel Haikin completed a...

Cyber ​​Defense Is Essential To Assure Reliable Operation Of The Power...

0
Daniel Ehrenreich Cyber defense solution for Distributed Management Systems – DMS used by electric utilities are operating without interfering with the control process and therefore...

Air-Gapped Computers Proven To Be Penetrable

0
Researchers from the  Ben-Gurion University of the Negev (BGU) Cyber Security Research Center have discovered that virtually any cellphone infected with a malicious code can use GSM phone frequencies...

The Israeli Startups: Maximum Security in Minimum Effort

0
While organizations spend tens of billions of dollars every year to protect themselves from cyber attacks, the disturbing truth is that in most cases,...

The New Cryptography: Carbon Nanotubes

0
Carbon nanotubes - is there anything they can’t do? They’re strong, hard, loaded with unique electrical, thermal, and optical properties, and have been heralded...

Microsoft Admits: Windows 10 Spying Cannot Be Stopped

0
 Windows 10 constantly calls home - a lot. Back in August, Ars Technica reported on a list of features in Microsoft Windows 10 that...

Israeli system intercepts cloud-stored data

0
Nowadays, everything is available at the palm of our hand. Nevertheless, these amazing capabilities, combined with our instinctive fear of the "Big Sister Syndrome"...

Video Analytics – Innovative Technology with Civilian and Security Uses

0
Video analytics is a technology that is used to identify, record, and analyze video streams via electronic media. Intelligent video analytics (IVA) helps end-users...

The Flaws In The System: Fingerprint Biometric Security

0
Maxim Rupp, a information security researcher for the german company Cure53, has managed to penetrate the bimetric security of the Taiwanese company Chiuy Technology....

Elbit acquires NICE Systems Cyber and Intelligence division

0
Elbit Systems Ltd. announced today that it has signed an agreement to acquire  NICE Systems Cyber and Intelligence division for a total amount of...

Ariel University to Establish Training Center For Cyber Protectors

0
Ariel University is currently establishing a training center for cyber protectors based on technology by Cyberbit, a subsidiary of Elbit Systems. The center will be...

The private and public dangers of identity theft

0
Let us do a little experiment: Try to close your eyes and think of the number of people you know that don’t have an...

DARPA Cyber Grand Challenge’s Final Stage

0
Seven teams from around the country have earned the right to play in the final competition of DARPA’s Cyber Grand Challenge (CGC), a first-of-its-kind tournament...

Home depot all but confirms doozy of a data breach

0
Home Depot may have experienced a massive security breach, which affected an estimated 110 million people. Home Depot on Wednesday said it was investigating the possibility,...

DHS to rely on big data to protect critical infrastructure, networks

0
DHS officials responsible for protecting federal civilian networks and critical industries from cyberattacks have recently referred to this issue. They said they are going...

Israeli CTERA to Provide Private Cloud System to US MoD

0
Israeli startup firm CTERA Networks has won a tender to provide a private cloud system for file sharing to the US Ministry of Defense....

Perimeter Security Market Expected To Grow Significantly

0
A new global forecast predicts that the market for perimeter intrusion detection systems will grow from its $2.36bn last year to $3.37bn by 2020,...

Smart Watches Allow Hackers to Collect Users’ Data

0
They Look like the latest rage in jewelry and gadgetry, but like all computer devices, smart watches are vulnerable to hackers, say researchers at...

iHLS TV Future Forces For HLS

0
Future Forces For HLS Future Forces 4 HLS   The upcoming conference for the HLS Future Forces is to be held on July 21st, bringing with...

Can ISIS Attack Our Infrastructure?

0
ISIS hackers have proven in the past their ability to break into different websites or the accounts of military and government personel. The US...

Israel’s BIG DATA ANALYSIS – Turning a mountain of information into...

0
The evolving capability to turn 'Big Data' into intelligence in timely and methodical processes enable governments, law enforcement and intelligence agencies to tap new...

Communicating under water – a revolutionary Israeli development

0
Dolphins communicate under water using sound waves that travel great distances. Now, human beings can also communicate under water, using a small device, attached...

Latest

3D-Printed Antennas Bend Without Breaking the Signal

0
A new type of 3D-printed antenna could transform how vehicles, drones, and wearable devices maintain wireless communication while in motion. Developed by researchers at...