First iHLS Startups Accelerator Company Raises Funds
First capital raise by a company participating in the iHLS Startups Accelerator.
The Israeli startup company IMNA Solutions of entrepreneur Israel Haikin completed a...
Cyber Defense Is Essential To Assure Reliable Operation Of The Power...
Daniel Ehrenreich
Cyber defense solution for Distributed Management Systems – DMS used by electric utilities are operating without interfering with the control process and therefore...
Air-Gapped Computers Proven To Be Penetrable
Researchers from the Ben-Gurion University of the Negev (BGU) Cyber Security Research Center have discovered that virtually any cellphone infected with a malicious code can use GSM phone frequencies...
The Israeli Startups: Maximum Security in Minimum Effort
While organizations spend tens of billions of dollars every year to protect themselves from cyber attacks, the disturbing truth is that in most cases,...
The New Cryptography: Carbon Nanotubes
Carbon nanotubes - is there anything they can’t do? They’re strong, hard, loaded with unique electrical, thermal, and optical properties, and have been heralded...
Microsoft Admits: Windows 10 Spying Cannot Be Stopped
Windows 10 constantly calls home - a lot. Back in August, Ars Technica reported on a list of features in Microsoft Windows 10 that...
Israeli system intercepts cloud-stored data
Nowadays, everything is available at the palm of our hand. Nevertheless, these amazing capabilities, combined with our instinctive fear of the "Big Sister Syndrome"...
Video Analytics – Innovative Technology with Civilian and Security Uses
Video analytics is a technology that is used to identify, record, and analyze video streams via electronic media. Intelligent video analytics (IVA) helps end-users...
The Flaws In The System: Fingerprint Biometric Security
Maxim Rupp, a information security researcher for the german company Cure53, has managed to penetrate the bimetric security of the Taiwanese company Chiuy Technology....
Elbit acquires NICE Systems Cyber and Intelligence division
Elbit Systems Ltd. announced today that it has signed an agreement to acquire NICE Systems Cyber and Intelligence division for a total amount of...
Ariel University to Establish Training Center For Cyber Protectors
Ariel University is currently establishing a training center for cyber protectors based on technology by Cyberbit, a subsidiary of Elbit Systems. The center will be...
The private and public dangers of identity theft
Let us do a little experiment: Try to close your eyes and think of the number of people you know that don’t have an...
DARPA Cyber Grand Challenge’s Final Stage
Seven teams from around the country have earned the right to play in the final competition
of DARPA’s Cyber Grand Challenge (CGC), a first-of-its-kind tournament...
Home depot all but confirms doozy of a data breach
Home Depot may have experienced a massive security breach, which affected an estimated 110 million people.
Home Depot on Wednesday said it was investigating the possibility,...
DHS to rely on big data to protect critical infrastructure, networks
DHS officials responsible for protecting federal civilian networks and critical industries from cyberattacks have recently referred to this issue. They said they are going...
Israeli CTERA to Provide Private Cloud System to US MoD
Israeli startup firm CTERA Networks has won a tender to provide a private cloud system for file sharing to the US Ministry of Defense....
Perimeter Security Market Expected To Grow Significantly
A new global forecast predicts that the market for perimeter intrusion detection systems will grow from its $2.36bn last year to $3.37bn by 2020,...
Smart Watches Allow Hackers to Collect Users’ Data
They Look like the latest rage in jewelry and gadgetry, but like all computer devices, smart watches are vulnerable to hackers, say researchers at...
iHLS TV Future Forces For HLS
Future Forces For HLS
Future Forces 4 HLS
The upcoming conference for the HLS Future Forces is to be held on July 21st, bringing with...
Can ISIS Attack Our Infrastructure?
ISIS hackers have proven in the past their ability to break into different websites or the accounts of military and government personel. The US...
Israel’s BIG DATA ANALYSIS – Turning a mountain of information into...
The evolving capability to turn 'Big Data' into intelligence in timely and methodical processes enable governments, law enforcement and intelligence agencies to tap new...
Communicating under water – a revolutionary Israeli development
Dolphins communicate under water using sound waves that travel great distances. Now, human beings can also communicate under water, using a small device, attached...












































