Communications

Communications

security

Partial similarities between fingerprints are common enough to make fingerprint-based security systems in mobile phones and other electronic devices unreliable. This was discovered by...
communication security

Securing telephone communication is on the agenda of the US Department of Homeland Security’s (DHS) Science and Technology Directorate (S&T). The organization is “working to...
UAV

With more technologically advanced UAVs flying than ever, military leaders are starting to rethink the way they look at air superiority. The case is...
cell phone surveillance

The Royal Canadian Mounted Police (RCMP) for the first time is publicly confirming it uses cell phone surveillance devices in investigations across Canada. RCMP...

  An unmanned ground vehicle will be equipped with an advanced wireless communication and connectivity network. Rajant announced recently that Sharp Electronics Corporation (SEC) will...
first responders

A new unmanned aerial vehicle (UAV) will serve as a cell tower for the benefit of users such as first responders. Fenix Group has...
drone-base EW

A Russian military drone-based electronic-warfare system is aiming to hi-jack phones. The Leer-3 RB-341V combines jammers and UAVs in order to disable cellular networks,...
first responders

A nationwide broadband network for public safety communication between first responders will be built across the USA. Communications giant, AT&T, has been hired by...
rtls

One way today's enterprise organizations, cities, and campuses tackle the pressures of being prepared at any moment is by implementing solutions that utilize real-time...
mega contract

Israel Aerospace Industries (IAI) has been awarded contracts in India totaling almost $2.0 billion. In a mega-contract worth over $1.6 billion, considered to be...
future forces

What technology will reshape the future battlefield? How will technological innovations change the way first responders operate during law enforcement and rescue missions? The Future...
terrorist content

The London Westminster attack perpetrated by Khalid Masood must be a "wake-up call" for technology giants over their efforts to tackle terrorist content online,...
startup festival

  Many people are present this morning at the Startup Festival and Startup Live Competition organized by iHLS for the second year. The first 10 startups...
iot security

Internet of Things - IoT security breaches have been dominating headlines lately. Even if you personally don’t suffer consequences of the mediocre security of...
startups

The establishment of a new company involves heavy expenses on office equipment. At the first stage, a startup will be based within the framework...
cell phone

A technology that extracts data from a cell phone can make criminal investigations more efficient. The forensic flash device reader allows officers to acquire data...
robots communication

A new technology could protect robots communication networks from malicious hackers. Researchers from MIT’s Computer Science and Artificial Intelligence Laboratory and their colleagues present...
remote identification

The US regulation regarding UAVs will have to overcome an important technical hurdle  - remote identification - before the unmanned aerial vehicle industry can...
CIA

New apps enable law enforcement, first responders and security teams to communicate with other team members in a reliable and secure network using a...
driverless cars

Britain will fund research into robotics, 5G (5th generation mobile networks) and driverless cars. This was included in the latest budget announced by Philip...
surveillance

The new privacy policy announced by Facebook and Instagram bans developers from using their data for surveillance. Following revelations last year that police departments...
IT identity solution

HID Global, a global company with expertise in identity solutions, recently announced that it won the award for “Best Identity Management Platform” in the...

Latest