Communications

Communications

The numerous delegations which will participate at the AUS&R Unmanned Systems and Robotics Conference on September 19 are interested first and foremost in doing...

France and Germany are insisting makers of encrypted messaging apps such as Telegram to help governments monitor communications among suspected extremists. Privacy advocates argue that...
video

CNN announced the launch of CNN Aerial Imagery and Reporting (CNN AIR). For the first time in the company’s history, CNN will have a...

First responders often have trouble communicating with each other in emergencies. They may use different types of radios, or they may be working in...

IPM, an IT company, and ForeScout Technologies Inc., an agentless and Internet of Things (IoT) cybersecurity company, announced that they have partnered to deliver...

A mission form the Israeli Public Security Ministry recently visited  an emergency center in the US in order to learn more about methods to...

A prototype of an Arctic-capable solar-powered drone for monitoring and telecommunications transmissions has successfully performed a 50-hour-long test-flight in Russia. Designers are preparing a...

At the recent Black Hat hacker conference in Las Vegas, cybersecurity researchers showed how drones can help secure wireless networks and bulster cybersecurity. David Latimer,...

The Israeli prison service decided to install cell phone jammers in two prisons that are used for holding Palestinian terrorists. Sources said today that this...

According to industry estimates, the US needs about 200,000 more workers to fill current cybersecurity roles. Globally, the gap is five times higher, an...

It seems that the eight-month US strategy to curtail the Islamic State terror group's success in cyberspace was not effective. U.S. officials admit it...

New sentiment analysis algorithms are able to monitor the social network Twitter in search of violent groups. The system analyses both the messages they...

There are still 4 billion people without Internet access in the world. As many as 1.6 billion of those unconnected people live in remote...

Mobile device security evolved rapidly over the last few years to address the new challenges and requirements of a mobile workforce. User authentication has...

By NEWS DESK A look into the future, that was the main focus of the Future Forces Conference in Rishon Le zion today. Organized by i-HLS,...

iHLS is on the process of founding a unique fund which will make investments in start-ups at the security technology and homeland security sector....

Taking advantage of their genuine capabilities in numerous technological aspects, Israel Aerospace Industries (IAI) have been developing various “tools” required for future security forces....

Companies have been using drones for a variety of purposes, including the inspection of industrial and civil infrastructure. Drones carry out missions such as...

In order to ensure that future first responder are better protected, connected, and fully aware, there must be more ruggedized protective equipment, reliable and...

Before they’ve even started, the Rio Olympics are already plagued with numerous issues jeopardising the security of visitors, players, and residents alike. From the...

Large organizations (companies or agencies with more than 200 iOS or Android mobile devices) are almost guaranteed to have at least one malware-infected device,...

Radio networks are a trusted technology, but it could become even better with the aid of tethered high antenna unmanned aerial vehicles (UAVs), UAS...

Latest