The most advanced security system in the world
The Thales group is working on expanding the world's most advanced urban security system, referred to as...
Hacking into computer systems in order to gain remote access to the data they store requires first and foremost communication. There are various methods...
Earlier this month, two indictments were brought against two Vietnamese citizens residing in the Netherlands, for their respective roles in hacking email service providers...
Register to iHLS Israel Homeland Security
In this weekly Video report (March 24th 2015):
Turkey and ISIS – more than meets the eye
US Navy resting exoskeletons
ISIS’s...
Anonymous is perhaps the most notorious of all hacker groups. It is a decentralized online community of tens of thousands of anonymous 'hacktivists', who...
One of the world’s fastest growing technological fields is called ’Lawful Interception’, namely enforcing the law in cyberspace and gathering cyber intelligence, as well...
This unmanned helicopter is designed to feature protection from hacking.
Boeing is set to replace 100,000 lines of code on its Little Bird drone before...
Voice biometrics, fingerprints, iris scans, and other authentication options are beginning to replace passwords as a means to verify a user's identity and simplify...
Britain’s cyber unit for soldiers familiar with social media.
Documents leaked by Edward Snowden demonstrate that the NSA and its allies are preparing for future...
Organizations and business are increasingly turning towards cloud computing in order to streamline their operations and to enable their employees an easier and more...
Register to iHLS Israel Homeland Security
In this weekly Video report (March 17th 2015):
Converted Prop Guns Are Assassins’ Weapon of Choice
Robot Firefighter Puts Out Its...
The aviation industry is slow in responding to the threat posed by cyber criminality. This, whether it is posed by criminals, terrorists, nation states,...
A sophisticated spying campaign infected tens of thousands of computers worldwide with surveillance software, some embedded in hard drives, according to a report from...
Kaspersky Lab reveals latest cyberespionage tactics: complexity and modularity VS functionality.
Nation-state sponsored cyberespionage attacks are becoming more sophisticated, targeting carefully defined users with complex,...
North Korea is targeting infrastructure in the west by Cyber attacks.
According to various reports, North Korea has a team of roughly 3,000 cyber soldiers....
Have we completely given up on privacy?
When it comes to wireless charging, aka wireless power, the answer is probably ’yes’.
Though they have become indispensable...
The country’s air traffic control systems are vulnerable to hackers. This, according to a 42-page document entitled "Information Security: FAA Needs to Address Weaknesses...
We are all understandably ’hysterical’ about maintaining our privacy. There is no doubt this is a burning, crucial issue. Nevertheless, we ought to bear...