Communications

Communications

The most advanced security system in the world The Thales group is working on expanding the world's most advanced urban security system, referred to as...
video

Hacking into computer systems in order to gain remote access to the data they store requires first and foremost communication. There are various methods...

Earlier this month, two indictments were brought against two Vietnamese citizens residing in the Netherlands, for their respective roles in hacking email service providers...

So far, the rising budgets on Data Security do not seem to inspire greater confidence in the results. A new report looking at how organizations...
video

Register to iHLS Israel Homeland Security In this weekly Video report (March 24th 2015): Turkey and ISIS – more than meets the eye US Navy resting exoskeletons ISIS’s...

Anonymous is perhaps the most notorious of all hacker groups. It is a decentralized online community of tens of thousands of anonymous 'hacktivists', who...

One of the world’s fastest growing technological fields is called ’Lawful Interception’, namely enforcing the law in cyberspace and gathering cyber intelligence, as well...

Increasing cyber threats worldwide have been posing a menace to numerous sectors. It seems the global perplexion knowns no bounds when it comes to...

The hacking group known as Lizard Squad has been making quite a nuisance of itself, associating the hackers with two high profile events. Lizrad...

This unmanned helicopter is designed to feature protection from hacking. Boeing is set to replace 100,000 lines of code on its Little Bird drone before...

Voice biometrics, fingerprints, iris scans, and other authentication options are beginning to replace passwords as a means to verify a user's identity and simplify...

Britain’s cyber unit for soldiers familiar with social media. Documents leaked by Edward Snowden demonstrate that the NSA and its allies are preparing for future...

Organizations and business are increasingly turning towards cloud computing in order to streamline their operations and to enable their employees an easier and more...
video

Register to iHLS Israel Homeland Security In this weekly Video report (March 17th 2015): Converted Prop Guns Are Assassins’ Weapon of Choice Robot Firefighter Puts Out Its...

The aviation industry is slow in responding to the threat posed by cyber criminality. This, whether it is posed by criminals, terrorists, nation states,...

A sophisticated spying campaign infected tens of thousands of computers worldwide with surveillance software, some embedded in hard drives, according to a report from...

Kaspersky Lab reveals latest cyberespionage tactics: complexity and modularity VS functionality. Nation-state sponsored cyberespionage attacks are becoming more sophisticated, targeting carefully defined users with complex,...

North Korea is targeting infrastructure in the west by Cyber attacks. According to various reports, North Korea has a team of roughly 3,000 cyber soldiers....

Have we completely given up on privacy? When it comes to wireless charging, aka wireless power, the answer is probably ’yes’. Though they have become indispensable...

The country’s air traffic control systems are vulnerable to hackers. This, according to a 42-page document entitled "Information Security: FAA Needs to Address Weaknesses...

No less than six new malware are born each second. This, according to a recent report on various cyber threats. The report focuses on the...

We are all understandably ’hysterical’ about maintaining our privacy. There is no doubt this is a burning, crucial issue. Nevertheless, we ought to bear...

Latest