Communications

Communications

The IDF’s Computer Service Directorate is currently developing goggles that are similar to "Google Glass". They are designed to be worn by combat fighters...

How to protect drones from Cyber attacks? This problem is at the heart of a worldwide effort. Engineering researchers from the University of Virginia (U....

Register to iHLS Israel Homeland Security In this weekly Video report (February 3rd 2015): Coalition against Isis: Too Little Too Late Kaspersky Technology Forecast for 2045 The US...

The number of missions unmanned systems are tasked with, as well as their diversity, is expanding each year. The roles they play include a...

China obtained more than 50 terabytes of data from U.S. defense and government networks, notably the Joint Strike Fighter’s stealth F-35 radar and engine...

The emergence of the cyber threat phenomenon is forcing organizations to change the way they think about security. One of these changes relates to...

Secured robots are becoming more commonplace in the framework of military service, as well as other forces, including HLS. Being able to send out...

It’s exactly the same as with car accidents. The problem with cyber security is enforcement. There are many law, lots of regulation, plenty of...

The cyberattacks of recent years have not only increased the demand for employees who understand the field of information assurance and cybersecurity, they have...

Robots Replacing People, Robots Serving People. About 30 years ago the personal computer began to make its way into regular use – and it went...

The U.S. is realizing step by step to what degree it is vulnerable to Cyber attacks. According to HomeLand Security News Wire, while most cybersecurity...

Kaspersky Lab improved its position as a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms. Kaspersky Lab has been named a “Leader” in the...

With the advent of technological development and the significant reduction in the cost of video end user devices, one would be hard pressed to...

The Israeli Defense Forces (IDF) is expanding it Command, Control, Computer, Communications and Intelligence (C4I) systems and communications systems. This - along with the...

2014 will be seen as the “Year of the Breach,” or at the least, the “Year of Raised Awareness of Breaches,” according to observers...

According to a report issued by Germany’s Federal Office for Information Security (Bundesamt für Sicherheit in der Informationstechnik - BSI), hackers had struck an...

In the course of unfolding criminal incidents, terrorist attack and other homeland security events, one of the primary factors disrupting communications between the various...

Developing computer platforms for frontline combat forces has unfolded as one of the most dominant fields of innovation over the past decade. Obviously, everything...

Half of Companies Put Themselves at Risk by Undervaluing DDoS Countermeasures According to the research carried out by Kaspersky Lab and B2B International, only 50%...

The second stage in the development of a new US spy satellite is nearing completion. The satellite, which is designed to gather visual intelligence,...

As complex operations become an increasingly frequent feature of contemporary cybercrime, Kaspersky Lab is launching an online service that brings together all the information...

Israel Defense Forces’ Electronic Warfare (EW) soldiers and officers are deployed along the nation’s borders. Among their missions: monitoring radical terrorist organizations in Syria,...