Applications

Applications

data breach

More than 87GB of passwords and email addresses have been leaked and distributed in a folder dubbed "Collection #1" by hackers in a significant...

By 2021, there will be close to 13 connected devices per person in North America, according to Cisco’s estimate, and many consumers don’t have...

A unique mobile app designed to alert residents in Los Angeles County of an earthquake has been unveiled. The ShakeAlertLA app is designed...
data breaches

Data breaches compromised the personal information of millions of people around the globe in 2018. Data breaches are...
at battlefield

Two widely used American war-fighting mapping applications are marked vulnerable to cyberattacks by hostile actors. After a year...

A pilot project will digitally map New Jersey county schools and other public buildings as part of a...

In an attempt to target Islamist terrorism, pedophile networks and organized crime, several governments worldwide have been leading a policy forcing technology companies to...

The physical driver’s license is probably here to stay, but there are also other options that make identification and authentication more efficient, such as...

A technology originating in the US military sector is being tested in order to help save firefighters' lives. The ATAK - Android Team Awareness...
IOT security

Cloudflare, the internet infrastructure and networking giant, has been expanding its focus to include mobile privacy and the security of connected devices. On November 11,...
pilot

An off-the-shelf commercial helicopter was recently modified to fly itself in typical military missions, including supply runs, medevac, and reconnaissance. The long-term goal: Design...
cyber

The recent wave of ransomware attacks and preceding waves of cyber breaches could make it appear as though cyber criminals want their pay-off immediately....

A development by a US-based Israeli company was successfully applied by first responder teams during the recent Hurricane Michael events in Florida. The platform...
Processor

The first artificial intelligence processor that is a deep neural-network accelerator, delivering both high operational capability and high energy conversion efficiency for a full...
AI

New cooperation in the field of artificial intelligence (AI) is intended to result in advanced AI systems in unmanned surface vehicles (UUVs). The goal:...
terrorism

Asymmetric warfare, meaning conventional militaries combatting guerrilla and terrorist organizations, has long posed a challenge for states. New technology combining mobile platforms with the...

U.S. special operators and other troops have been using advanced war-fighting applications for hand-held devices that contain software weaknesses that render them vulnerable to...

Emotion and behavioral analysis through video content analytics can enhance public security. Scientifically developed tools now offer access to real-time analytics of the environment...
smart watch

A smart camera drone is now controlled from the wrist. The Skydio R1 is a fully autonomous drone that flies itself, combining artificial intelligence,...
AI-Human

U.S. defense intelligence is becoming increasingly concerned by a new technology rapidly emerging in the Chinese military - AI-human hybrid soldiers. Earlier this month, Intelligence...
underwater

New mini underwater drone, called the Gladius Mini, was recently announced. The Mini drone is a more attainable of the larger model, Glaudius Advanced...
Drone industry

Last Monday, October 15, iHLS’s AUS&R conference hosted a plethora of startups, organizations and individuals from the industry of Unmanned Systems. A unique addition...