Cyber

Cyber

Blockchain technology is gradually transcending its use in the cryptocurrency sector and is proving effective for logistics management. The decentralized open ledger system can...

Amnesty Israel movement reacts to the State’s announcement in mid-March regarding the employment of advanced digital monitoring tools used for counterterrorism activities to track...

A call for proposals published by Israel National Cyber Directorate invites companies to take part in the Marketplace - an emergency meeting arena which...

The Zoom video conference app has seen a huge rise in downloads since quarantines were imposed around the world. Public Zoom hangouts and working...
5g communications

5G wireless technology is anticipated to unleash unprecedented levels of connectivity between millions of new internet of things devices. It is expected to provide...
organized crime

A man was recently charged in a UK court with making false ‘medical kits’ alleged to treat Covid-19. The kits allegedly contained harmful chemicals....

By Or Shalom Providing cyber defense to financial infrastructure and assets is complex, as these systems and infrastructures are usually situated in the public space....
voice test for corona

The National Emergency Team led by the Director of the DDR&D, Brig. Gen. (Res.), Dr. Dani Gold, continues to identify and develop advanced technological solutions...
military coping with coronavirus

In recent days, there has been a substantial increase in the involvement of world military forces and defense organizations in the states’ coping with...

With the global efforts to block the spread of the Coronavirus, people are working from home at an unprecedented scale. Alongside challenges of network...
cyber attack

Isn’t the coronavirus crisis off-limits when it comes to cyberattacks? Apparently not. The US Health and Human Services Department suffered a cyber-attack on its...

Quantum computers are expected to supply the most powerful computing capabilities ever. Advances in quantum computing are finally beginning to reach commercial applications, such...

In an unprecedented move in Israel, cellular monitoring of potential coronavirus patients will be implemented in order to assure that they are not breaking...

The State of Israel is making all the efforts to block the spread of the coronavirus. Now, iHLS is addressing the technology and startup...
mobile cybersecurity

The mobile devices we use for nearly every aspect of our lives are vulnerable to attackers.  In fact, 88% of organizations worldwide experienced targeted phishing...

Industrial IoT (IIoT) systems - industrial devices connected to the internet or local networks - collect and transmit real-time data. They are part of...

Networked devices and infrastructure are becoming increasingly complex, making it nearly impossible to verify an entire system, and new attacks are continuously being developed. To...
cybersecurity

RSA 2020 annual information security conference held in San Francisco during the last week of February focused on the Human Element in cybersecurity. Rohit...
5G technology

As more autonomy moves to the edge of the internet of things, it’s going to have to be supported by more bandwidth. In 2019,...

Cutting-edge AI technologies will be showcased at the iHLS InnoTech Expo Tel Aviv in November 2020. The application of artificial intelligence technology can achieve incredible...

Many people use simple and weak passwords for their devices, making it easy for intruders to hack their phones, computers, emails etc. Many employees...
cybersecurity

During the last few weeks, the media headlines kept us informed about the triple data leak from the Elector application - an app developed...

iHLS Events