Authentication

Authentication

IoT. image by pixabay

The manufacturers of connected systems, interested in defending their code and data in the Internet of Things realm will now have another channel to...
mobile-phones. image by pixabay

The Israeli Minister of Communications Yoaz Hendel has announced that the Ministry of Communications has begun its' efforts to put an end to the...
Cyber security. image by pixabay

In the 21st century, technology has become an integral part of our lives. We are constantly exposed to it on a daily basis, and...
eye tracking technology. image by pixabay

Only this year Apple was granted a patent for one of their acquired eye-tracking patents from SMI SensoMotoric Instruments GmbH. The company's top engineer,...
biometric. image by pixabay

Advancing wearable technology for user authentication - that’s the focus of a new mission of the U.S. Army’s tactical network modernization team. “Try to...
Top Secret. image by pixabay

With so many employees now working remotely, the cyber attack surface has been increasingly expanding. Officials at the US Defense Information Systems Agency say...
image by pixabay

A report by the Public Utilities Regulatory Authority found that phishing attacks remained the largest source of successful cyberattacks and pose a significant risk...
security. image by pixabay

With the world of security constantly changing and hackers adapting to those changes, nothing is perfect in terms of security. While two-factor authentication is...
Virtual Reality. image by pixabay

Voice command features on virtual reality headsets could lead to major privacy leakages, known as “eavesdropping attacks.” Built-in motion sensors within common VR headsets...
cyber. image by pixabay

Deepfakes, an AI-based technology to create false content, have become easier than ever to make. The FBI suspects Russian and Chinese actors are using...
IoT. image by pixabay

Blockchain is the new solution for Internet of Things (IoT) interoperability. IoT is all the sensors and smart devices that use the internet to...
Keyboard. image by pixabay

Even in such a developed and still advancing digital world like ours, we still don’t seem to be able to ditch passwords. Undenounced to...
Deep web. image by pixabay

A recent report has shown that many social media databases are currently being sold on Breach Forums, a popular hacking forum on the Dark...

Protecting healthcare organizations from cyber-attacks can be a matter of life and death. Healthcare organizations are vulnerable to various cybersecurity threats demanding from them...
Photo illus. by Pixabay cyber-security

In a move aimed at reducing the risk of cyberattacks against US government infrastructure, the White House instructed federal agencies to beef up cybersecurity....
INNOTECH

In the quest for higher levels of security, it is worthwhile learning about the game-changing developments that will shape the security landscape in 2022. According...

Gait recognition could be a viable technique for protecting individuals and their data. Smartphone device users repeatedly need to authenticate both their smartphones and...
Photo illustration Wikimedia US Marines

Increasing new security concerns worldwide have accelerated the development of a wide range of innovative solutions in the fields of first response, air defense,...

5G systems provide accelerated communications, but they can be a target to cyber-attacks if they are not properly secured.  Major US federal agencies have released...

iHLS is proud to present INNOTECH 2021 - the International Cyber, Homeland Security Technologies and Innovation event. A large two-day exhibition with national pavilions...
photo illust Pixabay

125,698,496 people were pawned in the LinkedIn Scraped Data data breach during the first half of 2021, according to haveibeenpwned.com website. Attackers scraped data...

Startup! This is your opportunity to get a $50K grant. If you are developing a groundbreaking technology we invite you to apply to INNOFENSE...