Cyber Security

Cyber Security

smart cities

We are in an era of intelligent and urgent urban innovation. Our homes are connected, our streets are thriving labyrinths of interconnectivity, and our...
quantum

Normal fiber optics can be easily physically tapped and massages can be intercepted. Intruders can bend the cable with a small clamp, then use...
data breach

More than 87GB of passwords and email addresses have been leaked and distributed in a folder dubbed "Collection #1" by hackers in a significant...

Summary of 2018 2018 has begun with a recovery from the events of 2017 such as WannaCry, Petya, and the information leak from Equifax -...
blockchain

The Automatic Dependent Surveillance-Broadcast (ADS-B) system functions with satellite rather than radar technology to more accurately observe and track air traffic. In a bid...

Vehicle software is continuously gaining sophistication, creating new threat vectors in the process. As autonomous and connected vehicles become software driven, risks increase that...

In order to protect mobile devices and applications, US Federal agencies need security capabilities that proactively protect devices against all types of cyber attacks,...

It appears that conventional computers are beginning to reach their limit. Quantum computers, which calculate using quantum phenomena, have been marked as the potential...

By 2021, there will be close to 13 connected devices per person in North America, according to Cisco’s estimate, and many consumers don’t have...
two-factor

In a quest to make online accounts safer, many services now offer two-factor authentication. Cybersecurity professionals have advised enabling two-factor to add an extra...

In order to improve its situational awareness capabilities, the U.S. Army is developing new tactical software that will allow commanders to communicate more effectively...
big data

The Big Data for Security and Intelligence Conference and Exhibition organized by iHLS will showcase the latest requirements of the commercial and...

A  smart security system was found vulnerable for access to uploaded video recordings. Researchers...

As 2018 ends, it’s crucial to step back and reflect on some cybersecurity realities. Although US government cybersecurity...
data breaches

Data breaches compromised the personal information of millions of people around the globe in 2018. Data breaches are...

US adversaries are more and more capable of penetrating US unclassified or barely protected systems. The bulk of...
at battlefield

Two widely used American war-fighting mapping applications are marked vulnerable to cyberattacks by hostile actors. After a year...
cybersecurity practitioner

A new and first-of-its-kind cyber course has attracted high interest in the Israeli military. The course is intended...

A new machine learning algorithm can break text-based CAPTCHA systems with less effort, faster, and with higher accuracy...

One of the U.S. most important asset is vulnerable to cyber attacks. The inadequate cybersecurity practices being used to protect the U.S ballistic missile...

The Big Data for Security and Intelligence Conference and Exhibition organized by iHLS will showcase the latest requirements of the commercial and security sectors...
security accelerator

Have you been developing a ground-breaking technology in the fields of video analytics, cybersecurity, unmanned systems, counter drones, terror tunnel detection, border security, etc.?...

iHLS Events