Cyber Security

Cyber Security

biological malware

85
In what appears to be the first successful hack of a software program using DNA, researchers explained that the biological malware they inserted into...
autonomous vehicles

74
Will autonomous vehicles replace humans in the near future? Recent reports of major computer and bitcoin hacks have displayed the vulnerability of modern technologies...
mobile communication

953
The iHLS Security Accelerator is home to many innovative and successful startups. ListenApp is one of the first startups that's participated in the accelerator...
USB-connected devices

156
Security flaws found in USB-connected devices raise questions about the trustworthy of the devices. Apparently, USB connections should be redesigned to offer more security,...
cyber security rules

85
The United Kingdom has recently published a set of cyber security regulations, “Key principles of vehicle cyber security for connected and automated vehicles”. The...
cybersecurity platform

28
Recent cyber attacks have increased awareness security on the net. The cyber security market is one of the fastest growing industries in the past...
cyber security

28
  Driverless vehicles will be behind $7 trillion worth of economic activity and new efficiencies annually by 2050. That activity will include nearly $4 trillion...
hacking

24
The more digital the world becomes, the more hacking becomes a serious threat. The world's smallest "non-hackable" security chip that can be widely used...
drones

33
Recent years have seen the role of drones in criminal activity increasing significantly. In the area of cyber forensics, law enforcement faces a significant...
artificial intelligence

46
AI (Artificial Intelligence) related methods are being more and more applied in the next wave of cyber security techniques. Whether using deep learning for...
cybersecurity

60
With Blockchain becoming more popular these days, a significant number of US government departments are rapidly showing interest. The US Department of Homeland Security...
3d printing technology

38
The benefits of 3D printing technology are known, but less frequently discussed are the dangers. The open and accessible nature of the technology means...

47
As IoT matures, applications will be limited only by users’ imaginations. That’s the prediction of Lisa Litherland, a business architect who helps institutions create...
secure authentication

38
As organizations search for more secure authentication methods for data access, physical access and general security, many are turning to biometrics. The field has...
cyber

11
Japan’s Ministry of Defense (MoD) is considering increasing the number of soldiers in its Cyber Defense Unit (CDU) from around 110 to 1,000 and...
israeli air force

58
A unique technological initiative has been taken by the soldiers and graduates of the Israeli Air Force’s Ofek unit on behalf of children with...
accelerator

24
Side by side with the impressive weapon systems presented at the exhibition of the IAMD Missile Defense Conference, the hundreds of visitors had the...
cyber security

14
Not only Russia poses risks to power grid cybersecurity. Small- to mid-size energy companies are facing a variety of threats, says a new report...
electronic warfare

21
The US Army Research Lab has been increasingly focusing on fighting land wars against far more technologically sophisticated adversaries than it has in the...
military cybersecurity

10
Changes are expected in the US military cybersecurity infrastructure. After months of delay, the Trump administration is finalizing plans to revamp US military command...
biometric security

16
Recent years have shown that there are many difficulties in stopping attempts to evade or deceive biometric security systems. For this purpose IARPA’s (The...
cybersecurity law

17
There has been a growing global trend regarding the security and sovereignty of digital data - building facilities that store online data closer to...

iHLS Events

5

1009