Cyber Security

Cyber Security

The UK has acquired a new biometric capability, which allows secure enrollment onto Home Office services using a smartphone app. The process involves biometric...

A blockchain project will track aviation parts throughout their lifecycles. The development will be carried out under a Cooperative Research and Development Agreement of...
security accelerator

Have you been developing a ground-breaking technology in the fields of video analytics, cybersecurity, unmanned systems, counter drones, terror tunnel detection, border security, etc.? We...
video analytics

Artificial intelligence algorithms form the basis of video analytics next-generation technologies. The numerous visitors who attended the iHLS Video Analytics 2018 Conference today learned...
communications

The United Nations has been upgrading its communications network. Currently, there are 14 peacekeeping operations around the world led by the United Nations. These...
encryption

Military communications can be targeted by enemy forces operations in an attempt to learn about intentions and gain superiority at the battlefield this way....
IOT security

Cloudflare, the internet infrastructure and networking giant, has been expanding its focus to include mobile privacy and the security of connected devices. On November 11,...
security accelerator

Have you been developing a ground-breaking technology in the fields of video analytics, cybersecurity, unmanned systems, counter drones, terror tunnel detection, border security, etc.? We...
bluetooth chip

Wireless access points can come in many forms, such as a router or an internet of things device. If a hacker gains access to...
cyber security

Cyber Security has become a major concern for any large organization or authority operating complex systems. Rafael Advanced Defense Systems, developer and manufacturer of leading...
cyber

The recent wave of ransomware attacks and preceding waves of cyber breaches could make it appear as though cyber criminals want their pay-off immediately....
5g network

5G wireless network deployments at major world events such as the 2018 Winter Games in PyeongChang have shown the great potential of a 5G-driven...
video analytics

Video analytics technology, the advanced security camera based algorithm analysis, has been undergoing a major revolution in recent years. Israel is at the forefront...
nuclear

A scary yet realistic scenario in the digital age could involve the following: attackers, sponsored by a rogue organization or radical state, gain access...
Cryptomining

Author: Aryeh Danon, Data Security Department Manager at Abnet Communications, distributing Sophos solutions in Israel. Hackers have discovered a new way to take advantage...

U.S. special operators and other troops have been using advanced war-fighting applications for hand-held devices that contain software weaknesses that render them vulnerable to...
electronic warfare

A current gap in electronic warfare capabilities in terms of equipment and training in the US Army has driven the testing of new technologies....

Have you been developing a ground-breaking technology in the fields of unmanned systems, counter drones, terror tunnel detection, border security, etc.? We invite you to...
cyber attack

All US weapons that the Department of Defense tested between 2012 and 2017 have “mission critical” cyber vulnerabilities, claims a new report from the...
Router

Securing our routers and ensuring they are safe and protected is sometimes neglected by many. It is essential to check your router settings and...

Unmanned systems decrease the risk to soldiers and security teams by keeping them at a remote and secure site while streaming data for full...
IoT

Cybersecurity is an ongoing concern for many, especially with the proliferation of Internet of Things (IoT) technologies. The importance of securing IoT is increasingly...