Cyber Security

Cyber Security

iphones

iPhones encrypt user data by default. Those in physical possession normally cannot access the phone’s data, such as contact list, saved messages, or photos,...
cybersecurity

Nearly 1,000 data-breaches occurred in the first-half of 2017. Each new breach raises fears that trust in the global digital economy is eroding. In...
accelerator

Apply Now! Are you a disruptive startup in the security field?  We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for...
cybersecurity

While hackers have been constantly reaching out for new technologies, information security teams are also obliged to adopt advanced technological methods in order to...
ihls security accelerator

Apply Now! Are you a disruptive startup in the security field?  We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for...

It is commonly assumed that the task of cyber attackers will always be easier than the cyber security teams’ mission, because the assailants need...
sensitive data

A new technology aims to help the US Department of Homeland Security (DHS) allow sensitive data to be shared and analyzed while it remains...
security accelerator

Are you a disruptive startup in the security field? We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for civilian...
cyber resiliency

The U.S. military’s weapons systems today are reliant on complex software and interconnectivity with a host of components, sensors and computer systems. The highly...
cyber threats

The increasing sophistication of cyber threats has become one of the main concerns of the aviation industry as airports and airlines realize they are...
IHLS

iHLS wishes all the dedicated readers and followers of our website and social media channels, customers, and conference and exhibition participants around the world...
startup

Are you a disruptive startup in the security field? We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for civilian...
cyber attacks

As railways adopt more automated, wireless and connected technologies, their most safety-critical assets have become exposed to new and more dangerous types of cyber...
cyber

To date, there has been no confirmed downing of a commercial or military aircraft through a cyber attack. However, given the weaknesses in the...
security accelerator

Are you a disruptive startup in the security field? We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for civilian...
The Pepper Robot Is Vulnerable To Ransomware Attacks

Security services firm IOActive has warned that tens of thousands of robots are a threat to human safety after its researchers were able to...
blockchain

The recent wave of deadly terrorist attacks in Europe, particularly in Paris, has raised questions regarding illegal firearms, such as deactivated Kalashnikov rifles, that...
ihls security accelerator

We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for civilian defense, securing government institutions, vital infrastructure and borders,...
autonomous

Autonomous vehicle technology is an emerging global market. By 2025, the partially autonomous vehicles market is expected to be at 36 billion U.S. dollars...
DDoS Attack Launched against GitHub

GitHub has become the target of the largest-known cyber attack in history. The web-hosting service revealed the attack in a blog post according to...

The number of video security cameras is increasing every hour and everywhere. Private people and organization want to have their eye on their property...
autonomous car

With the increasing automation and widespread use of unmanned aerial systems, potential cyber-attacks on aerial fleets are already a major concern. A recent collaboration...