blockchain

Blockchain Tech Promises Better Security for IoT

0
A new blockchain-based method for enhancing IoT devices security may be under development. IBM has won a patent for the autonomous self-servicing of networked...

Cloud Service Provider Achieves “FedRAMP Ready” Status

0
Cloud service providers of US Federal agencies and government organizations must meets strict standards and requirements in order to achieve a trusted provider status. CloudPassage...

iHLS TV: Robot Soldiers and UAV Swarms

0
Interview with Richard Miller, security strategist and privacy consultant at IBM Global Technology, on cyber security. Link to the full interview. Articles featured in this video: The Future...

Israeli Firm Cellebrite Reportedly Working With FBI to Unlock San Bernardino...

0
Israeli company Cellebrite has reportedly been appointed by the FBI to find an alternative way to unlock the iPhone 5c involved in the San...

Ransomware Threatens IoT Devices

0
Ransomware attack is one of the scenarios that security experts have been worrying about regarding the widening use of the Internet of Things. It...
photo illus. cybersecurity by Pixabay

Innovation at its Best: Ness Cyber Control will Showcase its Technology...

0
Cybersecurity and coping with cyber incidents are among the major and most relevant themes at the INNOTECH 2021 international conference and exhibition on cyber,...

What does Future Battlefield look like? Why are Autonomous Systems &...

0
At the forefront of the global defense industry, RAFAEL offers unique solutions that have revolutionized the field of autonomous unmanned aerial vehicles. RAFAEL is...
image provided by pixabay

Ongoing Breach of International Criminal Court

0
The International Criminal Court (ICC) was hit last week in an ongoing cyberattack that is still being investigated. A spokesman for ICC released a statement...

Is a cyber-Pearl Harbor likely?

0
A surprise cyber attack on U.S critical infrastructure – an imminent scenario? Cybersecurity experts often contemplate how U.S. security agencies would react to a cyber-9/11...

Israeli Defense Companies Infiltrated? A Different Theory by iHLS

0
Most of Israel's technology, economics and news media recently recycled a post originally uploaded by the American information security blog Krebs on Security, citing...

Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI

0
July 15th, 2014 ISRAEL Operation Protective Edge hits cyber realm As Operation Edge rages on, hackers have increased their attempts to breach Israel, and while most of...

Kratos Solutions – From Cybersecurity to Target Drones

0
Kratos Defense & Security Solutions, Inc. announced that it has recently received contract awards worth $17 million in cyber security, command, control, communications, computers,...
automotive cybersecurity

Forecast for Global V2X Cybersecurity Market – Major Growth

0
Connected vehicle technology is an essential enabler for safer roads and future autonomous vehicle deployments, which both form part of the smart city concept....
Photo illust. soldier US Navy by Kim Smith

Watch: Military Operations Game Changer

0
The US Army has been buying large amounts of small drones for use among regular units, and it could be that in the near...

Report: Cyber Attacks Against Middle East Embassies

0
Recent cyber attacks on Middle East embassies were conducted using targeted e-mail messages. The e-mail subject was the Syrian civil war, in an effort...
INNOTECH

Don’t Miss Out on INNOTECH – the International Cyber, HLS and...

0
iHLS is proud to present INNOTECH 2021 - the International Cyber, Homeland Security Technologies, and Innovation event. A giant two-day exhibition with national pavilions...
INNOTECH 2020 HLS and Cyber evenet

HLS & Cyber Technologies Innovation Event

0
iHLS is proud to present Israel's largest innovation, technologies, and HLS event: The giant exhibition and conferences iHLS InnoTech Expo Tel Aviv. With growing HLS...
cybersecurity

New Cyber Regiment Established by UK Military

0
More and more Military Forces have been establishing dedicated cyber organizations. Cyber attacks are as deadly as those faced on the physical battlefield, British...

Hacking Gmail with 92% Success

0
A team of researchers, including an assistant professor at the University of California, Riverside Bourns College of Engineering, have identified a weakness believed to...

Next phase of cyber intrusions will include destruction, manipulation of data

0
James Clapper, director of U.S. intelligence, and other senior intelligence officers, have warned Congress that the next phase of escalating online data theft will...
border protection systems

IAI Will Supply Border Protection Systems in South American Country

0
Israel Aerospace Industries' (IAI) was recently awarded a contract to supply border protection systems in a South American country. According to the contract worth...
photo illus. artificial intelligence by Pixabay

Challenges in Terrorist Behavior Prediction and Detection by Technological Systems

0
By Or Shalom Terrorism has been a major international challenge concerning the world ever since the French Revolution up until now. During the 1970s, the...

Latest

image provided by pixabay

Improving Automatic Software Repair

0
FIXCHECK is a new approach to improve patch fix analysis that combines static analysis, randomized testing, and large language models, created by IMDEA Software...