Darknet

Darknet

Biometrics

Things like lightning fast DNA processing, biometrics recognition based on iris scans, thumbprint or voice patterns and video face recognition from vast distances seemed...
cyber security

As the frequency and sophistication of cyber-attacks continuously increase, governments and critical infrastructure providers face significant challenges. A cyber security solution designed for customers...
cyber

  The Russian government has long been known to use criminal hackers for its’ world-class hacking abilities and intelligence gathering. The criminal group most likely...
cyber

IAI’s cyber activity continues to grow. The company’s 2016 contracts concluded in this field totalled more than $100 million, all of them in the...

Until not long ago China was reluctant to open to the developments in the Internet shpere. However, in recent years this country has been...

Hacking has become one of the auto industry's biggest concerns, especially as modern cars add more electronic controls and infotainment systems. Last March, the...

The privacy focused Tor network has been a regular feature of the news in recent years, most recently with the confirmation by a US...

Despite repeated denials by the US government, a federal judge has now confirmed that Carnegie Mellon University (CMU) was commissioned by the government to...

Jared Cohen, director at Google Ideas and an advisor to the heads of parent company Alphabet Google, said ISIS should be kicked off the...
video

Following Anonymous’ declaration of “total war” on ISIS, the hacktivist collective reports taking down more than 5,500 Twitter accounts belonging to ISIS members. Details...

The cyberattack on TalkTalk, a telecommunications company in Britain, could be a watershed moment in Islamic State's (Isis) cyberwar against the West, cybersecurity experts...

TalkTalk, the British telecoms company, has admitted that it has suffered its third major cyberattack in the last 12 months with data from its...

In an era where most organizations run on electronic communications, it is not only executives and IT engineers who hold the keys to the...

IBM’s security division has published its security threats reports for the third quarter of 2015 which it pointing out to an increasing danger of...

Identifying the methods and strategies used by organized crime networks and individuals to avoid detection on the Darknet was the focus of a specialized...

iHLS Events