Cyber

Cyber

security accelerator

Are you a disruptive startup in the security field? We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for civilian...
The Pepper Robot Is Vulnerable To Ransomware Attacks

Security services firm IOActive has warned that tens of thousands of robots are a threat to human safety after its researchers were able to...
blockchain

The recent wave of deadly terrorist attacks in Europe, particularly in Paris, has raised questions regarding illegal firearms, such as deactivated Kalashnikov rifles, that...
ihls security accelerator

We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for civilian defense, securing government institutions, vital infrastructure and borders,...
autonomous

Autonomous vehicle technology is an emerging global market. By 2025, the partially autonomous vehicles market is expected to be at 36 billion U.S. dollars...
DDoS Attack Launched against GitHub

GitHub has become the target of the largest-known cyber attack in history. The web-hosting service revealed the attack in a blog post according to...

The number of video security cameras is increasing every hour and everywhere. Private people and organization want to have their eye on their property...
autonomous car

With the increasing automation and widespread use of unmanned aerial systems, potential cyber-attacks on aerial fleets are already a major concern. A recent collaboration...
cybersecurity

Just a few days before the President Trump inauguration, 70% of Washington DC’s CCTV cameras had been infected with a ransomware causing the system...
Blockchain Will Be Used In Russian Elections

State-run VTSIOM will introduce cutting-edge blockchain technology for exit polls at the forthcoming Russian presidential elections. It’s designed to ensure transparency of data collection...
security technology

We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for civilian defense, securing government institutions, vital infrastructure and borders,...
AI In The Service Of Law Enforcement

Ben-Gurion University of the Negev and the Israel Police aim to develop advanced cyber, big-data and artificial intelligence tools that may eventually be able...
future forces

In the future, military operations will rely less on human soldiers and more on interconnected technology, leveraging advancements in unmanned systems and machine intelligence...
Facial Recognition Can Cause Privacy Problems

In today’s world, almost no one can hide from the authorities. There are cameras everywhere now, and with facial recognition algorithms your face could...
Blockchain System

You may have heard the term "blockchain" used when people talk about cryptocurrencies like bitcoin. If you're unsure of what it means, think of...
authentication

Cybercrime will become one of the greatest threats of our time, and this is particularly true for banks and insurers, who will increasingly look...
accelerator

We at the iHLS Security Accelerator are looking for disruptive ground-breaking technologies offering solutions for civilian defense, securing government institutions, vital infrastructure and borders,...
autonomous vehicles

While autonomous vehicles real-world tests become more and more prevalent, the risk of hackers taking control of steering and braking systems are real. New...
big data for security

The consequences of the Big Data revolution in all the technological fields and the role of Artificial Intelligence (AI) with this regard were the...
anti-terrorist

Complex challenges are faced by the tech world and governments alike when it comes to terrorists on the internet. Terrorists have been finding new...
big data analytics

Big Data Analytics is helping to quantitatively deal with the information overload, as well as to qualitatively improve intelligence assessments by drawing out patterns...
online terrorism

Online terrorist content has been fueling violent attacks in recent years. For example, ISIS’s recovering media network has been used to call on its supporters...