image provided by pixabay

Open Call for Startups With Dual-Use Technologies

0
iHLS and the Ministry of Defense invite you to join the fifth cycle of INNOFENSE and receive a remarkable opportunity to showcase your technology...
image provided by pixabay

EU Journalists Criticized Russia – and Got Hacked

0
A new investigation reveals that EU journalists and activists who have been critical of Russia were targeted with NSO’s Pegasus spyware. These cyberattacks reportedly targeted...
image provided by pixabay

Stop Encryption on Social Media, Says European Police

0
Europe’s Police Chiefs and Europol are calling for politicians and industry leaders to take urgent action to ensure public safety across social media platforms,...
IoT. Image by pixabay

AI is Making Smart Devices Easier to Hack – What Can...

0
Our everyday routines are becoming increasingly flooded with AI-powered smart and ultra-connected devices (Internet of Things), and manufacturers are gathering incredible amounts of user...

Satellites for Quantum Communications and Encryption

0
The developing field of quantum computing foretells a future in which current encryption processes are no longer safe. Researchers from the Technical University of...
Image provided by pixabay

The Growing Need for Satellite Cybersecurity

0
The expansion of the digital realm into space has opened new frontiers for cyber threats, posing unprecedented challenges. The satellites orbiting Earth are crucial for...
image provided by pixabay

Hackers can Spy on Cameras Through Walls

0
Security cameras are our first line of defense in many fields of life, from our homes to the bank. But what if they aren't...
images provided by pixabay

Call for Dual Use Technology Startups

0
Are you a startup company related to the security sector? Are you looking for recognition, international exposure, access to investors, and the ability to...
image provided by pixabay

iHLS Innovation Centre Calls for Dual-Use Security Startups

0
Are you a startup company related to the security sector? Are you looking for recognition, international exposure, access to investors, and the ability to...
image provided by pixabay

Will Quantum Computing Spark Cybersecurity Armageddon?

0
IBM claims that quantum computers will wreak havoc on the world of cybersecurity by the end of the decade, and governments and businesses are...
image provided by pixabay

IBM Unveils Quantum 1,000+ Qubit Processor

0
IBM unveils its much-awaited 1,000+ qubit quantum processor “Condor” alongside a utility-scale processor dubbed IBM Quantum Heron, which is the first in a series...
image provided by pixabay

The Fight for End-To-End Encryption

0
CEO of Meta Mark Zuckerberg is going head-to-head with the UK government over his plans to build super-secure messaging into all his apps, despite...
cryptography. image provided by pixabay

Military IoT Devices Might Be Too Valnurable

0
Due partly to the low cost of internet of things equipment, the US military has been able to adopt “unprecedented numbers” of IoT-enabled devices....
Cyber space. image by pixabay

New Encryption Method To Fight Crime

0
The Council of the European Union is on the lookout for secure encryption and lawful data access. The organization has adopted a resolution calling...
Cyberwarfare. image by pixabay

Cryptographic Technologies In Cyber Warfare

0
Cyber warfare and electronic warfare threats have been rapidly advancing. The US Army is interested in developing new cryptographic technologies, designed to ensure secure...
cyber security. image by pixabay

Data Encryption Is Critical For Modern Armies

0
Modern network cryptographic key technologies will be critical to the US Army’s effort of protecting tactical network communications from the prying eyes of potential...
image by pixabay

Are Most Sites Vulnerable Due to Lack Of Encryption?

0
Bypassing complex encryption has become a main goal and pursuit to State-actors and cybercriminals alike. It has never been more important to focus on...
Future. image by pixabay

Quantuam Internet – Immune To Cyber Attacks?

0
The quantum computing age is coming and with it a serious threat to encrypted communications. Current cryptography protocols used to secure our data can...
Photo illus. Anonymous by Pixabay

Data Security Encryption Vulnerability Unveiled

0
Homomorphic encryption is considered a next-generation data security technology, but researchers have identified a vulnerability that allows them to steal data even as it...
quantum

Autonomous Navigation with Quantum Computing

0
Autonomous navigation without the need for GPS is only one of the advantages expected from the development of new quantum technology. France has launched a...
Quantum Technology, Photo illust. quantum Pixabay

Australia Presents Quantum Tech Roadmap

0
Sensing and imaging, communications and cryptography, and computing and simulation are some potential applications of quantum technology, according to a recent report by the...
innotech conference

Interested in Cyber, HLS, Innovation? Attend INNOTECH 2021 International Event!

0
Attend INNOTECH 2021 - the International Cyber, Homeland Security Technologies and Innovation event organized by iHLS. A large two-day exhibition with national pavilions and...

Latest

Augmented Reality Headsets Being Tested for Armored Vehicle Crews

0
China is advancing the use of augmented reality (AR) in its ground forces, with new headsets designed to improve visibility and combat efficiency for...