Encryption

Encryption

Specializing in C4ISTAR, intelligence, cybersecurity and HLS solutions, TSG IT Advanced Systems is one of the leading sponsors of the coming Security and HLS...

This happens only once a year! iHLS’ unique Startup Competition is a one-time opportunity for startups - in one day you can get exposure to...
smartphone

  Throughout the past few years soldiers around the world have been carrying commercial smartphones with them in the field. Although most militaries would not...
quantum encryption

In the ‘hyper-connected’ 5G communications networks era, the issue of “network security” becomes critical. A quantum-safe technology can encrypt transmitted data using special quantum...
passwords

Conventional password security measures have become insufficient when massive data breaches frequently expose millions of users to hacking attacks. More than 92M customer records...
bitcoin

The concept that bitcoin could be used to help fund terrorists has been a long-standing concern among law enforcement and government agencies worldwide. Indeed,...
blockchain

Blockchain technology has a wide range of applications. Currently, it is tested as a means to ensure the privacy and security of aircraft flight...
quantum

The field of quantum technology is not new, it has been studied by Physics scientist for decades. Today we are in the midst of...

Ransomware has become a thriving business in recent years, with several states’ decision to arm themselves with it, whether for military or profit purposes....

Another Iranian cyber attack group is exposed as posing an immediate threat to Israel. The group, called APT39, is responsible for stealing a vast...
quantum-based solution

A dichotomy inherent in the Internet of Things (IoT) is that one wants the devices to be cheap, often lightweight and small, with low...

The world relies on encryption to protect everything from credit card transactions to databases holding health records and other sensitive information. A report from...

Salesforce company alerts that in lack of proper rules and regulation , artificial intelligence (AI) might have a negative impact on social networks and...
quantum

Normal fiber optics can be easily physically tapped and massages can be intercepted. Intruders can bend the cable with a small clamp, then use...
data breach

More than 87GB of passwords and email addresses have been leaked and distributed in a folder dubbed "Collection #1" by hackers in a significant...

It appears that conventional computers are beginning to reach their limit. Quantum computers, which calculate using quantum phenomena, have been marked as the potential...

A  smart security system was found vulnerable for access to uploaded video recordings. Researchers...

A new machine learning algorithm can break text-based CAPTCHA systems with less effort, faster, and with higher accuracy...

In an attempt to target Islamist terrorism, pedophile networks and organized crime, several governments worldwide have been leading a policy forcing technology companies to...

Advances in technology also have a darker side. The world relies on encryption to protect everything from credit card transactions to databases holding health...
encryption

Military communications can be targeted by enemy forces operations in an attempt to learn about intentions and gain superiority at the battlefield this way....
cyber

The recent wave of ransomware attacks and preceding waves of cyber breaches could make it appear as though cyber criminals want their pay-off immediately....

iHLS Events