Encryption

Encryption

encryption

Military communications can be targeted by enemy forces operations in an attempt to learn about intentions and gain superiority at the battlefield this way....
cyber

The recent wave of ransomware attacks and preceding waves of cyber breaches could make it appear as though cyber criminals want their pay-off immediately....
Processor

The first artificial intelligence processor that is a deep neural-network accelerator, delivering both high operational capability and high energy conversion efficiency for a full...
Cryptomining

Author: Aryeh Danon, Data Security Department Manager at Abnet Communications, distributing Sophos solutions in Israel. Hackers have discovered a new way to take advantage...
cyber attack

All US weapons that the Department of Defense tested between 2012 and 2017 have “mission critical” cyber vulnerabilities, claims a new report from the...
IoT

Cybersecurity is an ongoing concern for many, especially with the proliferation of Internet of Things (IoT) technologies. The importance of securing IoT is increasingly...
Censorship

A new app has been recently launched by Google, aimed at protecting users from state-sponsored censorship and limitations on freedom of information. The app,...
friend or foe

South Korea’s arms procurement agency has started issuing a request for proposals for switching the decades-old Mode-4 Identification Friend or Foe, or IFF, system...
counter-terror

The US has been enhancing its anti-terrorist coordination measures with its allies. An agreement was recently signed by the US Homeland Security Secretary (DHS)...

IoT security is a substantial challenge as the use of the connected devices is becoming more and more widespread in every field. The consequences...
VPN

VPN ,or virtual private network, is a term we hear more and more. This is understandable if you take into consideration the many varied...
fax

A ground-breaking research dubbed Faxploit, conducted by CheckPoint, unfolds the shocking dangers of the seemingly simple and technologically innocent fax machine. The daunting news...

Cyber attacks against IoT devices can cause considerable damages. The US Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has signed a...
cybersecurity

Russia has decided to take a closer look at blockchain technology applications for security. The Russian Ministry of Defense has been launching a research...
blockchain

The need for better data has been driving industries in large to adopt blockchain technology. Is blockchain going to change the global defense industry?...
quantum

There are plenty of ways that companies and scientists are attempting to integrate the weird effects of quantum mechanics into everyday technology. One potential...
startup competition

iHLS is delighted to host for the first time the prestigious Startup Competition for innovative technologies in the security, defense and homeland security fields,...
startup competition

iHLS is delighted to host for the first time the prestigious Startup Competition for innovative technologies in the security, defense and homeland security fields,...
ihls security accelerator

Apply Now! Are you a disruptive startup in the security field?  We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for...
special forces

Video data link handheld radios were required in order to help US special forces personnel receive, transmit, and display full-motion video for situational awareness....
ihls security accelerator

Apply Now! Are you a disruptive startup in the security field?  We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for...
iphones

iPhones encrypt user data by default. Those in physical possession normally cannot access the phone’s data, such as contact list, saved messages, or photos,...

iHLS Events