Encryption

Encryption

quantum

Normal fiber optics can be easily physically tapped and massages can be intercepted. Intruders can bend the cable with a small clamp, then use...
data breach

More than 87GB of passwords and email addresses have been leaked and distributed in a folder dubbed "Collection #1" by hackers in a significant...

It appears that conventional computers are beginning to reach their limit. Quantum computers, which calculate using quantum phenomena, have been marked as the potential...

A  smart security system was found vulnerable for access to uploaded video recordings. Researchers...

A new machine learning algorithm can break text-based CAPTCHA systems with less effort, faster, and with higher accuracy...

In an attempt to target Islamist terrorism, pedophile networks and organized crime, several governments worldwide have been leading a policy forcing technology companies to...

Advances in technology also have a darker side. The world relies on encryption to protect everything from credit card transactions to databases holding health...
encryption

Military communications can be targeted by enemy forces operations in an attempt to learn about intentions and gain superiority at the battlefield this way....
cyber

The recent wave of ransomware attacks and preceding waves of cyber breaches could make it appear as though cyber criminals want their pay-off immediately....
Processor

The first artificial intelligence processor that is a deep neural-network accelerator, delivering both high operational capability and high energy conversion efficiency for a full...
Cryptomining

Author: Aryeh Danon, Data Security Department Manager at Abnet Communications, distributing Sophos solutions in Israel. Hackers have discovered a new way to take advantage...
cyber attack

All US weapons that the Department of Defense tested between 2012 and 2017 have “mission critical” cyber vulnerabilities, claims a new report from the...
IoT

Cybersecurity is an ongoing concern for many, especially with the proliferation of Internet of Things (IoT) technologies. The importance of securing IoT is increasingly...
Censorship

A new app has been recently launched by Google, aimed at protecting users from state-sponsored censorship and limitations on freedom of information. The app,...
friend or foe

South Korea’s arms procurement agency has started issuing a request for proposals for switching the decades-old Mode-4 Identification Friend or Foe, or IFF, system...
counter-terror

The US has been enhancing its anti-terrorist coordination measures with its allies. An agreement was recently signed by the US Homeland Security Secretary (DHS)...

IoT security is a substantial challenge as the use of the connected devices is becoming more and more widespread in every field. The consequences...
VPN

VPN ,or virtual private network, is a term we hear more and more. This is understandable if you take into consideration the many varied...
fax

A ground-breaking research dubbed Faxploit, conducted by CheckPoint, unfolds the shocking dangers of the seemingly simple and technologically innocent fax machine. The daunting news...

Cyber attacks against IoT devices can cause considerable damages. The US Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has signed a...
cybersecurity

Russia has decided to take a closer look at blockchain technology applications for security. The Russian Ministry of Defense has been launching a research...
blockchain

The need for better data has been driving industries in large to adopt blockchain technology. Is blockchain going to change the global defense industry?...

iHLS Events