image provided by pixabay

Hackers can Spy on Cameras Through Walls

0
Security cameras are our first line of defense in many fields of life, from our homes to the bank. But what if they aren't...
images provided by pixabay

Call for Dual Use Technology Startups

0
Are you a startup company related to the security sector? Are you looking for recognition, international exposure, access to investors, and the ability to...
image provided by pixabay

iHLS Innovation Centre Calls for Dual-Use Security Startups

0
Are you a startup company related to the security sector? Are you looking for recognition, international exposure, access to investors, and the ability to...
image provided by pixabay

Will Quantum Computing Spark Cybersecurity Armageddon?

0
IBM claims that quantum computers will wreak havoc on the world of cybersecurity by the end of the decade, and governments and businesses are...
image provided by pixabay

IBM Unveils Quantum 1,000+ Qubit Processor

0
IBM unveils its much-awaited 1,000+ qubit quantum processor “Condor” alongside a utility-scale processor dubbed IBM Quantum Heron, which is the first in a series...
image provided by pixabay

The Fight for End-To-End Encryption

0
CEO of Meta Mark Zuckerberg is going head-to-head with the UK government over his plans to build super-secure messaging into all his apps, despite...
cryptography. image provided by pixabay

Military IoT Devices Might Be Too Valnurable

0
Due partly to the low cost of internet of things equipment, the US military has been able to adopt “unprecedented numbers” of IoT-enabled devices....
Cyber space. image by pixabay

New Encryption Method To Fight Crime

0
The Council of the European Union is on the lookout for secure encryption and lawful data access. The organization has adopted a resolution calling...
Cyberwarfare. image by pixabay

Cryptographic Technologies In Cyber Warfare

0
Cyber warfare and electronic warfare threats have been rapidly advancing. The US Army is interested in developing new cryptographic technologies, designed to ensure secure...
cyber security. image by pixabay

Data Encryption Is Critical For Modern Armies

0
Modern network cryptographic key technologies will be critical to the US Army’s effort of protecting tactical network communications from the prying eyes of potential...
image by pixabay

Are Most Sites Vulnerable Due to Lack Of Encryption?

0
Bypassing complex encryption has become a main goal and pursuit to State-actors and cybercriminals alike. It has never been more important to focus on...
Future. image by pixabay

Quantuam Internet – Immune To Cyber Attacks?

0
The quantum computing age is coming and with it a serious threat to encrypted communications. Current cryptography protocols used to secure our data can...
Photo illus. Anonymous by Pixabay

Data Security Encryption Vulnerability Unveiled

0
Homomorphic encryption is considered a next-generation data security technology, but researchers have identified a vulnerability that allows them to steal data even as it...
quantum

Autonomous Navigation with Quantum Computing

0
Autonomous navigation without the need for GPS is only one of the advantages expected from the development of new quantum technology. France has launched a...
Quantum Technology, Photo illust. quantum Pixabay

Australia Presents Quantum Tech Roadmap

0
Sensing and imaging, communications and cryptography, and computing and simulation are some potential applications of quantum technology, according to a recent report by the...
innotech conference

Interested in Cyber, HLS, Innovation? Attend INNOTECH 2021 International Event!

0
Attend INNOTECH 2021 - the International Cyber, Homeland Security Technologies and Innovation event organized by iHLS. A large two-day exhibition with national pavilions and...
Photo illust NIST Flickr

New Quantum Development to Cope with Cryptography Challenge

0
As a world-first, new development will enable the mass manufacture of quantum security technology, bringing its application to a much wider range of scenarios...
Photo illust quntum Pixabay

Towards Transition to Quantum Computing 

0
While quantum computing is expected to offer unprecedented computing speed and power it also poses new risks, as global competition accelerates.  As the technology advances,...
INNOTECH

Everybody Will Be There! INNOTECH 2021 – Cyber, HLS, and Innovation...

0
iHLS is proud to present INNOTECH 2021 - the International Cyber, Homeland Security Technologies, and Innovation event. A giant two-day exhibition with national pavilions...
INNOTECH

Don’t Miss Out on INNOTECH – the International Cyber, HLS and...

0
iHLS is proud to present INNOTECH 2021 - the International Cyber, Homeland Security Technologies, and Innovation event. A giant two-day exhibition with national pavilions...

New-Generation Encryptors to Serve Warfighter End-Users

0
Encryptors extend classified, secure communications from the tactical edge to the enterprise. It is one of the most important tactical tools for the warfighter,...
IDF C4ISR

IDF C4I Corps Commander Brig. Gen. Yariv Nir: Israel Thwarted Hamas’...

0
Within the framework of Operation Guardians of the Walls, Gaza Division, infantry and artillery troops were enhanced with a resilient communication network enabling C2...

Latest

image provided by pixabay

“Responsible AI” – The Solution to the Deepfake Threat?

0
Several months ago, thousands of Democratic New Hampshire voters received a telephone call from none other than US President Joe Biden urging them not...