video streaming

New Video Streaming Solutions for the Battlefield

0
The video and metadata requirements of modern military and defense missions have been evolving rapidly, making live, real-time video delivery and management in the...
big data

New Big Data Platform Predicts Trends in Business and Defense

0
Gathering insights from big data regarding future trends requires data scientists’ expertise and can take weeks or even months. Now, an MIT spinout has...
iot security

Mounting Efforts to Regulate IoT Security

0
While IoT devices and the data they collect and transmit present enormous benefits to consumers and industry, the relative insecurity of many devices presents...
DHS

DHS Seeking Top-Level Identity Security

0
The US Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has awarded a $749,241 Small Business Innovation Program (SBIR) contract to Digital...
authentication technology

Authentication Technology to Deliver Safer Transactions

0
Due to the rise of mobile transactions, passwords are not sufficiently secure as a means of authentication, and additional modes are required for next-generation...
smartphone encryption

Smartphone Encryption Frustrates Law Enforcement

0
Many smartphones encrypt their contents when locked, as standard - a security feature that often prevents even the phones' manufacturers from accessing data. Such...
blockchain

World’s First Blockchain Secured Smartphone

0
More and more industries have been discovering the blockchain technology advantages in the field of enhanced security against hackers. Blockchain is a secure database...
airport

Severe Security Breach at London Heathrow Airport

0
Heathrow Airport’s secret security planning has been revealed in files on a memory stick found in a London street. The documents outline routes and...
bitcoin

ISIS Makes Use of Bitcoin Anonymity

0
The concept that bitcoin could be used to help fund terrorists has been a long-standing concern among law enforcement and government agencies worldwide. Indeed,...
autonomous

Quantum Technology to Secure Autonomous Car

0
Autonomous vehicle technology is an emerging global market. By 2025, the partially autonomous vehicles market is expected to be at 36 billion U.S. dollars...

AI Technology in 2019 Consumers Market: Predictions and Analysis

0
Salesforce company alerts that in lack of proper rules and regulation , artificial intelligence (AI) might have a negative impact on social networks and...
dual-use technologies

Europe to Increase Control on Dual-Use Products Export

0
Lawmakers in the European Union have advanced plans to subject hacking tools to export controls currently reserved for depleted uranium, human pathogens and other...
blockchain

iHLS Accelerator Startup: Blockchain Based Solution to Firearms Registration

0
The recent wave of deadly terrorist attacks in Europe, particularly in Paris, has raised questions regarding illegal firearms, such as deactivated Kalashnikov rifles, that...
blockchain

Will Blockchain Technology Revolutionize Defense Industries?

0
The need for better data has been driving industries in large to adopt blockchain technology. Is blockchain going to change the global defense industry?...
security accelerator

iHLS Security Accelerator is Looking for Next Generation Startups!

0
Are you a disruptive startup in the security field? We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for civilian...

Quantum Computing in the Wrong Hands – What’s at Stake?

0
Advances in technology also have a darker side. The world relies on encryption to protect everything from credit card transactions to databases holding health...

Ransomware are Chasing After… Your Backup!

0
Ransomware has become a thriving business in recent years, with several states’ decision to arm themselves with it, whether for military or profit purposes....
quantum

Quantum Budgets – What is the Goal?

0
The field of quantum technology is not new, it has been studied by Physics scientist for decades. Today we are in the midst of...
accelerator

iHLS Accelerator is Looking for Game-Changing Technologies

0
We at the iHLS Security Accelerator are looking for disruptive ground-breaking technologies offering solutions for civilian defense, securing government institutions, vital infrastructure and borders,...
friend or foe

South Korea Upgrades its Friend or Foe Technology

0
South Korea’s arms procurement agency has started issuing a request for proposals for switching the decades-old Mode-4 Identification Friend or Foe, or IFF, system...
passwords

Two Steps to Protect Your Passwords

0
Conventional password security measures have become insufficient when massive data breaches frequently expose millions of users to hacking attacks. More than 92M customer records...
Cryptomining

How Have You Become A Cryptominer?

0
Author: Aryeh Danon, Data Security Department Manager at Abnet Communications, distributing Sophos solutions in Israel. Hackers have discovered a new way to take advantage...

Latest

Gmail Data Leak: 183 Million Reasons to Rethink Your Password Security

0
A new trove of stolen login credentials has surfaced online, with 183 million email addresses and passwords added to the “Have I Been Pwned”...