Secure Communications – Enabled by 3mm Chip
                In most leading security standards used in secure communication methods — from withdrawing cash from the ATM to purchasing goods online on the smartphone...            
            
        Smart Campus Access Enabled by Smart Watch
                A new series of smart campus products now support contactless student IDs in Apple Wallet. Allegion, which specializes in seamless access technologies, announced that the...            
            
        US SOCOM Defines New Priorities
                As quantum computers become more readily available, the concern is that they will be able to guess passwords and break through the layers of...            
            
        Privacy Concerns Over Amazon’s New Indoor Drone
                Amazon's new Ring Always Home Cam, a security camera is also a drone that flies around the inside of your house shooting video that...            
            
        Military IoT Devices Might Be Too Valnurable
                Due partly to the low cost of internet of things equipment, the US military has been able to adopt “unprecedented numbers” of IoT-enabled devices....            
            
        DHS Seeking Top-Level Identity Security
                The US Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has awarded a $749,241 Small Business Innovation Program (SBIR) contract to Digital...            
            
        Cyber Security Rules for Autonomous Vehicles Set by UK
                The United Kingdom has recently published a set of cyber security regulations, “Key principles of vehicle cyber security for connected and automated vehicles”. The...            
            
        Iranian State-Actors Aid Ransomware Gangs in campaigns Against Israel
                The Federal Bureau of Investigation (FBI) has issued warnings regarding Iranian state-sponsored hackers, who are involved in trading access to organizations for financial gain,...            
            
        Two Steps to Protect Your Passwords
                Conventional password security measures have become insufficient when massive data breaches frequently expose millions of users to hacking attacks. More than 92M customer records...            
            
        Power-Saving Chip to Revolutionize IoT Network
                The IoT network is capable of connecting many different sensors integrated in civil structures, appliances, vehicles, manufacturing equipment, etc. to online servers. However, one...            
            
        Severe Security Breach at London Heathrow Airport
                Heathrow Airport’s secret security planning has been revealed in files on a memory stick found in a London street. The documents outline routes and...            
            
        InnoTech 2020: How COVID-19 Changed Cyber & HLS World: Special Broadcast...
                The COVID-19 pandemic has intensified the multiple challenges states and cities are currently facing. Technology has become more and more important in our daily...            
            
        Your Home Fax Might Help Hackers Take Over Your Network
                A ground-breaking research dubbed Faxploit, conducted by CheckPoint, unfolds the shocking dangers of the seemingly simple and technologically innocent fax machine. The daunting news...            
            
        New Encryption Solution for Microsoft
                WinMagic Inc., a data encryption firm, announced recently the availability of SecureDoc for Microsoft’s BitLocker, an intelligent key management and encryption solution that improves...            
            
        Computer Security to Be Achieved by Mini-Mazes
                As hacking techniques are constantly improving, scientists have been trying to find new ways and authentication methods to secure computers. Researchers in South Korea...            
            
        Can’t be Cloned: Hydrogel Gives Products a Unique ID
                A new material developed by researchers offers a promising route to secure, tamper-proof authentication for physical objects. At the heart of the innovation is...            
            
        Vulnerabilities in Smart Security System of Leading Companies’ Installations
                
A  smart security system was found vulnerable for access to uploaded video recordings. 
Researchers found that Guardzilla’s top-selling indoor wireless security system contains a...            
            
        The Growing Need for Satellite Cybersecurity
                The expansion of the digital realm into space has opened new frontiers for cyber threats, posing unprecedented challenges.
The satellites orbiting Earth are crucial for...            
            
        Prepare Now for Year Y2Q Quantum Threats
                Quantum computers are expected to supply the most powerful computing capabilities ever. Advances in quantum computing are finally beginning to reach commercial applications, such...            
            
        An Equivalent to License plates – for UAV’s?
                AirMap, a world leader in airspace management for unmanned aircraft, recently announced a partnership with DigiCert that will enable, for the first time, instant...            
            
        Will Blockchain Secure Connected Devices?
                IoT security is a substantial challenge as the use of the connected devices is becoming more and more widespread in every field. The consequences...            
            
        Call for Technologies: Defense Industry Seeks AI Solutions
                iHLS, in collaboration with a large defense industry is looking for companies with proven capabilities in several areas to participate in a demonstration of...            
            
        
 
            
