startup

Startup in the Security Field? Join iHLS Accelerator

0
Are you a disruptive startup in the security field? We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for civilian...

APT39 – Iranian Espionage Array Focusing on Personal Information

0
Another Iranian cyber attack group is exposed as posing an immediate threat to Israel. The group, called APT39, is responsible for stealing a vast...
cybersecurity

Major Power Embraces Blockchain for Cybersecurity

0
Russia has decided to take a closer look at blockchain technology applications for security. The Russian Ministry of Defense has been launching a research...
sensitive data

Groundbreaking Tech Offers Secure Sharing of Sensitive Data

0
A new technology aims to help the US Department of Homeland Security (DHS) allow sensitive data to be shared and analyzed while it remains...
cybersecurity

Israeli Cybersecurity at Forefront of War Against Cybercrime

0
The cyber incidents that dominated global headlines over the past year indicated not only a growing trend but one that is escalating in size,...

Bypassing Encryption Under Protection of Law

0
In an attempt to target Islamist terrorism, pedophile networks and organized crime, several governments worldwide have been leading a policy forcing technology companies to...
ihls security accelerator

Join the Game! iHLS Security Accelerator is Opening its 5th Startup...

0
Apply Now! Are you a disruptive startup in the security field?  We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for...
encryption

IoT Device Encryption Feasible with Minimal Power

0
The vast array of connected industrial devices, such as embedded sensors, smart lighting, and monitoring systems, requires high levels of security. Most sensitive web...
iphones

Law Enforcement Authorities Purchase Tech to Unlock iPhones

0
iPhones encrypt user data by default. Those in physical possession normally cannot access the phone’s data, such as contact list, saved messages, or photos,...
counter-terror

Joint Counter-Terror Intelligence and Cyber Move

0
The US has been enhancing its anti-terrorist coordination measures with its allies. An agreement was recently signed by the US Homeland Security Secretary (DHS)...
Blockchain Will Be Used In Russian Elections

Blockchain Technology Will Be Used At Russian Presidential Elections

0
State-run VTSIOM will introduce cutting-edge blockchain technology for exit polls at the forthcoming Russian presidential elections. It’s designed to ensure transparency of data collection...

What is Quantum Computing and Why do We Need it?

0
It appears that conventional computers are beginning to reach their limit. Quantum computers, which calculate using quantum phenomena, have been marked as the potential...
IoT

The Race to IoT Security

0
Cybersecurity is an ongoing concern for many, especially with the proliferation of Internet of Things (IoT) technologies. The importance of securing IoT is increasingly...
quantum

Quantum Tech to Secure Financial Data

0
Normal fiber optics can be easily physically tapped and massages can be intercepted. Intruders can bend the cable with a small clamp, then use...
quantum encryption

Self-Driving Cars to Get Quantum Encryption

0
In the ‘hyper-connected’ 5G communications networks era, the issue of “network security” becomes critical. A quantum-safe technology can encrypt transmitted data using special quantum...
data breach

Giant Data Breach: 773 Million Passwords and Email Addresses

0
More than 87GB of passwords and email addresses have been leaked and distributed in a folder dubbed "Collection #1" by hackers in a significant...
startup competition

Coming Soon! Prestigious Startup Competition for Security, Defense and HLS

0
iHLS is delighted to host for the first time the prestigious Startup Competition for innovative technologies in the security, defense and homeland security fields,...
startup accelerator

Call for Startups – Apply to iHLS Security Accelerator 8th Batch

0
Are you developing a ground-breaking technology in the fields of unmanned systems, coping with COVID-19 pandemic, counter drones, border security, safe city? We invite you...
image provided by pixabay

Telegram Changes Stance on User Data Sharing Amid Criminal Concerns

0
In a significant policy shift, the encrypted messaging app Telegram will now provide user data to authorities in response to legal requests regarding criminal...
iot

Power-Saving Chip to Revolutionize IoT Network

0
The IoT network is capable of connecting many different sensors integrated in civil structures, appliances, vehicles, manufacturing equipment, etc. to online servers. However, one...
startup competition

Apply Now: iHLS Startup Competition for Security, Defense and HLS

0
iHLS is delighted to host for the first time the prestigious Startup Competition for innovative technologies in the security, defense and homeland security fields,...
security accelerator

Call for Startups: Applications Now Open for iHLS Security Accelerator!

0
iHLS is inviting startups in this field to join the 8th cycle of its Security Accelerator, the world’s first accelerator in the HLS field....

Latest

Gmail Data Leak: 183 Million Reasons to Rethink Your Password Security

0
A new trove of stolen login credentials has surfaced online, with 183 million email addresses and passwords added to the “Have I Been Pwned”...