Encryption

Encryption

smart watch

A new series of smart campus products now support contactless student IDs in Apple Wallet. Allegion, which specializes in seamless access technologies, announced that the...
Photo quantum from NIST Wikimedia

Hacking-resistant communications networks, sensors that see through smog and around corners, and prototype computers that may someday smash the computational power of any existing...
quantum

Encryption systems have never been unbreakable, rather their security is based on the huge amount of time it would take for a classical computer...
Photo illust

The growing network of the internet of things (IoT) can make life more convenient by automating your home and delivering data wherever you are....
Photo illust. encryption

U.S. military researchers are trying to enhance information security and trusted computing by advancing zero-knowledge proof technology to enable cryptography in complex military applications. A...
Photo illust. NIST

The quantum computing revolution is already here, and Israel cannot afford to miss the technology, whose ground-breaking potential resembles the internet revolution. This is...

Specializing in C4ISTAR, intelligence, cybersecurity and HLS solutions, TSG IT Advanced Systems is one of the leading sponsors of the coming Security and HLS...

This happens only once a year! iHLS’ unique Startup Competition is a one-time opportunity for startups - in one day you can get exposure to...
smartphone

  Throughout the past few years soldiers around the world have been carrying commercial smartphones with them in the field. Although most militaries would not...
quantum encryption

In the ‘hyper-connected’ 5G communications networks era, the issue of “network security” becomes critical. A quantum-safe technology can encrypt transmitted data using special quantum...
passwords

Conventional password security measures have become insufficient when massive data breaches frequently expose millions of users to hacking attacks. More than 92M customer records...
bitcoin

The concept that bitcoin could be used to help fund terrorists has been a long-standing concern among law enforcement and government agencies worldwide. Indeed,...
blockchain

Blockchain technology has a wide range of applications. Currently, it is tested as a means to ensure the privacy and security of aircraft flight...
quantum

The field of quantum technology is not new, it has been studied by Physics scientist for decades. Today we are in the midst of...

Ransomware has become a thriving business in recent years, with several states’ decision to arm themselves with it, whether for military or profit purposes....

Another Iranian cyber attack group is exposed as posing an immediate threat to Israel. The group, called APT39, is responsible for stealing a vast...
quantum-based solution

A dichotomy inherent in the Internet of Things (IoT) is that one wants the devices to be cheap, often lightweight and small, with low...

The world relies on encryption to protect everything from credit card transactions to databases holding health records and other sensitive information. A report from...

Salesforce company alerts that in lack of proper rules and regulation , artificial intelligence (AI) might have a negative impact on social networks and...
quantum

Normal fiber optics can be easily physically tapped and massages can be intercepted. Intruders can bend the cable with a small clamp, then use...
data breach

More than 87GB of passwords and email addresses have been leaked and distributed in a folder dubbed "Collection #1" by hackers in a significant...

It appears that conventional computers are beginning to reach their limit. Quantum computers, which calculate using quantum phenomena, have been marked as the potential...