First-of-its-Kind AI Processor Developed
                The first artificial intelligence processor that is a deep neural-network accelerator, delivering both high operational capability and high energy conversion efficiency for a full...            
            
        DSEI London 2025 – The Future of International Security: Technology, Collaboration,...
                By: Or Shalom
The DSEI London 2025 exhibition, which took place on September 9–12 at the ExCeL Centre in London, is the flagship event for...            
            
        Quantum Challenge – Speed Up Preparations
                The world relies on encryption to protect everything from credit card transactions to databases holding health records and other sensitive information. A report from...            
            
        Technology Powerhouse Examines Quantum Encryption
                There are plenty of ways that companies and scientists are attempting to integrate the weird effects of quantum mechanics into everyday technology. One potential...            
            
        iHLS Innovation Centre Calls for Dual-Use Security Startups
                Are you a startup company related to the security sector? Are you looking for recognition, international exposure, access to investors, and the ability to...            
            
        How Companies Can Minimize Cyber Attack Damage
                The recent wave of ransomware attacks and preceding waves of cyber breaches could make it appear as though cyber criminals want their pay-off immediately....            
            
        Can’t be Cloned: Hydrogel Gives Products a Unique ID
                A new material developed by researchers offers a promising route to secure, tamper-proof authentication for physical objects. At the heart of the innovation is...            
            
        Quantum-Based Solution for Connected Devices Security
                A dichotomy inherent in the Internet of Things (IoT) is that one wants the devices to be cheap, often lightweight and small, with low...            
            
        Call for Dual Use Technology Startups
                Are you a startup company related to the security sector? Are you looking for recognition, international exposure, access to investors, and the ability to...            
            
        Innovative Tech for Battlefield Encryption
                Military communications can be targeted by enemy forces operations in an attempt to learn about intentions and gain superiority at the battlefield this way....            
            
        The Growing Need for Satellite Cybersecurity
                The expansion of the digital realm into space has opened new frontiers for cyber threats, posing unprecedented challenges.
The satellites orbiting Earth are crucial for...            
            
        Your Home Fax Might Help Hackers Take Over Your Network
                A ground-breaking research dubbed Faxploit, conducted by CheckPoint, unfolds the shocking dangers of the seemingly simple and technologically innocent fax machine. The daunting news...            
            
        Satellites for Quantum Communications and Encryption
                The developing field of quantum computing foretells a future in which current encryption processes are no longer safe. Researchers from the Technical University of...            
            
        Will Blockchain Secure Connected Devices?
                IoT security is a substantial challenge as the use of the connected devices is becoming more and more widespread in every field. The consequences...            
            
        EU Journalists Criticized Russia – and Got Hacked
                A new investigation reveals that EU journalists and activists who have been critical of Russia were targeted with NSO’s Pegasus spyware.
These cyberattacks reportedly targeted...            
            
        Websites First Defense Line is Vulnerable to Hackers
                
A new machine learning algorithm can break text-based CAPTCHA systems with less effort, faster, and with higher accuracy than all previous methods. It has...            
            
        Blockchain’s New Civil Aviation Application
                Blockchain technology has a wide range of applications. Currently, it is tested as a means to ensure the privacy and security of aircraft flight...            
            
        Open Call for Startups With Dual-Use Technologies
                iHLS and the Ministry of Defense invite you to join the fifth cycle of INNOFENSE and receive a remarkable opportunity to showcase your technology...            
            
        Vulnerabilities in Smart Security System of Leading Companies’ Installations
                
A  smart security system was found vulnerable for access to uploaded video recordings. 
Researchers found that Guardzilla’s top-selling indoor wireless security system contains a...            
            
        Startup in Security Field? Apply Now to iHLS Security Accelerator
                Apply Now!
Are you a disruptive startup in the security field? 
We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for...            
            
        EV Fast-Charging Equipment May Pose Cybersecurity Risks
                In the past years, most security-savvy individuals have become highly cautious of connecting unfamiliar tech to their personal devices. We understand that we probably...            
            
        US Special Forces Receive Exceptional Video Capabilities
                Video data link handheld radios were required in order to help US special forces personnel receive, transmit, and display full-motion video for situational awareness....            
            
        
 
            
