Processor

First-of-its-Kind AI Processor Developed

0
The first artificial intelligence processor that is a deep neural-network accelerator, delivering both high operational capability and high energy conversion efficiency for a full...

DSEI London 2025 – The Future of International Security: Technology, Collaboration,...

0
By: Or Shalom The DSEI London 2025 exhibition, which took place on September 9–12 at the ExCeL Centre in London, is the flagship event for...

Quantum Challenge – Speed Up Preparations

0
The world relies on encryption to protect everything from credit card transactions to databases holding health records and other sensitive information. A report from...
quantum

Technology Powerhouse Examines Quantum Encryption

0
There are plenty of ways that companies and scientists are attempting to integrate the weird effects of quantum mechanics into everyday technology. One potential...
image provided by pixabay

iHLS Innovation Centre Calls for Dual-Use Security Startups

0
Are you a startup company related to the security sector? Are you looking for recognition, international exposure, access to investors, and the ability to...
cyber

How Companies Can Minimize Cyber Attack Damage

0
The recent wave of ransomware attacks and preceding waves of cyber breaches could make it appear as though cyber criminals want their pay-off immediately....

Can’t be Cloned: Hydrogel Gives Products a Unique ID

0
A new material developed by researchers offers a promising route to secure, tamper-proof authentication for physical objects. At the heart of the innovation is...
quantum-based solution

Quantum-Based Solution for Connected Devices Security

0
A dichotomy inherent in the Internet of Things (IoT) is that one wants the devices to be cheap, often lightweight and small, with low...
images provided by pixabay

Call for Dual Use Technology Startups

0
Are you a startup company related to the security sector? Are you looking for recognition, international exposure, access to investors, and the ability to...
encryption

Innovative Tech for Battlefield Encryption

0
Military communications can be targeted by enemy forces operations in an attempt to learn about intentions and gain superiority at the battlefield this way....
Image provided by pixabay

The Growing Need for Satellite Cybersecurity

0
The expansion of the digital realm into space has opened new frontiers for cyber threats, posing unprecedented challenges. The satellites orbiting Earth are crucial for...
fax

Your Home Fax Might Help Hackers Take Over Your Network

0
A ground-breaking research dubbed Faxploit, conducted by CheckPoint, unfolds the shocking dangers of the seemingly simple and technologically innocent fax machine. The daunting news...

Satellites for Quantum Communications and Encryption

0
The developing field of quantum computing foretells a future in which current encryption processes are no longer safe. Researchers from the Technical University of...

Will Blockchain Secure Connected Devices?

0
IoT security is a substantial challenge as the use of the connected devices is becoming more and more widespread in every field. The consequences...
image provided by pixabay

EU Journalists Criticized Russia – and Got Hacked

0
A new investigation reveals that EU journalists and activists who have been critical of Russia were targeted with NSO’s Pegasus spyware. These cyberattacks reportedly targeted...

Websites First Defense Line is Vulnerable to Hackers

0
A new machine learning algorithm can break text-based CAPTCHA systems with less effort, faster, and with higher accuracy than all previous methods. It has...
blockchain

Blockchain’s New Civil Aviation Application

0
Blockchain technology has a wide range of applications. Currently, it is tested as a means to ensure the privacy and security of aircraft flight...
image provided by pixabay

Open Call for Startups With Dual-Use Technologies

0
iHLS and the Ministry of Defense invite you to join the fifth cycle of INNOFENSE and receive a remarkable opportunity to showcase your technology...

Vulnerabilities in Smart Security System of Leading Companies’ Installations

0
A  smart security system was found vulnerable for access to uploaded video recordings. Researchers found that Guardzilla’s top-selling indoor wireless security system contains a...
ihls security accelerator

Startup in Security Field? Apply Now to iHLS Security Accelerator

0
Apply Now! Are you a disruptive startup in the security field?  We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for...
image provided by Pixabay

EV Fast-Charging Equipment May Pose Cybersecurity Risks

0
In the past years, most security-savvy individuals have become highly cautious of connecting unfamiliar tech to their personal devices. We understand that we probably...
special forces

US Special Forces Receive Exceptional Video Capabilities

0
Video data link handheld radios were required in order to help US special forces personnel receive, transmit, and display full-motion video for situational awareness....

Latest

Metal That Behaves Like a Gel Could Redefine High-Temperature Systems

0
A research team at Texas A&M University has developed the world’s first metallic gel — a new class of material that combines the strength...