Video data link handheld radios were required in order to help US special forces personnel receive, transmit, and display full-motion video for situational awareness....
Apply Now!
Are you a disruptive startup in the security field?
We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for...
iPhones encrypt user data by default. Those in physical possession normally cannot access the phone’s data, such as contact list, saved messages, or photos,...
Apply Now!
Are you a disruptive startup in the security field?
We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for...
Are you a disruptive startup in the security field?
We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for civilian...
Are you a disruptive startup in the security field?
We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for civilian...
The recent wave of deadly terrorist attacks in Europe, particularly in Paris, has raised questions regarding illegal firearms, such as deactivated Kalashnikov rifles, that...
The IoT network is capable of connecting many different sensors integrated in civil structures, appliances, vehicles, manufacturing equipment, etc. to online servers. However, one...
Autonomous vehicle technology is an emerging global market. By 2025, the partially autonomous vehicles market is expected to be at 36 billion U.S. dollars...
With the increasing automation and widespread use of unmanned aerial systems, potential cyber-attacks on aerial fleets are already a major concern. A recent collaboration...
State-run VTSIOM will introduce cutting-edge blockchain technology for exit polls at the forthcoming Russian presidential elections. It’s designed to ensure transparency of data collection...
We at the iHLS Security Accelerator are looking for disruptive ground-breaking technologies offering solutions for civilian defense, securing government institutions, vital infrastructure and borders,...
The vast array of connected industrial devices, such as embedded sensors, smart lighting, and monitoring systems, requires high levels of security. Most sensitive web...
Gathering insights from big data regarding future trends requires data scientists’ expertise and can take weeks or even months. Now, an MIT spinout has...
While IoT devices and the data they collect and transmit present enormous benefits to consumers and industry, the relative insecurity of many devices presents...
Lawmakers in the European Union have advanced plans to subject hacking tools to export controls currently reserved for depleted uranium, human pathogens and other...
Many smartphones encrypt their contents when locked, as standard - a security feature that often prevents even the phones' manufacturers from accessing data. Such...
Due to the rise of mobile transactions, passwords are not sufficiently secure as a means of authentication, and additional modes are required for next-generation...