World’s First Blockchain Secured Smartphone
More and more industries have been discovering the blockchain technology advantages in the field of enhanced security against hackers. Blockchain is a secure database...
The Secure Communication of the Future City
Today, mathematical algorithms are used to encrypt text messages, banking transactions and health information. Intercepting these encrypted messages requires figuring out the exact algorithm...
New Emergency Function by Smartphone Giants
Apple's new operating system will come with an option to lock your iPhone's fingerprint scanner and bring up a hotline to the police. The...
Computer Security to Be Achieved by Mini-Mazes
As hacking techniques are constantly improving, scientists have been trying to find new ways and authentication methods to secure computers. Researchers in South Korea...
A Startup Company is Securing Mobile Communication Privacy for US Enterprises
The iHLS Security Accelerator is home to many innovative and successful startups. ListenApp is one of the first startups that's participated in the accelerator...
USB-Connected Devices Are Not Secure As Thought
Security flaws found in USB-connected devices raise questions about the trustworthy of the devices. Apparently, USB connections should be redesigned to offer more security,...
Cyber Security Rules for Autonomous Vehicles Set by UK
The United Kingdom has recently published a set of cyber security regulations, “Key principles of vehicle cyber security for connected and automated vehicles”. The...
Meet the World’s Smallest Non-Hackable Chip
The more digital the world becomes, the more hacking becomes a serious threat. The world's smallest "non-hackable" security chip that can be widely used...
Will Blockchain Tech Revolutionize Cybersecurity?
With Blockchain becoming more popular these days, a significant number of US government departments are rapidly showing interest. The US Department of Homeland Security...
New Video Streaming Solutions for the Battlefield
The video and metadata requirements of modern military and defense missions have been evolving rapidly, making live, real-time video delivery and management in the...
China’s Cybersecurity Law Influences Tech Giants
There has been a growing global trend regarding the security and sovereignty of digital data - building facilities that store online data closer to...
Communication Encryption Dilemma
The past few years have been rough on law enforcement agencies around the world. Online communication is encrypted most of the time, making it...
Digital Identity and Cryptographic Technology to Enhance IoT Security
Recent cybercrime and hacking exploits have shown clearly that much of the IoT – devices, services and applications – is coming online largely in...
Current IoT Security Industry Trends
Internet of Things - IoT security breaches have been dominating headlines lately. Even if you personally don’t suffer consequences of the mediocre security of...
Encryption Tech Enhances Marines’ Command and Control Capabilities
The US Marine Corps has been enhancing its command and control capabilities. Since July 2016, the corps has rolled out 1,100 units of its...
Islamic State in India – Recruitment Patterns and Technology Use
Technologically-advanced Islamist terror groups gain momentum in India. India’s intelligence agencies and state police forces coordinated to bust a hitherto unknown jihadist cell, apparently...
IOT Security – An American Top Priority
The U.S. Department of Homeland Security (DHS) is planning to invest $1 million in five IoT security startups selected through its program Securing the...
Threat Calls Against US Jewish Institutions – Using Masking Technologies
Federal investigators believe the latest wave of threat calls against Jewish centers and schools around the country was a coordinated attack perpetrated using sophisticated...
Which Smartphone Will Serve for Secure Military Communications?
The UK military chose the smartphone that warrants the utmost security against malicious actors, for its sensitive communications. The iPhone 7 is being turned into...
Digital Identity to Go Through Security Revolution
A national digital identity network is to be built in Canada. SecureKey Technologies and a Canadian non-profit coalition have received a grant from a...
Startup Festival – Call for Pitches in All Technology Fields
We are delighted to invite you to participate in a unique event and present on our stage your original ideas to investors, customers and...
Blockchain Technology Enters Homeland Security Department
The US Department of Homeland Security (DHS) is preparing to utilize Blockchain technology, an approach in technology that replaces data managers with encrypted blocks...