photo illus. cybersecurity by Pixabay

The Other Side of Encrypted Communications

0
A global organization called on tech companies to come up with a solution for law enforcement to access end-to-end encrypted communications. Members of the...
Photo illus. cyber security by Pixabay

Best HLS, Cyber & Innovation Experts at InnoTech International Live Conference...

0
The COVID-19 pandemic has intensified the multiple challenges states and cities are currently facing. Technology has become more and more important in our daily...
Cyber space. image by pixabay

New Encryption Method To Fight Crime

0
The Council of the European Union is on the lookout for secure encryption and lawful data access. The organization has adopted a resolution calling...
image provided by pixabay

Hackers can Spy on Cameras Through Walls

0
Security cameras are our first line of defense in many fields of life, from our homes to the bank. But what if they aren't...
image provided by pixabay

Will Quantum Computing Spark Cybersecurity Armageddon?

0
IBM claims that quantum computers will wreak havoc on the world of cybersecurity by the end of the decade, and governments and businesses are...
cyber attack

Cyber Attack on Weapon Systems is Easier than You’d Think

0
All US weapons that the Department of Defense tested between 2012 and 2017 have “mission critical” cyber vulnerabilities, claims a new report from the...
Photo illustration US Navy

Two-Factor Verification in Response to Shared Economy Challenges

0
A new technology provides a quick, easy confirmation that the person you’re looking at is the person they say they are.  When the driver,...
autonomous

Quantum Technology to Secure Autonomous Car

0
Autonomous vehicle technology is an emerging global market. By 2025, the partially autonomous vehicles market is expected to be at 36 billion U.S. dollars...
cybersecurity

Will Blockchain Tech Revolutionize Cybersecurity?

0
With Blockchain becoming more popular these days, a significant number of US government departments are rapidly showing interest. The US Department of Homeland Security...
ihls security accelerator

Join the Game! iHLS Security Accelerator is Opening its 5th Startup...

0
Apply Now! Are you a disruptive startup in the security field?  We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for...

“In the COVID-19 Age – Security, Cyber, and Innovation Have Gained...

0
The INNOTECH International Live Conference Broadcast for HLS, Cyber, and Innovation on December 8-9 will host the leading experts at the intriguing panel discussion....
image provided by pixabay

Stop Encryption on Social Media, Says European Police

0
Europe’s Police Chiefs and Europol are calling for politicians and industry leaders to take urgent action to ensure public safety across social media platforms,...

Exposure to Defense Industries – One-Time Opportunity for Startups!

0
This happens only once a year! iHLS’ unique Startup Competition is a one-time opportunity for startups - in one day you can get exposure to...
quantum

Quantum Computing Revolution Coming Sooner than Expected

0
Encryption systems have never been unbreakable, rather their security is based on the huge amount of time it would take for a classical computer...
Photo illust quntum Pixabay

Towards Transition to Quantum Computing 

0
While quantum computing is expected to offer unprecedented computing speed and power it also poses new risks, as global competition accelerates.  As the technology advances,...
satellite-based solution

More Secured Communications – Through Space

0
A recent European initiative is expected to provide secure connectivity for citizens, commercial enterprises, and public institutions, as well as providing global coverage for...

IoT Security – Killing the Problem at Its Source

0
In an internet-connected world where devices are networked, the security of embedded devices is essential, as they are more and more exposed to cyber...

Secure Communications – Enabled by 3mm Chip

0
In most leading security standards used in secure communication methods — from withdrawing cash from the ATM to purchasing goods online on the smartphone...

Cyber Security Researchers Exfiltrated Data from Isolated Computers

0
Researchers from the Ben-Gurion University of the Negev (BGU) have demonstrated that an unmodified USB connected to a computer with malicious code can be...
Processor

First-of-its-Kind AI Processor Developed

0
The first artificial intelligence processor that is a deep neural-network accelerator, delivering both high operational capability and high energy conversion efficiency for a full...

Bypassing Encryption Under Protection of Law

0
In an attempt to target Islamist terrorism, pedophile networks and organized crime, several governments worldwide have been leading a policy forcing technology companies to...
IoT security

Digital Identity and Cryptographic Technology to Enhance IoT Security

0
Recent cybercrime and hacking exploits have shown clearly that much of the IoT – devices, services and applications – is coming online largely in...

Latest

Image from video https://www.youtube.com/watch?v=M1Z5fCmJ1mE&t=1s&ab_channel=%D0%A1%D0%BB%D1%83%D0%B6%D0%B1%D0%B0%D0%B1%D0%B5%D0%B7%D0%BF%D0%B5%D0%BA%D0%B8%D0%A3%D0%BA%D1%80%D0%B0%D1%97%D0%BD%D0%B8

Ukraine’s Sea Baby Drones Just Got Deadlier

0
Ukraine improves its autonomous maritime capability by upgrading its “Sea Baby” multi-purpose unmanned surface vehicle (USV), which is now primarily focused on providing security...