Next phase of cyber intrusions will include destruction, manipulation of data
                James Clapper, director of U.S. intelligence, and other senior intelligence officers, have warned Congress that the next phase of escalating online data theft will...            
            
        Former Intelligence Senior: “Internet of Things” Increases Threat to Infrastructure
                A  simple Web search can reveal information from thousands of unsecured devices. Even the casual browser can access camera data from Sweden, video game...            
            
        Security Risks in Smartphone-Vehicle Interface
                Many of today’s automobiles leave the factory with secret passengers: prototype software features that are disabled but can be unlocked by clever drivers.
In what...            
            
        Elbit Provides RUAG Defence with Cyber Security Simulator
                Elbit Systems' wholly-owned subsidiary, CYBERBIT, was awarded a contract to provide the Switzerland-based company, RUAG Defence, with CYBERBIT’s CyberShield - Cyber Security Trainer and...            
            
        Internet of Things Comes To Antarctica
                Internet of Things (IoT) connectivity provider Sigfox will team up with GPS supplier Sonsolus and the Belgian government to provide a low-power, ultra-narrow band...            
            
        Terrorism: Agriculture Should Have No Less Concerns
                The US House of Representatives Committee on Homeland Security’s Emergency Preparedness, Response, and Communications Subcommittee recently held a hearing to examine the threat level...            
            
        US Steel: China Uses Cyber Stealth To Steal Secrets
                US Steel Corporation, one of the world’s largest producers of steel, has filed a complaint with the US International Trade Commission (ITC) accusing China...            
            
        US to Provide Support For Chinese Nuclear Security Training Center
                U.S. Sandia national labs and their Chinese counterparts have launched the Chinese Center of Excellence (COE) for nuclear security. Homeland Security News Wire reports...            
            
        iHLS TV Weekly Video Report – February 3rd 2015
                
Register to iHLS Israel Homeland Security
In this weekly Video report (February 3rd 2015):
	Coalition against Isis: Too Little Too Late
	Kaspersky Technology Forecast for 2045
	The US...            
            
        How Are Cyber Companies Really Doing In The Startup Nation?
                Israel’s cyber sector is still dominated by startups, despite “growing at a breakneck pace,” according to the folks over at the Defensive Cyber Operations...            
            
        How to protect U.S. grid from cyber attacks
                
The US electrical grid remains alarmingly vulnerable to a variety of cyber threats. Judging by the number and type of cyber incidents reported to...            
            
        Liquid Fingerprinting Technology will Aid First Responders
                A new technology, Watermark Ink (W-INK), can distinguish liquids by their surface tension. The technology that can perform instant, in-field characterization of the chemical...            
            
        DHS Urges Utilities To Prepare For Cyber-Attacks
                Cyber is the war turf, that much has become painfully clear. The recent cyber attacks on Ukrainian electrical infrastructure demonstrate that much. The US...            
            
        3D Printing Technology – Advantages and Risks
                3D printing is a new emerging technology with applications at the civilian and military production. However, it has some cybersecurity and other implications that...            
            
        Princeton: IoT Devices’ Security Flawed
                The Internet of Things (IoT) is growing, soon to be a permanent feature of our lives, but there are some things about it which...            
            
        Day After Cyber Agreement: China Attacks
                Last month President Barack Obama said that the U.S. would be “watching closely” to see if “words are followed by actions” after he and...            
            
        The Robot at your side may kill you
                The rush to automate more factory processes may look like it’s saving money, but to Ken Westin, a senior security analyst at Tripwire, it’s...            
            
        New Video Monitoring and Security Solutions for Smart Cities
                Three new Video Management Platform (VMP) models for video security and monitoring purposes were introduced by Hitachi Insight Group. The models combine virtualized compute...            
            
        Iran Is Challenging IoT Security
                As we have previously reported, the Internet of Things (IoT) may be on the brink of changing our lives - but before that happens...            
            
        Great Interest in IHLS Big Data for Homeland Security Conference
                iHLS fifth annual conference on Big Data for Homeland Security attracted many technology experts, investors, entrepreneurs and representatives of the high-tech industries, defense industries,...            
            
        Falling Behind in the Cyber War
                By Rachel Ehrenfeld
Shutting down the background check system of the Office of Personnel Management employees will do little to prevent the abuse of millions...            
            
        Obama wants YOU for US CyberCorps!
                President Barack Obama’s administration released the presidential Cybersecurity National Action Plan (CNAP) this week. CNAP is an attempt to fix the broken federal information...            
            
        
 
            
