Most Cyber Products Will Not Be Included Under New Supervision Law

0
About two weeks after publishing the draft of the export law for supervision on cyber export, and as part of the talks between exporters...

This Electronic Chip Will Self Destruct in…

0
A new chip built on strained glass can shatter within 10 seconds when remotely triggered. Such technology could prove tremendously useful for the U.S....

The Secrets of Security Video Analytics

0
Due to improvements in the field, the demands of connected cameras today are increasing. One of the technologies that security cameras offer us today is...
IoT. image by pixabay

INNOFENSE Call for startups – Dual-Use Technologies

0
iHLS and the Ministry of Defense invite you to join the fifth cycle of INNOFENSE and receive a remarkable opportunity to showcase your technology...

Start-Up: Cyber Security Software from Hardware Point of View

0
It's no news that today institutes from all sectors, international banks to hospitals, are seeking for a complete cyber defense layer. Cyber DriveWare, which...

The Robot at your side may kill you

0
The rush to automate more factory processes may look like it’s saving money, but to Ken Westin, a senior security analyst at Tripwire, it’s...

Day After Cyber Agreement: China Attacks

0
Last month President Barack Obama said that the U.S. would be “watching closely” to see if “words are followed by actions” after he and...

Israel: An Exemplar Of Cyber Development For The World Economic Forum

0
During the World Economic Forum in Davos, Switzerland in January, Israeli Prime Minister Benjamin Netanyahu led discussions on the subject of cyber security, and...

New Cargo Radiation Detection Technology

0
Seaports customs and security professionals might sometimes miss contraband attempts, including radiological materials. The problem was hightened during a US congressional hearing, when officials...

“Movie-Style” Surveillance and Operations vehicles

0
You are standing by a white, shiny, family car. This car looks just like the car next door. You are going past a new SUV,...
Image by Unsplash

New Study Reveals How Encrypted Robot Commands Can Still Leak Sensitive...

0
As collaborative robots become more common across healthcare and industrial environments, new research highlights a critical gap in how these systems handle privacy—even when...
malicious drone illustration

New Detection Solution Against Malicious Drones

0
As drones become more prominently used, so does the misuse of these emerging technologies. New drone detection solution could protect military bases, venues, cities...
image provided by pixabay

Predictive Maintenance Using the Power of Satellites

0
Study reveals that SAR satellite data can provide early detection of infrastructure issues and help prevent further damage to roads, like an annual health...

Leading Industry Experts at the Offshore & Perimeter Security Conference

0
Leading experts from Israel and the world in the field of perimeter & offshore security are participating in the conference taking place today today...

The U.S energy sector under Cyber attacks

0
The energy sector is reporting an enormous increase in the number of attempted cyber attacks in 2013, according to a new report from the Department of...

Are There Solutions For Continuous Cyber Attacks?

0
The last few weeks saw a number of financial companies become a target for cyber attacks and attempted blackmail using threats. The companies attacked...

Falling Behind in the Cyber War

0
By Rachel Ehrenfeld Shutting down the background check system of the Office of Personnel Management employees will do little to prevent the abuse of millions...

EMP Could Toast Electrical Grid (And How To Protect Against It)

0
Canada and the United States are vulnerable to cataclysmic threat that could “topple the pillar of civilization,” according to Dr Peter Pry, head of...

Iran Is Challenging IoT Security

0
As we have previously reported, the Internet of Things (IoT) may be on the brink of changing our lives - but before that happens...

U.S. responds to cyber threats.

0
U.S. Army War College in Carlisle, Pa. has grouped together the best minds on cyber in order to brainstorm and create a new defense...

Explosive Environments – the Israeli Challenge

0
By Ilan Cohen, ITL CTO Two decades ago Israel was not a player in the explosive environment arena. There was some minimal activity in the...
mapping

New Mapping Solution for Improved Security Surveillance

0
A new geospatial mapping interface allows users to better comprehend physical location information. The use of static facility floor plans overlaid directly onto the...

Latest

Metal That Behaves Like a Gel Could Redefine High-Temperature Systems

0
A research team at Texas A&M University has developed the world’s first metallic gel — a new class of material that combines the strength...