Internet of Things – for Smart and Secure City Management
                The Internet of Things (IoT) merges software and hardware with network connectivity, for the benefit of creating smart cities and safe cities.
IoT devices -...            
            
        Next phase of cyber intrusions will include destruction, manipulation of data
                James Clapper, director of U.S. intelligence, and other senior intelligence officers, have warned Congress that the next phase of escalating online data theft will...            
            
        Air-Gapped Computers Proven To Be Penetrable
                Researchers from the  Ben-Gurion University of the Negev (BGU) Cyber Security Research Center have discovered that virtually any cellphone infected with a malicious code can use GSM phone frequencies...            
            
        Growing Role of Video Analytics at the Security and Marketing Sectors
                The role of video analytics in the security and law enforcement fields has been growing, and its  functions have expanded to traffic control and...            
            
        Use Your Smartphone to Detect Drones
                Alongside the new opportunities offered by drone technology, people become concerned about their security and privacy. There has been a growing need for drone...            
            
        The New Cryptography: Carbon Nanotubes
                Carbon nanotubes - is there anything they can’t do? They’re strong, hard, loaded with unique electrical, thermal, and optical properties, and have been heralded...            
            
        Perimeter Security Market Expected To Grow Significantly
                A new global forecast predicts that the market for perimeter intrusion detection systems will grow from its $2.36bn last year to $3.37bn by 2020,...            
            
        China To Build Spy-proof Smartphones
                For years digital security experts have worried over possible backdoors implemented into equipment manufactured at Chinese factories. Over the years there have been several...            
            
        New Cargo Radiation Detection Technology
                Seaports customs and security professionals might sometimes miss contraband attempts, including radiological materials. The problem was hightened during a US congressional hearing, when officials...            
            
        Will China Become An IoT International Power?
                The Internet of Things (IoT) is network of uniquely identifiable endpoints (or "things" that communicate without human interaction using IP (Internet Protocol) connectivity. The...            
            
        Smart Communications to Bring Breakthrough in Industrial IoT
                As we move toward industrial things being digital and connected, putting in place the right communications infrastructure is a critical piece of the Industrial...            
            
        The Future of Security, Robots?
                Robots might be the next trend for private security. For the moment, the robots are essentially designed to patrol a certain area. They've got...            
            
        Elbit acquires NICE Systems Cyber and Intelligence division
                Elbit Systems Ltd. announced today that it has signed an agreement to acquire  NICE Systems Cyber and Intelligence division for a total amount of...            
            
        New Israeli Development Protects GPS Devices From Jamming
                Focus Telecom has launched a revolutionary new cyber product, GPSdome, which protects GPS devices from electronic jamming. The new GPS anti-jamming is designed to...            
            
        iHLS TV Weekly Video Report – February 3rd 2015
                
Register to iHLS Israel Homeland Security
In this weekly Video report (February 3rd 2015):
	Coalition against Isis: Too Little Too Late
	Kaspersky Technology Forecast for 2045
	The US...            
            
        Great Interest in IHLS Big Data for Homeland Security Conference
                iHLS fifth annual conference on Big Data for Homeland Security attracted many technology experts, investors, entrepreneurs and representatives of the high-tech industries, defense industries,...            
            
        New Mapping Solution for Improved Security Surveillance
                A new geospatial mapping interface allows users to better comprehend physical location information. The use of static facility floor plans overlaid directly onto the...            
            
        Falling Behind in the Cyber War
                By Rachel Ehrenfeld
Shutting down the background check system of the Office of Personnel Management employees will do little to prevent the abuse of millions...            
            
        How Are Cyber Companies Really Doing In The Startup Nation?
                Israel’s cyber sector is still dominated by startups, despite “growing at a breakneck pace,” according to the folks over at the Defensive Cyber Operations...            
            
        Can Hackers Leave Us Cold This Winter?
                If a hacker is capable of breaking in to our computer systems, with a little more effort surely they could disrupt larger targets as...            
            
        Critical Infrastructure In Danger From Hackers
                When we think about protecting critical infrastructure, we usually imagine cameras, fences, men with guns, and other physical manifestations of security. But experts are...            
            
        Stefanini Announces New Cooperation With Israel’s Rafael
                Stefanini, one of the most important global providers of business solutions technology, plans to create a joint venture in Brazil with one of the...            
            
        
 
            
