battlefield

On Battlefield – It’s All About the Battery

0
Portable and wearable technology is supporting the future of military medical devices. Following the rise of the Internet of Things (IoT), there are a...

BlackBerry Platform Connects Vehicles to Smart City

0
BlackBerry’s Security Credential and Management System (SCMS) lets autonomous vehicles communicate with wired objects in the Intelligent Traffic Systems, as part of the Smart...
software

New Software to Prevent Biological Attacks

0
US Federal research facilities rely on internet-connected devices to automate many basic building functions like ventilation, heating and security, as well as more hazardous...

Video Security Cameras Need Protection

0
The number of video security cameras is increasing every hour and everywhere. Private people and organization want to have their eye on their property...
startup

Startup in the Security Field? Join iHLS Accelerator

0
Are you a disruptive startup in the security field? We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for civilian...

Honeypots Attracted Connected Car Hackers

0
Vehicle software is continuously gaining sophistication, creating new threat vectors in the process. As autonomous and connected vehicles become software driven, risks increase that...
cybersecurity

Israeli Cybersecurity at Forefront of War Against Cybercrime

0
The cyber incidents that dominated global headlines over the past year indicated not only a growing trend but one that is escalating in size,...
bluetooth chip

Bluetooth Chip – Vulnerable Part of Connected Devices

0
Wireless access points can come in many forms, such as a router or an internet of things device. If a hacker gains access to...
autonomous car

Autonomous Car Security Tech to Be Implemented in UAVs

0
With the increasing automation and widespread use of unmanned aerial systems, potential cyber-attacks on aerial fleets are already a major concern. A recent collaboration...
Iot

Attend IoT for Security and Smart City Conference and Exhibition

0
Attend the largest and leading conference in Israel on IoT (Internet of Things) from the security perspective on December 24th, 2018. The IoT for Security...
images provided by pixabay

Call for Dual Use Technology Startups

0
Are you a startup company related to the security sector? Are you looking for recognition, international exposure, access to investors, and the ability to...
Image by Unsplash

The Smart Ring that Controls any Device by Pointing at It

0
Smart home technology continues to evolve, and slowly more and more such devices have become commonplace in our everyday life. However, controlling these devices...
IOT security

Internet Giant will Supply Mobile and IoT Security

0
Cloudflare, the internet infrastructure and networking giant, has been expanding its focus to include mobile privacy and the security of connected devices. On November 11,...
image provided by pixabay

Connecting Satellite Constellations and the Internet of Things

0
Nowadays, the number of connected objects that compose the Internet of Things (IoT) is growing quickly – today's 15 billion connected devices are expected to...
Image by Pexels

FBI Warns of Malware Preinstalled on Low-Cost Android Devices

0
Millions of Android devices around the world have been compromised by a preinstalled malware strain known as BadBox 2.0, according to a recent warning...
startup competition

Coming Soon! Prestigious Startup Competition for Security, Defense and HLS

0
iHLS is delighted to host for the first time the prestigious Startup Competition for innovative technologies in the security, defense and homeland security fields,...

Smart Watch to Fulfill New Role

0
Firefighters, law enforcement officers and other first responders have to be constantly connected. Legacy communication systems or smartphones are not always the right and...

Learning To Deal With Cyber Attacks

0
Cyberattacks and the methods by which the public and private sectors deter and counter them have occupied the headlines with increasing frequency in today’s...
Image provided by pixabay

Dual-Use Startups Open Call

0
INNOFENSE Call for startups – Dual-Use Technologies: Following the immense success of the previous four cycles and their integration into the defense sector, iHLS invites...

Iran Hacks Security Cameras to Monitor Israeli Movements in Real Time

0
A recent cybersecurity warning has revealed that Iran is actively exploiting weaknesses in internet-connected home security cameras across Israel, using them to monitor military...
Router

Secure Your Router with 4 Steps

0
Securing our routers and ensuring they are safe and protected is sometimes neglected by many. It is essential to check your router settings and...
startup competition

Your Next Opportunity! Apply to Security and HLS Startup Competiton

0
iHLS is delighted to host for the first time the prestigious Startup Competition for innovative technologies in the security, defense and homeland security fields,...

Latest

Bugs for Better Health: A Biological Route to Gout Prevention

0
For centuries, gout has been associated with painful joints. In reality, it’s the outcome of years of elevated uric acid levels—known as hyperuricaemia—that gradually...