On Battlefield – It’s All About the Battery
                Portable and wearable technology is supporting the future of military medical devices. Following the rise of the Internet of Things (IoT), there are a...            
            
        BlackBerry Platform Connects Vehicles to Smart City
                BlackBerry’s Security Credential and Management System (SCMS) lets autonomous vehicles communicate with wired objects in the Intelligent Traffic Systems, as part of the Smart...            
            
        New Software to Prevent Biological Attacks
                US Federal research facilities rely on internet-connected devices to automate many basic building functions like ventilation, heating and security, as well as more hazardous...            
            
        Video Security Cameras Need Protection
                The number of video security cameras is increasing every hour and everywhere. Private people and organization want to have their eye on their property...            
            
        Startup in the Security Field? Join iHLS Accelerator
                Are you a disruptive startup in the security field?
We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for civilian...            
            
        Honeypots Attracted Connected Car Hackers
                Vehicle software is continuously gaining sophistication, creating new threat vectors in the process. As autonomous and connected vehicles become software driven, risks increase that...            
            
        Israeli Cybersecurity at Forefront of War Against Cybercrime
                The cyber incidents that dominated global headlines over the past year indicated not only a growing trend but one that is escalating in size,...            
            
        Bluetooth Chip – Vulnerable Part of Connected Devices
                Wireless access points can come in many forms, such as a router or an internet of things device. If a hacker gains access to...            
            
        Autonomous Car Security Tech to Be Implemented in UAVs
                With the increasing automation and widespread use of unmanned aerial systems, potential cyber-attacks on aerial fleets are already a major concern. A recent collaboration...            
            
        Attend IoT for Security and Smart City Conference and Exhibition
                Attend the largest and leading conference in Israel on IoT (Internet of Things) from the security perspective on December 24th, 2018.
The IoT for Security...            
            
        Call for Dual Use Technology Startups
                Are you a startup company related to the security sector? Are you looking for recognition, international exposure, access to investors, and the ability to...            
            
        The Smart Ring that Controls any Device by Pointing at It
                Smart home technology continues to evolve, and slowly more and more such devices have become commonplace in our everyday life. However, controlling these devices...            
            
        Internet Giant will Supply Mobile and IoT Security
                Cloudflare, the internet infrastructure and networking giant, has been expanding its focus to include mobile privacy and the security of connected devices.
On November 11,...            
            
        Connecting Satellite Constellations and the Internet of Things
                Nowadays, the number of connected objects that compose the Internet of Things (IoT) is growing quickly – today's 15 billion connected devices are expected to...            
            
        FBI Warns of Malware Preinstalled on Low-Cost Android Devices
                Millions of Android devices around the world have been compromised by a preinstalled malware strain known as BadBox 2.0, according to a recent warning...            
            
        Coming Soon! Prestigious Startup Competition for Security, Defense and HLS
                iHLS is delighted to host for the first time the prestigious Startup Competition for innovative technologies in the security, defense and homeland security fields,...            
            
        Smart Watch to Fulfill New Role
                Firefighters, law enforcement officers and other first responders have to be constantly connected. Legacy communication systems or smartphones are not always the right and...            
            
        Learning To Deal With Cyber Attacks
                Cyberattacks and the methods by which the public and private sectors deter and counter them have occupied the headlines with increasing frequency in today’s...            
            
        Dual-Use Startups Open Call
                INNOFENSE Call for startups – Dual-Use Technologies:
Following the immense success of the previous four cycles and their integration into the defense sector, iHLS invites...            
            
        Iran Hacks Security Cameras to Monitor Israeli Movements in Real Time
                A recent cybersecurity warning has revealed that Iran is actively exploiting weaknesses in internet-connected home security cameras across Israel, using them to monitor military...            
            
        Secure Your Router with 4 Steps
                Securing our routers and ensuring they are safe and protected is sometimes neglected by many. It is essential to check your router settings and...            
            
        Your Next Opportunity! Apply to Security and HLS Startup Competiton
                iHLS is delighted to host for the first time the prestigious Startup Competition for innovative technologies in the security, defense and homeland security fields,...            
            
        
            














































