Internet of Things (IoT)

Internet of Things (IoT)

Have we completely given up on privacy? When it comes to wireless charging, aka wireless power, the answer is probably ’yes’. Though they have become indispensable...

The country’s air traffic control systems are vulnerable to hackers. This, according to a 42-page document entitled "Information Security: FAA Needs to Address Weaknesses...

We are all understandably ’hysterical’ about maintaining our privacy. There is no doubt this is a burning, crucial issue. Nevertheless, we ought to bear...

U.S DHS launches $25K prize for innovative ways to track first responders indoors during incidents. The Homeland Security Department's research and development arm announced it...

Kaspersky Lab discovers the ancestor of Stuxnet and Flame – powerful threat actor with an absolute dominance in terms of cyber-tools and techniques. For several...

American companies welcome next year's budget for Cyber security. Massachusetts cyber security firms applauded President Barack Obama proposed $14 billion allocation toward cybersecurity initiatives...

Nowadays, everything is available at the palm of our hand. Nevertheless, these amazing capabilities, combined with our instinctive fear of the "Big Sister Syndrome"...

Register to iHLS Israel Homeland Security In this weekly Video report (February 3rd 2015): Coalition against Isis: Too Little Too Late Kaspersky Technology Forecast for 2045 The US...

The U.S. is realizing step by step to what degree it is vulnerable to Cyber attacks. According to HomeLand Security News Wire, while most cybersecurity...

Human-controlled robotic systems anywhere in the world and even in space constitute the solution to various logistic and other barriers to human presence. Dr. Andre...

Yoram Hacohen Three interesting processes are underway as a direct result of Edward Snowden’s revelations about the extent of the access by US security services...

2015 will see an increase in Cyber Warfare incidents. McAfee Labs' 2015 Threats Predictions report sees increased cyber-warfare and espionage, along with new strategies from...

Analysis of Firsthand Experiences of the World’s Most Renowned Cybersecurity Forensics Teams Pinpoints Exploitation of Privileged Accounts as a “Signature” in Targeted Attacks. A new...

In a recent C-SPAN interview by Mary Jordon from the Washington Post, Dr. Arati Prabhakar, director of the Defense Advanced Research Projects Agency (DARPA), conducted stated:...

Forty years ago, a group of researchers with military money set out to test the wacky idea of making computers talk to one another...

By Gad Elkin "The next phase of the internet will be focused on information and powered by connectivity. Cloud computing, big data and Internet of...

This problem is getting more serious - the inadequacy of current network security systems, which require expert programmers to identify and repair system weaknesses...

We're entering a new age, an age where our devices are connected to the internet, communicating through the net to fulfill various needs. When...

Due to expanding cyber-attack vectors on the energy grid and the significant growth in popularity of electric vehicles (EV’s), Nation-E, a provider of energy...

Mr. Paul P. Chen is the MILS Senior dirctor and product manager for Wind River, the VxWorks Multiple Independent Levels of Security technology vendor. I...

Internet of Things, a business growing at a compound annual rate of 7,9% that is a privileged target for hackers and cyber criminals. The Internet...

On the first day of Intel's annual convention, the Intel Developers Forum (IDF), the company revealed a new processor family – Intel Quark, talking...

iHLS Events