Home biometric security in the blink of an eye

0
Biometric identification technology is a highly advanced security measure that allows a high level of protection from entrance of unauthorized persons to specific areas....

The Internet of Things in the Fire-Fighting world

0
In the past, when people lived in the 1950’s, they must have thought that fire departments of the future will make extensive use of...

The IBM Spark

0
 IBM has announced that from now on it will put its energies in the open source code project, Apache Spark, and defines is at...

Urban use of Internet of Things – pros and cons

0
Researcher for the Center of Strategic and International Studies (CSIS), Breanna Thompson, wrote in an article that integrating the Internet of Things trend into...

iHLS TV Future Forces For HLS

0
Future Forces For HLS Future Forces 4 HLS   The upcoming conference for the HLS Future Forces is to be held on July 21st, bringing with...

U.S. goverment behind in technological advancement

0
A research done several months ago by a leading american research institure, Brookings, shows the the rate of technological advancement has been speeding up...

The dangers of Internet-of-Things in Healthcare

0
The medical technologies have been taking a giant leap in the past years, producing instruments that can monitor, store and transmit data on one’s...

Israeli counter terror expertise to Kenya

0
Ten Israeli security firms have offered to provide security consultancy, intelligence and counter-terrorism expertise to Kenyan government and private security following a series of...

China Warns Its Soldiers: Wearable Tech Could Leak Secrets

0
The Chinese military said fitness trackers and watches could send private and strategic data to hackers who've gained access to the vulnerable devices. China...

UAV regulation: is the FAA warming up to users?

0
FAA unveils 2 drone programs to gauge UAV use The U.S Federal Aviation Administration (FAA) is testing the skies with more drones. It has allowed...

Is ISIS besting counterterror efforts?

0
Experts: ISIS's social media terrorist messaging far ahead of US government efforts to counter it. The U.S. government is a doing a feeble job of...

US cities vying to become nation’s cyber hub

0
The need for cybersecurity solutions and experts is going to grow as more companies such as Sony Pictures, Target, Home Depot, and Chase are...

How to protect U.S. grid from cyber attacks

0
The US electrical grid remains alarmingly vulnerable to a variety of cyber threats. Judging by the number and type of cyber incidents reported to...

Cloud based security systems – the Israeli innovation

0
In recent years, cloud based security systems have become the last word in security. It is hardly surprising that Israel is home to numerous...

The device that will protect your vehicle from “Sticky bombs”

0
By: Eyal Avidov   So called ’Sticky bombs’ are becoming a global threat and are commonly used by terror groups, local mafia and other para-military organizations....

Online Fraud and Security Attacks

0
F5 Helps Global Enterprises Counter Online Fraud and Security Attacks New Security Operations Center improves efficiency, shortens response time, and decreases IT overhead by providing...

Big Data Solution: Simplicity and technological excellence

0
Organizations the world over have already been taking into account that Data with a capital D is the organization’s primary asset, and that consequently,...

iHLS TV Weekly Video Report – March 31st 2015

0
Register to iHLS Israel Homeland Security In this weekly Video report (March 31st 2015): Missile Defense: US Unveils Innovative AEGIS System ISIS Recruiting In New York The Threat:...

Cyber collaboration

0
Lockheed Martin partners with Israel on national cyber curriculum Collaboration Focused on Developing Next-Generation Workforce. The Israeli Ministry of Education has partnered with Lockheed Martin to...

BitWhisper

0
Hacking into computer systems in order to gain remote access to the data they store requires first and foremost communication. There are various methods...

Is Canada a cyber-superpower?

0
The secret hacking tactics of Canada’s intelligence agency Canada’s electronic surveillance agency has secretly developed an arsenal of cyber weapons capable of stealing data and...

Three Charged with One of the Largest Reported Data Breaches in...

0
Earlier this month, two indictments were brought against two Vietnamese citizens residing in the Netherlands, for their respective roles in hacking email service providers...

Latest

California Jury Rules Against Google Over Alleged Unauthorized Data Collection

0
A California jury has ruled that Google unlawfully collected data from Android users without their consent, even when those users were not connected to...