The Dangers of IoT: Breaking-in Through The New Fridge
Everything around us is becoming “smarter”. Who of us hasn’t dreamt of turning on the boiler 15 minutes before we get home from a...
Smart City Technologies Are Thriving in New York City
Smart city and safe city technology beta projects and pilot programs are gaining ground in New York City, from free public Wi-Fi to smart...
Ransomware Threatens IoT Devices
Ransomware attack is one of the scenarios that security experts have been worrying about regarding the widening use of the Internet of Things. It...
New CyberSecurity Service Revealed
Although efforts continue to find autonomous solutions to cybersecurity, some companies believe that the human factor has still been important.
IBM Security announced the formation...
Embarrassing Malfunction Found in Google Security Cameras
Security vulnerabilities were found at a popular security product. A security researcher has recently published a vulnerability and proof-of-concept exploits in Google's Internet of...
Former Intelligence Senior: “Internet of Things” Increases Threat to Infrastructure
A simple Web search can reveal information from thousands of unsecured devices. Even the casual browser can access camera data from Sweden, video game...
Urban use of Internet of Things – pros and cons
Researcher for the Center of Strategic and International Studies (CSIS), Breanna Thompson, wrote in an article that integrating the Internet of Things trend into...
US cities vying to become nation’s cyber hub
The need for cybersecurity solutions and experts is going to grow as more companies such as Sony Pictures, Target, Home Depot, and Chase are...
Catching Up on Evolving Smart City Tech
The Punjab Information Technology Board (PITB), an autonomous body set by the Government of Punjab (a region partly in North India and partly in...
Internet of Things Comes To Antarctica
Internet of Things (IoT) connectivity provider Sigfox will team up with GPS supplier Sonsolus and the Belgian government to provide a low-power, ultra-narrow band...
Virtual Fence – Wireless Solution for US-Mexican Border Wall
A virtual fence could supply an additional security layer to the wall that the Trump administration is planning to build along the US border...
New Algorithms to Track Violent Groups on Twitter
New sentiment analysis algorithms are able to monitor the social network Twitter in search of violent groups. The system analyses both the messages they...
Everything’s Insecure, And We Need To Fix It
Electronic warfare, espionage, and hacking are now a reality of everyday life. While most of us go about without giving a second thought to...
Air Traffic Control System Vulnerable to Cyberattack
The country’s air traffic control systems are vulnerable to hackers. This, according to a 42-page document entitled "Information Security: FAA Needs to Address Weaknesses...
Internet of Things – Useful Yet Dangerous
Imagine that a hacker could break into a patient’s information and change the dosage their insulin pump injects into that patient’s body. Such a...
Pentagon to Launch Hacker Proof Helicopter Drone by 2018
This unmanned helicopter is designed to feature protection from hacking.
Boeing is set to replace 100,000 lines of code on its Little Bird drone before...
Start-Up: Integration at the Push of a Button
In a world where every organization works with a wealth of data sources - cameras, sensors, organizational processes etc. - there is a growing...
USB-Connected Devices Are Not Secure As Thought
Security flaws found in USB-connected devices raise questions about the trustworthy of the devices. Apparently, USB connections should be redesigned to offer more security,...
iHLS TV Weekly Video Report – February 3rd 2015
Register to iHLS Israel Homeland Security
In this weekly Video report (February 3rd 2015):
Coalition against Isis: Too Little Too Late
Kaspersky Technology Forecast for 2045
The US...
What is Cyber Security’s Next Challenge? Special Panel
In the near future, the cyber industry will have to cope with a wider array of cyber threats and challenges resulting from the vulnerabilities...
What Makes A Device Smart?
The Internet of Things (IoT) is creating a whole new world of devices. It’s ushering in a new age of devices across industries. But...
Military and Civilian Innovations – at the IOT Conference
The leading IoT experts and companies from the IDF and the industries participated at the conference today, organized by iHLS on the Internet of...

















































