Intelligence

Intelligence

The NSA knew about and exploited the Heartbleed vulnerability for two years before it was publicly exposed this week, and used it to steal...

The U.S. intelligence agencies' activities are already infamous, although their depth and scope are not yet clear. According to a Microsoft researcher new encryption...

Issues and articles discussion in this episode: Israeli manufacturers report a growing demand for electro optical payloads for aerostats U.S. Government evaluates aerostat systems for use...

Articles and issues discussed in this week's report: Israeli Companies target the booming UAE HLS market British engineeris print ready-to-use UAV New tech allows authorities to easily...

Governments are behind most cyber attacks on media and journalists, this according to the findings of a research conducted by Google and presented last...

U.S. military researchers are moving forward with a program to hide ruggedized electronic devices at the bottom of the world's oceans that when called...

Articles and issues discussed in this episode: Facebook's new facial recognition software Kremlin official website hacked Commercial UAV use in the U.S. lags behind NSA records all...

The next threat to your privacy could be hovering overhead while you walk down the street. Hackers have developed a drone that can steal...

The NSA’s MYSTIC program, created in 2009, deploys a “retrospective retrieval” (RETRO) tool which allows agents to rewind and playback all phone conversations that...

Articles and issues discussed in this episode: U.S. DHS cancels national license plate database Israel hacks Iranian nuclear centrifuge system CIA may have acted against U.S. senators...

The proliferation of cyberthreats to communication networks has presented satellite operators with new challenges in protecting customer data against threats. According to Aviation Week security...

Facebook developed a new facial recognition software, operating on a near-human level Human beings, or at least our brains, are oiled facial recognition machines. Light,...

The U.S has proved again and again that it can utilize cyber weaponry to an effective degree. The employment of the Stuxnet virus by...

Only days after the US Department of Homeland Security began seeking a company to help it track license plates nationwide, the agency has reportedly...

Two brothers, John and Will Ackerly - a former NSA employee and a George W. Bush White House insider - have launched a cyber-privacy...

An analysis of 225 terrorism cases inside the United States since the Sept. 11, 2001, attacks has concluded that the bulk collection of phone...

iHLS is proud to launch its new TV channel. In today's first show we highlight some of our main stories from recent days, with comments...

The Washington post revealed that NSA is spending a great effort to build a quantum computer that could break most types of encryption. The NSA...

Australian intelligence agencies may have had knowledge of a top secret U.S. NSA program for targeting iPhones, according to newly-released documents. Slides released recently by...

Der Spiegel revealed that the TAO unit of NSA planted backdoors to access computers, hard drives, routers, and other devices from principal vendors. Germany’s Der...

The U.S. National Security Agency (NSA) has collected sensitive data on key telecommunications cables between Europe, north Africa and Asia, German news magazine Der...

The U.S. National Security Agency's bulk collection and storage of phone metadata does not violate the U.S. Constitution, according to a federal judge's decision. The...