Technology

Technology

Home computer users and businesses are being warned to consider more closely the risks associated with cloud computing, as well as its many advantages. Australian home...

The total global surveillance and security market generates revenues of approximately $81 billion per year. Individual country markets are growing in the range of...

Power utilities in the U.S. are under daily cyberattacks, according to report released Tuesday by members of Congress. Of about 160 utilities surveyed in the...

 The FCI (Financial Cyber Intelligence) Unit published a focused warning on Cyber attack of the distributed denial of service (DDoS) type, targeting several financial...

“Comprehensive endpoint protection is the foundation of a company’s security”, that was the title for Kaspersky Labs’ announcement of its new enterprise product, Endpoint...

UAS (Unmanned Air Systems) assist in defense of the homeland borders, collection of intelligence and prevention of terror and criminal activity. A micro-UAS...

The world conference of Wind River, in cooperation with i-HLS, taking place in Israel today, was opened by the General Manager of Communications Ministry...

Dr. Gabi Siboni from the Institute for Strategic Research spoke today about cyber threats, at the WindRiver conference , in cooperation with i-HLS, dividing...

The service extends the activity of existing data centers to the public cloud in an effective, safe and fast way. CEO of the global VMware,...

This threat is mentioned seldom but it does not make it less lethal.  A cyber attack on Israeli infrastructure may include air traffic control installations....

Urban spaces, wherever they are, present the most complex security challenges. They are densely populated; they rely on a complex array of interrelated local infrastructures with...

First the enemy was in the shape of some hackers that wanted to prove a point. Then came governmental forces like the one from...

A growing interest in the Hovering Air Vehicles (HAV's).Israel Aerospace Industries (IAI) is developing a line of Hovering Air Vehicles (HAV's). The first system in...

Elbit Systems Ltd. has teamed with Windward . To offer integrated maritime solutions for the Indian authorities. The joint solution combines Windward’s innovative satellite-based...

The FBI Internet Crime Complaint Center (IC3) has released the 2012 Internet Crime Report — a summary of reported fraudulent activity, including data and...

Assessment: the overwhelming majority of attacks will be using free shareware botnets. Muslim hackers organizations are preparing for another concentrated attack against government sites in...

"We don’t create security solutions, we instead make intelligent use of the existing ones" says Raanan Biber, Israel's country manager of VMware. VMware  new tools...

Global Cyber Review   USA U.S. directly accuses China of cyber-attacks  The Obama administration explicitly accused China’s military of mounting attacks on American government computer systems and defense contractors, saying...

Israeli exports in the field have reached 4.6 billion dollars in 8 years, and are expected to grow at 5-10% per year until 2020. Israeli...

China’s first jet-powered stealth unmanned combat aerial vehicle (UCAV), the Lijian or “Sharp Sword,” was recently spotted undergoing taxiing tests in China.

The Urban Aeronautics AirMule ducted fan Vertical Take-Off and Landing (VTOL) aircraft has been equipped with new propellers. Ii will improve the performance of...

Since the dawn of the Internet, security has been a big issue. Having machines communicate and transmit information over a public, worldwide network makes...

iHLS Events