Hacker de-anonymizes taxi data
How did a software engineer de-anonymized data on 173 Million NYC taxi trips?
When New York City released a treasure trove of data about fare...
C-Level Responsibility for Cybersecurity in Organizations
By Ilan Segelman, Power Communication
The multiple cyber attacks have led to an increasing awareness of the senior executives in organizations to the cyber attacks’...
iHLS TV – UAS, Amazon & the CIA , stolen Uranium...
AERMATICA announced the ANTEOS Unmanned Air System.
Amazon Web Services finished its secure cloud-computing system for all seventeen intelligence agencies of the CIA
Iraqi terrorists have...
iHLS TV – Special Video Report : Airport perimeter security
It is amazing to learn that perimeter security of U.S airport is so not efficient.
Several hundred times over the last decade, intruders have hopped...
Germany Signs Deal with Israel for Arrow 3 Defense System
Arrow 3 is the top layer of Israel's air defense net, and it recently made its first operational interception. Israel’s Ministry of Defense has...
From IBM to the defense department
The Defense Department is bringing in IBM executive Daniel Prieto III to serve as its new director of cybersecurity and technology, the department announced...
Stuxnet Virus Detected in Russian Nuclear Facility
Eugene Kaspersky of Kaspersky Antivirus has revealed that a staffer at a Russian nuclear plant informed him that the infection that was introduced to...
Rolls Royce’s Next Step – Autonomous Ships
ESA (The European Space Agency) signed a Memorandum of Intent with Rolls-Royce to investigate how space technology can be used to develop autonomous and...
Flood of Lawsuits in Germany Possibly Driven by AI
The Regional Court of Frankfurt was faced with an increasing number of cases and suspects that law firms are using AI to attract large...
Camera-Mounted Dogs to Enhance Counter-Terror Efforts
Sensor technology mounted on security dogs has been enhancing India’s fight against terrorism. India’s Elite counter-terror force National Security Guard (NSG) has procured head-mounted...
Research Incorporates AI into Neural Interfaces
What seems to belong to the far future of military technology is already in the process of significant research. The Defense Advanced Research Projects...
Drone Completes One of Longest Inspection Flights in Its Class
More than $38 billion is spent annually monitoring oil and gas pipelines using less efficient means, which often identify problems only long after they’ve...
Manned-Unmanned Teaming has Unique Advantage
Unmanned ground and aerial vehicles can provide many advantageous abilities to soldiers on the battlefield. The US Defense Advanced Research Projects Agency (DARPA) has...
F-35 Pilots Worldwide Will Use Israeli-Developed Helmets
Israeli-developed technologies have proved their superiority once again. The F-35 Joint Program Office (JPO) decided to halt development of the alternate F-35 helmet and...
ICT Cyber-Desk Review: Report #9
This report covers the period of April - June 2014, the report covers two main subjects: cyber-terrorism (offensive, defensive, and the media, and the main topics...
What Is The Defense Export Controls Agency And Who Needs It?
Recently we’ve been asked continuously by startup companies - What is the DECA (Defense Export Controls Agency)? Who needs to go there? When should...
Large Exercise Brings Together Tech-Giants
The US Navy conducts a comprehensive exercise. Fleet operators from Submarine Development Squadron Five and the Explosive Disposal Mobile Unit, participated in a multi-site...
Large Language Models Are Dangerously Easy to Manipulate into Giving Harmful...
Most large language models can be easily tricked into revealing dangerous or unethical information, according to a paper by researchers from AWS AI Labs,...
Lockdown Mode – Solution for Government and Global Spyware
A new extreme solution for Apple users to protect their data – lockdown mode. This new security feature will be available to safeguard high-risk...
Reptilian Robots for Disaster Response Efforts
A pair of reptilian robots originally built for a documentary on the BBC in 2016 are to be used for disaster efforts and possibly...
New Excellence Center to Advance Research on CyberSecurity
The University of Connecticut’s (UConn) School of Engineering and Synchrony Financial, a consumer financial services company headquartered in the state, have announced earlier this...
The IBM Spark
IBM has announced that from now on it will put its energies in the open source code project, Apache Spark, and defines is at...

















































