Technology News

Technology News

There is a growing need today for tactical drones capable of carrying out ISTAR missions in challenging marine environments. One of the solutions in...
location platform

The detection, recording, and identification of chemicals, drugs, and biological molecules often requires cumbersome devices. Now, an ordinary cell phone can detect hazardous materials. Cell...

A new system will help the U.S. Air Force secure operations at Tyndall AF Base in Florida. Various features of the Installation Resilience Operations Center...

South Korea is planning to develop an indigenous attack helicopter to meet a Republic of Korea Marine Corps (RoKMC) requirement for 20–24 such rotorcraft....

Manned-unmanned teaming provides added value to military operations. Using a blend of information from unmanned and manned ships and aircraft, a US guided-missile destroyer...

To navigate in electronic-warfare (EW) environments, armed forces need reliable and resilient GNSS/GPS positioning with anti-jam technology.  A new anti-jam technology for assured positioning, navigation...

Turkey has converted a target drone into a kamikaze drone. Turkish Aerospace Industries (TAI) has converted its Simsek training system into a kamikaze drone...
InnoTech expo for HLS and cyber

iHLS is proud to present the international Homeland Security Technologies, Cyber, and Innovation Conference and Exhibition: INNOTECH 2021. iHLS is celebrating the return to normal...
Photo illus. cybersecurity by Pixabay

By Or Shalom The design, planning and deployment of physical security layers are based, among others, on technological systems and tools. In spite of the...

Drones are often equipped with a parachute system as a support in case of failure. A software update of a system that detects failure...
cyberthreats

“Ransomware is a national security threat,” claims the US Department of Homeland Security (DHS). Threat actors have figured out how to exploit US bureaucratic...

India’s Defense Research and Development Organisation (DRDO) has successfully trialed the 5th generation Python-5 air-to-air missile (AAM) for the Tejas, India’s indigenous light combat...
Ground robot photo illust US DoD

Robots working in teams need a method to ensure that they do not duplicate effort. A new technique allows robots to remain resilient when...
smart car hacking

Vehicles connected to the network offer plenty of advantages, but they can also be a target to cyber attacks. A Tesla car was hacked remotely...
deepfake

Deepfake refers to artificial intelligence-synthesized, hyper-realistic video content that falsely depicts individuals saying or doing something. Most state-of-the-art deepfake video detection and media forensics...
airport security

One of the most inconvenient parts of flying is having to take your shoes off for screening. A new shoe scanner will provide a...
photo drone swarm illus. by Pixabay

While there are many optional solutions against rogue drones, a swarm of a number of drones operating together is more challenging. A new solution uses...

Rugged computing equipment helps military troops communicate and share critical information in harsh conditions.  A new next-generation tablet, K120 Windows 10 tablet, is a fully...
urban airspace

A new delivery system establishes a new industry standard in drone-based logistics. The Wingcopter 198, introduced by Wingcopter, is an all-electric vertical take off and...

Exoskeletons (external skeletons) are designed to help soldiers with heavy loads and give their limbs extra movement, strength and endurance. But soldiers often face...

An ultra-endurance land-launched unmanned aerial vehicle (UAV) participated in U.S. Pacific Fleet’s exercise in Point Mugu, California.  The VA001 Vanilla is long-endurance aircraft (MALE) unmanned...
helmet display

Special forces units are specially trained to gather intelligence and operate behind enemy lines. Upgrades to the NH90 helicopter for special forces significantly improve...