Device to protect your vehicle from “Sticky bombs”

So called ’Sticky bombs’ are becoming a global threat and are commonly used by terror groups, local mafia and other para-military organizations. The security market is ready now more than ever for any viable solution.

An Israeli company has endeavored to feature what they refer to as ’The Advanced Car Protection’. Currently under development these days, it will detect any hidden device placed under the parked car and will issue an alert in real time. The system will also prevent easy access to the chassis area of the car by deploying a physical shield around the car. The core technology, already in development, is patent pending.
Placing a ’sticky bomb’ under a car is typically done while the car is parked, either a civilian or even a military vehicle, while standing at a crowded place. Once placed, the bomb can be triggered manually or automatically, as well as via direct connection such as wire, infrared or Bluetooth – as well as via remote connection (cellular). There is no need to eliminate the car alarm or try to physically break into the car.
Therefore, the bomb can be in “silent” mode before it is triggered and will be hard to detect even when one looks under the car to check. The same is true for tracking devices that are even smaller in size and therefore harder to detect by a physical check of the chassis.
The system, developed by ABCD MAX, features a holistic approach that combines electronic sensors and physical protection. The patented physical barrier prevents unauthorized access to the vehicle by sealing the gap between the vehicle and the ground while smart sensors cover the area underneath the vehicle, preventing penetration of any foreign objects. This approach allows 360-degree chassis protection of any car, both armored as well as not armored.
ABCD MAX’s application will provide alert to smartphone/ any computer about any attempt to lay an object under the vehicle. The end user can control the system by any smartphone or computer.
iHLS: http://bit.ly/1HzfZgt

« Snowden Sees Victory – But it’s From a Distance
UK Rewrites Hacking Laws to Give GCHQ Immunity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ON-DEMAND WEBINAR: How to build and implement an effective endpoint detection and response strategy

ON-DEMAND WEBINAR: How to build and implement an effective endpoint detection and response strategy

Discover how you can implement endpoint detection and response (EDR) tools into your security strategy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Panzura

Panzura

Panzura optimizes enterprise data storage management and distribution in the cloud, making cloud storage simple and secure.

Rapid7

Rapid7

Rapid7 unites cloud risk management and threat detection to deliver results that secure your business and ensure you’re always ready for what comes next.

DataSunrise

DataSunrise

DataSunrise Data-Centric high-performance security software protects the sensitive data in real-time in cloud or on premises, and helps organizations to stay compliant.

Caretower

Caretower

Caretower is one of Europe’s leading value added managed service provider in cyber security.

Mitek Systems

Mitek Systems

Mitek's global mobile capture and identity verification technology optimizes the digital user experience for thousands of financial services organizations.

Epati Information Technologies

Epati Information Technologies

ePati Information Technologies is a specialist in information technology and cyber security.

Ensign InfoSecurity

Ensign InfoSecurity

Ensign InfoSecurity is Southeast Asia’s largest pure-play cybersecurity firm.

Callsign

Callsign

Callsign’s mission is to seamlessly power the identification of every web, mobile and physical interaction.

Basque Digital Innovation Hub (BDIH)

Basque Digital Innovation Hub (BDIH)

The aim of the BDIH initiative is to provide industrial enterprises, especially SMEs, with the technological capabilities needed to meet the challenges of industry 4.0.

SpecterOps

SpecterOps

SpecterOps has unique insight into the cyber adversary mindset and brings the highest caliber, most experienced resources to assess your organizations defenses.

Sylint

Sylint

Sylint is an internationally recognized cyber security and digital data forensics firm with extensive experience discretely addressing some of today’s biggest cyber breaches.

StackHawk

StackHawk

StackHawk is built to help dev teams ship secure code. Find and fix bugs early before they become vulnerabilities in production.

ACSG Corp

ACSG Corp

ACSG Corp is a Critical Infrastructure Protection Company with a multi-disciplinary focus on building analytics software for various industry sectors.

Acumera

Acumera

Acumera is a leader in managed network security, visibility and automation services.

BlueCat Networks

BlueCat Networks

BlueCat is the Adaptive DNS company. Our mission is to help the world’s largest organizations thrive on network complexity, from the edge to the core.

Dion Training Solutions

Dion Training Solutions

Dion Training Solutions offer comprehensive training in areas such as project management, cybersecurity, agile methodologies, and IT service management.