Device to protect your vehicle from “Sticky bombs”

So called ’Sticky bombs’ are becoming a global threat and are commonly used by terror groups, local mafia and other para-military organizations. The security market is ready now more than ever for any viable solution.

An Israeli company has endeavored to feature what they refer to as ’The Advanced Car Protection’. Currently under development these days, it will detect any hidden device placed under the parked car and will issue an alert in real time. The system will also prevent easy access to the chassis area of the car by deploying a physical shield around the car. The core technology, already in development, is patent pending.
Placing a ’sticky bomb’ under a car is typically done while the car is parked, either a civilian or even a military vehicle, while standing at a crowded place. Once placed, the bomb can be triggered manually or automatically, as well as via direct connection such as wire, infrared or Bluetooth – as well as via remote connection (cellular). There is no need to eliminate the car alarm or try to physically break into the car.
Therefore, the bomb can be in “silent” mode before it is triggered and will be hard to detect even when one looks under the car to check. The same is true for tracking devices that are even smaller in size and therefore harder to detect by a physical check of the chassis.
The system, developed by ABCD MAX, features a holistic approach that combines electronic sensors and physical protection. The patented physical barrier prevents unauthorized access to the vehicle by sealing the gap between the vehicle and the ground while smart sensors cover the area underneath the vehicle, preventing penetration of any foreign objects. This approach allows 360-degree chassis protection of any car, both armored as well as not armored.
ABCD MAX’s application will provide alert to smartphone/ any computer about any attempt to lay an object under the vehicle. The end user can control the system by any smartphone or computer.
iHLS: http://bit.ly/1HzfZgt

« Snowden Sees Victory – But it’s From a Distance
UK Rewrites Hacking Laws to Give GCHQ Immunity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Pen Test Partners LLP

Pen Test Partners LLP

Pen Test Partners provides penetration testing, security assessment and training services.

Identity Automation

Identity Automation

Identity Automation is a leading provider of Identity and Access Management software.

mnemonic

mnemonic

mnemonic helps businesses manage their security risks, protect their data and defend against cyber threats.

TechCERT

TechCERT

TechCERT is Sri Lanka’s first and largest Computer Emergency Readiness Team (CERT).

McIntyre Associates

McIntyre Associates

McIntyre Associates is an Executive Search boutique specialized in recruiting for the Cybersecurity industry. Our clients range from Venture Capital backed startups to Fortune 100 companies.

Netizen

Netizen

Netizen is an award-winning company that develops and leverages innovative solutions to enable a more secure cyberspace for clients in government and commercial markets.

Nassec

Nassec

Nassec is a Cyber Security firm dedicated to providing the best vulnerability management solutions. We offer tailor-made cyber security solutions based upon your requirements and nature of business.

AML Global Solutions (AMLGS)

AML Global Solutions (AMLGS)

AMLGS delivers Financial Crime prevention training programmes and consultancy services encompassing Anti-Money Laundering (AML), Counter Terrorism Financing (CTF), Bribery & Corruption and Fraud.

Kontex

Kontex

Kontex is a Cyber Security consultancy creating resilient solutions. From Strategy, Advisory and Implementation to Management and everything in between.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Dimension Data

Dimension Data

Dimension Data is a leading African born technology provider operating in the Middle East and Africa, offering a portfolio of services including intelligent security solutions.

Siren

Siren

Siren provides the leading Investigative Intelligence Platform to some of the world’s leading Law Enforcement, National Security and Cyber threat investigators.

Gutsy

Gutsy

Gutsy uses process mining to help organizations visualize and analyze their complex security processes to understand how they actually run, based on observable event data.

Lighthouse IT

Lighthouse IT

At Lighthouse IT, we are focused on delivering seamless and reliable services to unlock the value of technology for your business.

Custom Computer Specialist (CCS)

Custom Computer Specialist (CCS)

CCS offers an extensive range of services including cybersecurity solutions, consulting, implementation, and support to help our clients maximize the value derived from IT investments.

OrbiSky Systems

OrbiSky Systems

OrbiSky Systems is a British tech startup specializing in data management and cybersecurity solutions.