Device to protect your vehicle from “Sticky bombs”

So called ’Sticky bombs’ are becoming a global threat and are commonly used by terror groups, local mafia and other para-military organizations. The security market is ready now more than ever for any viable solution.

An Israeli company has endeavored to feature what they refer to as ’The Advanced Car Protection’. Currently under development these days, it will detect any hidden device placed under the parked car and will issue an alert in real time. The system will also prevent easy access to the chassis area of the car by deploying a physical shield around the car. The core technology, already in development, is patent pending.
Placing a ’sticky bomb’ under a car is typically done while the car is parked, either a civilian or even a military vehicle, while standing at a crowded place. Once placed, the bomb can be triggered manually or automatically, as well as via direct connection such as wire, infrared or Bluetooth – as well as via remote connection (cellular). There is no need to eliminate the car alarm or try to physically break into the car.
Therefore, the bomb can be in “silent” mode before it is triggered and will be hard to detect even when one looks under the car to check. The same is true for tracking devices that are even smaller in size and therefore harder to detect by a physical check of the chassis.
The system, developed by ABCD MAX, features a holistic approach that combines electronic sensors and physical protection. The patented physical barrier prevents unauthorized access to the vehicle by sealing the gap between the vehicle and the ground while smart sensors cover the area underneath the vehicle, preventing penetration of any foreign objects. This approach allows 360-degree chassis protection of any car, both armored as well as not armored.
ABCD MAX’s application will provide alert to smartphone/ any computer about any attempt to lay an object under the vehicle. The end user can control the system by any smartphone or computer.
iHLS: http://bit.ly/1HzfZgt

« Snowden Sees Victory – But it’s From a Distance
UK Rewrites Hacking Laws to Give GCHQ Immunity »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackBox Software

BackBox Software

BackBox is a leading provider of solutions for automated backup and recovery software for security and network devices.

Nexis

Nexis

Nexis GmbH is a German IT security company specializing in IAM, access control, and risk management.

National Cyber Security Centre (NCSC) - Ireland

National Cyber Security Centre (NCSC) - Ireland

The National Cyber Security Centre (NCSC) is the operational side of the Department of Communications in regard to network and information security in the Republic of Ireland.

Syskode Technologies

Syskode Technologies

Sykode Technologies is a next-generation global technology company offering an integrated portfolio of advisory services, products and solutions in areas including AI, IoT and Cyber Security.

Sponge

Sponge

Sponge is a world-renowned digital learning provider on a mission to make learning unforgettable.

BioConnect

BioConnect

BioConnect provide biometric access control solutions to verify a person’s identity across physical, IOT and digital applications.

Intraprise Health

Intraprise Health

Intraprise Health is a Certified HITRUST Assessor and award-winning provider of health information security products and services.

Sum&Substance (Sumsub)

Sum&Substance (Sumsub)

Sum&Substance is a developer of remote verification solutions. Our technology allows online services around the world to meet regulatory requirements, prevent fraud and enhance customer confidence.

RevBits

RevBits

RevBits provides high-performance cybersecurity solutions including email security, endpoint security, deception technology and PAM solution to enterprise companies and public sector organizations.

Cyber Intelligence House (CIH)

Cyber Intelligence House (CIH)

Cyber Intelligence House provides risk exposure solutions for a wide range of audiences including companies, government agencies, regulators, investors, law enforcement and consumers.

TestArmy

TestArmy

TestArmy CyberForces provide you with a broad spectrum of cybersecurity services to test every aspect of your IT infrastructure security and software development process.

SoftwareONE

SoftwareONE

SoftwareONE is a leading global provider of end-to-end software and cloud technology solutions.

Data Pie Cybersecurity

Data Pie Cybersecurity

The Data Pie Cybersecurity Consulting offers a 360° around protection for your IT security. Security awareness solutions and consulting.

Buguard

Buguard

Buguard is a multi-award-winning supplier of Application Security Assessments and GRC services.

Codenotary

Codenotary

Codenotary provide a comprehensive suite of verification and enforcement services to guarantee the integrity of your software throughout its entire lifecycle.

GetReal Security

GetReal Security

GetReal Security is the world’s leading authority on malicious digital content and deepfake protection.