Device to protect your vehicle from “Sticky bombs”

So called ’Sticky bombs’ are becoming a global threat and are commonly used by terror groups, local mafia and other para-military organizations. The security market is ready now more than ever for any viable solution.

An Israeli company has endeavored to feature what they refer to as ’The Advanced Car Protection’. Currently under development these days, it will detect any hidden device placed under the parked car and will issue an alert in real time. The system will also prevent easy access to the chassis area of the car by deploying a physical shield around the car. The core technology, already in development, is patent pending.
Placing a ’sticky bomb’ under a car is typically done while the car is parked, either a civilian or even a military vehicle, while standing at a crowded place. Once placed, the bomb can be triggered manually or automatically, as well as via direct connection such as wire, infrared or Bluetooth – as well as via remote connection (cellular). There is no need to eliminate the car alarm or try to physically break into the car.
Therefore, the bomb can be in “silent” mode before it is triggered and will be hard to detect even when one looks under the car to check. The same is true for tracking devices that are even smaller in size and therefore harder to detect by a physical check of the chassis.
The system, developed by ABCD MAX, features a holistic approach that combines electronic sensors and physical protection. The patented physical barrier prevents unauthorized access to the vehicle by sealing the gap between the vehicle and the ground while smart sensors cover the area underneath the vehicle, preventing penetration of any foreign objects. This approach allows 360-degree chassis protection of any car, both armored as well as not armored.
ABCD MAX’s application will provide alert to smartphone/ any computer about any attempt to lay an object under the vehicle. The end user can control the system by any smartphone or computer.
iHLS: http://bit.ly/1HzfZgt

« Snowden Sees Victory – But it’s From a Distance
UK Rewrites Hacking Laws to Give GCHQ Immunity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

PortSwigger

PortSwigger

PortSwigger's Burp Suite is an integrated platform for performing security testing of web applications.

LogicManager

LogicManager

LogicManager offer a complete set of IT governance, risk and compliance software solutions and advisory services.

SecuGen

SecuGen

SecuGen is a leading provider of advanced, optical fingerprint recognition technology, products, tools and platforms for physical and information security.

Smarttech247

Smarttech247

Smarttech247 deliver a range of cyber security solutions, including cognitive security services using IBM Watson for Cybersecurity, SIEM, Compliance & Governance, and Penetration Testing.

Metro Systems

Metro Systems

Metro Systems offer fully integrated IT solutions & services covering Digital Transformation, Digital Infrastructure, Cyber Security and Training.

ArmorText

ArmorText

ArmorText offers a seamless channel for communication and collaboration for organizations concerned with keeping communication data private and secure.

TrustMAPP

TrustMAPP

TrustMAPP automates cybersecurity & privacy assessments, with universal workflow, allowing teams to generate analytics and recommendations to align priorities for improvement.

GoSecure

GoSecure

GoSecure Managed Detection and Response helps all organizations reduce dwell time by preventing breaches before they happen.

DataEndure

DataEndure

DataEndure helps companies build digital resilience so that their critical information assets are protected and available to the right people, at the right time.

Secure Ideas

Secure Ideas

Secure Ideas is focused on penetration testing and application security including web applications, web services and mobile applications.

FDD Center on Cyber and Technology Innovation (CCTI)

FDD Center on Cyber and Technology Innovation (CCTI)

The Foundation for Defense of Democracies is a nonprofit research institute focusing on foreign policy and national security. Ares of focus include cyber security and technology innovation.

Nisos

Nisos

Nisos provides unrivaled protection of your reputation and assets through the practice of Active Defense.

Cyber Ranges

Cyber Ranges

Cyber Ranges is the next-generation cyber range for the development of cyber capabilities and the validation of cyber security skills and organizational cyber resilience.

RIoT Secure

RIoT Secure

RIoT Secure AB is a technology enabler within the IoT industry - created with a vision to ensure security technology exists in the foundations of software development for IoT solutions.

Cork

Cork

Cork is a purpose-built cyber warranty company for managed service providers (MSPs) serving small businesses (SMBs) and the software solutions they manage.

Soteria LLC

Soteria LLC

Soteria LLC are a client-focused organization providing expert advisory, consulting services, and tailored solutions to prevent, detect, and respond to cybersecurity incidents.