Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Cybersecurity

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • New details about AT&T's cooperation with the NSA in domestic spying

    Scope of AT&T-NSA collusion in domestic spying on AT&T customers’ Internet traffic revealed in court documents

    • Read more
  • NIST issues revised security controls guide

    Making sure information systems are secure is a daunting challenge; NIST’s revised — and hefty — guide would help IT managers cope

    • Read more
  • Broadcom acquires GPS specialist Global Locate

    Broadcom pays $146 million for GPS specialist with a technology that reduces location identification from minutes to seconds

    • Read more
  • Online security experts in legal gray area

    Laws hampers the ability of online security experts do their job dilligently and effectively — not a good thing when the use of Web-based applications grows by leaps and bounds

    • Read more
  • Quantum encryption: Inherently unbreakable or vulnerbale to hacking?

    As debate continues about whether or not quantum encryption is inherently unbreakable, a team of researchers was able to create an encryption key in two locations simultaneously, 144 kilometers apart

    • Read more
  • Quantum keys sent over 200-km fiber-optic link

    If properly executed, quantum encryption is unbreakable because eavesdropping changes the state of the photons

    • Read more
  • Air Force assesses cyber vulnerability

    The more organizations become dependend on communication networks, the more they must ensure that these networks do not themselves become vulnerable to enemy attacks; this is what the U.S. Air Force is now doing

    • Read more
  • GAO says FBI's critical networks vulnerable to misuse

    The FBI has made important strides since 2002 in securing its networks; the GAO says that sensitive and critical information transmitted on these networks is still not secure

    • Read more
  • Democrats wonder about possible cyberattack on nuclear facilities

    Last summer’s shut-down of Brown’s Ferry prompt Thompson and Langevin to request a thorough review

    • Read more
  • Estonia accuses Russia of botnet attacks

    Former Soviet republic reports that Russian government computers are the source of a wave of botnet attacks; a dispute over a WWII monument heats up

    • Read more
  • Verizon signs deal to buy Cybertrust

    Agreement is seen a “competitive coup” against the managed security industry; Verizon will also acquire certification firm ICSA Labs

    • Read more
  • Democrats wonder about possible cyber attack on nuclear facilities

    Last summer’s shut-down of Brown’s Ferry prompt Thompson and Langevin to request a thorough review

    • Read more
  • SafeNet to make its IP avaliable on chipestimate.com

    Network chip developers will be glad to see that SafeNet will allow centralized access to information about the its silicon IP security solutions at chipestimate.com

    • Read more
  • Experts express concern about REAL-ID security

    National database could be a prime target for hackers; Smart Card Alliance modestly recommends smart cards as alterantive to bar codes

    • Read more
  • Debate over 700 MHz intensifies

    Communication problems during 9/11 and Katrina have prompted calls for dedicating a portion of the 700 MHz spectrum for public-sfatey use; commercial interest have other ideas, and the FCC is caught in the middle

    • Read more
  • « first
  • ‹ previous
  • …
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • …
  • next ›
  • last »

More headlines

  • Cyber Command looks to expand
  • Which Country has the Best Cybersecurity? It Isn’t the U.S.
  • Cybersecurity Workers Scramble to Fix a Post-Shutdown Mess
  • Apple patches FaceTime flaw and two exploited zero-days in new security update
  • Drill shows limits in cyber-physical infrastructure defenses
  • Senate Bill Would Send DHS Back to Campus for Cyber Training Work
  • Department of Homeland Security warns of cyberattacks on third-party companies by China
  • DHS prioritizes restart of election security programs post-shutdown
  • Terrorists trying to use cyber to impact elections – ICT
  • Lawmakers put Pentagon's cyber in their sights
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Russian social-media-interference operations “active and ongoing”: Senate Intel Committee

    The Russian influence campaign on social media in the 2016 U.S. presidential election campaign sought to help Donald Trump win the 2016 presidential election by deepening divisions among Americans and suppressing turnout among Democratic voters, according to a report produced for the Senate Intelligence Committee. “What is clear is that all of the [Russian social media] messaging clearly sought to benefit the Republican Party — and specifically Donald Trump,” the report says. “Increasingly, we’ve seen how social media platforms intended to foster open dialogues can be used by hostile foreign actors seeking to manipulate and subvert public opinion,” said the chairman of the Intelligence Committee, Senator Richard Burr (R-North Carolina). “Most troublingly, it shows that these activities have not stopped.”

    • Read more
  • The time of the trolls

    The West woke up to the threat of Kremlin trolls in 2016, however it had already been very damaging in 2014–2015. The Ukraine crisis saw the deployment of trolls to Facebook and VKontakte, as well as YouTube and Twitter. The investigation into Russian meddling in the U.S. presidential election showed that trolling was never completely dependent on a technology like bots, nor that it was predominantly about Kremlin employees sitting somewhere in Russia manufacturing anti-Clinton propaganda. Rather, it was ordinary Americans and Europeans that were sharing the messages launched by trolls, and often posting them themselves.

    • Read more
  • AI advancement opens health data privacy to attack

    Advances in artificial intelligence have created new threats to the privacy of health data, a new study shows. The study suggests current laws and regulations are nowhere near sufficient to keep an individual’s health status private in the face of AI development.

    • Read more
  • Significance vulnerabilities discovered in high-performance computer chips

    Researchers have uncovered significant and previously unknown vulnerabilities in high-performance computer chips that could lead to failures in modern electronics. The researchers found they could damage the on-chip communications system and shorten the lifetime of the whole computer chip significantly by deliberately adding malicious workload.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies