• German police wants to develop its own computer surveillance software

    The Federal Police Office of Germany (also known as the BKA) is looking to hire software engineers who can develop computer surveillance technology for use by law enforcement and intelligence agencies in criminal investigations

  • New NIST publication provides guidance for computer security risk assessments

    The National Institute of Standards and Technology (NIST) has released a final version of its risk assessment guidelines which can provide senior leaders and executives with the information they need to understand and make decisions about their organization’s current information security risks and information technology infrastructures

  • Boeing to pursue cybersecurity opportunities in Japan

    Boeing and Japanese trading company Sojitz are teaming up to offer advanced cybersecurity solutions in Japan to help protect critical government, civil, and commercial information technology infrastructure

  • U.K.’s first research institute to investigate the science of cyber security

    A new U.K. academic research institute, aiming to improve understanding of the science behind the growing cybersecurity threat, was announced last week; GCHQ, the U.K. intelligence agency, says that the institute, which is funded by a £3.8 million grant, is part of a cross-government commitment to increasing the U.K. academic capability in all fields of cybersecurity

  • Civilian cyber-warriors not motivated by patriotism

    Cybercrimes pose a huge societal risk and have become a hot issue globally, yet little is known about the mindset behind them; new study finds that people who commit cyber-attacks against the government also tend to download music illegally and participate in physical protests; surprisingly, however, they do not appear to be acting out of some sense of national pride or patriotism

  • Bolstering e-mail security

    On the whole, security is not a primary concern for most day-to-day e-mails, but some e-mails do contain personal, proprietary, and sensitive information, documents, media, photos, videos, and sound files; the open nature of e-mail means that they can be intercepted and if not encrypted, easily read by malicious third parties

  • Apple rejects app which tracks drone strikes against militants

    Apple has rejected an app, developed by a New York student, which tracks U.S. drone strikes in Pakistan; Apple said the app violated rule 16.1 of its guidelines, which bans “excessively objectionable or crude content”

  • FBI denies hackers’ claim that they had stolen Apple ID data

    The FBI on Tuesday disputed the claim of a computer hacker group that said it had stolen the personal identification data on millions of Apple device owners from an FBI agent’s laptop

  • Cloud OS for the U.S. intelligence community

    Cloud management specialist Adaptive Computingis partnering with the investment arm of the CIA, In-Q-Tel, to develop a cloud operating system for use by U.S. intelligence agency

  • Law-enforcement agencies eager for Web-surveillance tools

    Private technology firms are pitching software capable of analyzing large swaths of the Internet to local law enforcement looking for ways to stop the next mass shooting or domestic terrorist event before it happens; police departments hope the software will help them detect online information from terrorists, traffickers, pedophiles, and rioters

  • ICE, federal agencies train computer forensic investigators

    For the past fourteen years, U.S. Immigration and Customs Enforcement (ICE) has been responsible for training ICE officers and special agents to become computer forensic investigators; ICE teaches the class in conjunction with the U.S. Secret Service and the Internal Revenue Service

  • NSF awards Norwich University a grant for computer security scholarships

    Norwich University in Vermont was awarded a $975,000 grant from the National Science Foundation’s (NSF) Scholarship for Service program; the funds will be used to support Information Assurance students; the students will fulfill the “service” obligation through employment by a government agency in their area of information assurance expertise for two years

  • U.S. always ends up regulating new technologies for public safety; the Internet is no exception

    Homeland Security News Wire’s executive editor Derek Major talked with CSIS’s James Lewis about the cybersecurity challenges the United States faces, Stuxnet, China’s hacking campaign, cyber arms control efforts, and more; on the stalled cybersecurity bill, opposed by critical infrastructure operators as being too burdensome, Lewis says: “It takes America about 20-40 years to come to terms with a new technology, but we always end up regulating it for public safety. This will be no different. We are in year 17.”

  • Most cybersecurity incidents in Europe remain undetected or not reported

    In a new report, the EU cyber security agency takes a snapshot of existing and future EU legislation on security measures and incident reporting; the analysis underlines important steps forward, but also identifies gaps in national implementation, as most incidents are not reported

  • Siemens software which controls power plants vulnerable to hackers

    RuggedCom is a Canadian subsidiary of Siemenswhich sells networking equipment for use in harsh environments with extreme and inclement weather; many critical infrastructure operators of power plants, water systems, dams, and more; a security specialist discovered a flaw in the software, a flaw which allows hackers to spy on communication of infrastructure operators and gain credentials to access computer systems which control power plants as well as other critical systems