Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Cybersecurity

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • The ‘Dead Internet Theory’ Makes Eerie Claims About an AI-run Web. The Truth Is More Sinister

    By Jake Renzella and Vlada Rozova

    Is most of the content on the internet fake? Here’s what the dead internet theory really means – and why we should be warier of how we’re manipulated for profit and political gain.

    • Read more
  • Discovery Highlights ‘Critical Oversight’ in Perceived Security of Wireless Networks

    By Marcy de Luna

    Researchers have uncovered an eavesdropping security vulnerability in high-frequency and high-speed wireless backhaul links, widely employed in critical applications such as 5G wireless cell phone signals and low-latency financial trading on Wall Street.

    • Read more
  • China Turns to Private Hackers as It Cracks Down on Online Activists on Tiananmen Square Anniversary

    By Christopher K. Tong

    Chinese authorities restrict the flow of information online by banning search terms, scanning social media for subversive messages and blocking access to foreign media and applications that may host censored content. Control of online activity is particularly stringent around the anniversary of the protests at Tiananmen Square in 1989 that ended with a bloody crackdown on demonstrators by troops on June 4 of that year.

    • Read more
  • Sounding the Alarm: Exposing Audio Deepfake

    By Helen Goh

    Audio deepfakes are becoming ubiquitous – blurring the line between fact and fiction – but researchers are working to develop methods to help the public navigate this new technological terrain.

    • Read more
  • ARPA-H Announces Program to Enhance and Automate Cybersecurity for Health Care Facilities

    The Advanced Research Projects Agency for Health (ARPA-H) announced the launch of the Universal PatchinG and Remediation for Autonomous DEfense (UPGRADE) program, a cybersecurity effort that will invest more than $50 million to create tools for information technology (IT) teams to better defend the hospital environments they are tasked with securing.

    • Read more
  • O-RAN Is Overhyped as Avoiding Chinese 5G Influence

    By Manoj Harjani

    In recent years, countries have faced a stark choice between Chinese and Western suppliers to develop their 5G cellular network infrastructure. While Chinese suppliers such as Huawei and ZTE are not trusted because of their ties and legal obligations to China’s party-state, Western suppliers have struggled to compete on cost. The emergence of Open Radio Access Network (O-RAN) technology has some promised, but the idea that O-RAN is a viable alternative to Chinese suppliers seems hollow.

    • Read more
  • Study Sheds Light on Shady World of Text Message Phishing Scams

    By Matt Shipman

    Researchers have collected and analyzed an unprecedented amount of data on SMS phishing attacks, shedding light on both the scope and nature of SMS phishing operations.

    • Read more
  • China's Digital Silk Road Exports Internet Technology, Controls

    By Lin Yang

    A Chinese initiative known as the “Digital Silk Road” is helping Southeast Asian nations modernize their digital landscapes. But rights groups say Beijing is also exporting its model of authoritarian governance of the internet through censorship, surveillance and controls.

    • Read more
  • Analyzing the Characteristics of AI-generated Deepfakes

    Most of the deepfakes generated by artificial intelligence (AI) that spread through social media feature political representatives and artists and are often linked to current news cycles. The findings of a new research are applicable to different fields, from national security to the integrity of election campaigns.

    • Read more
  • Major Gaps in Cybersecurity at Auto Workshops

    Many auto workshops do not know enough about how to keep our cars safe from cyberattacks, a new study reveals. “A large proportion of the vehicle fleet could practically be entirely open to attacks or already breached,” says a cybersecurity expert.

    • Read more
  • European Tech Law Faces Test to Address Interference, Threats, and Disinformation in 2024 Elections

    By Linda Robinson

    The European Union (EU) began implementing the Digital Services Act (DSA) this year, just in time to combat online disinformation and other electoral interference in the dozens of elections taking place in Europe’s twenty-seven member countries and the European Parliament elections taking place June 6 through June 9.

    • Read more
  • Militia Extremists, Kicked Off Facebook Again, Are Regaining Comfort in Public View

    By Amy Cooter

    When journalists sounded alarm bells in early May 2024 that more than 100 extremist militia groups had been organizing and communicating on Facebook, it wasn’t the first time militias had garnered attention for their online activities. As a scholar of militias, I’ve seen extremists get kicked off Facebook before.

    • Read more
  • Extremist Communities Continue to Rely on YouTube for Hosting, but Most Videos Are Viewed Off-Site, Research Finds

    By Cyrus Moulton

    After the 2016 U.S. presidential election, YouTube was so criticized for radicalizing users by recommending increasingly extremist and fringe content that it changed its recommendation algorithm. Research four years later found that while extremist content remained on YouTube, subscriptions and external referrals drove disaffected users to extremist content rather than the recommendation algorithm.

    • Read more
  • University Students Tackle Adventure in CyberForce — Conquer the Hill Competition

    University of Central Florida’s Cameron Whitehead wins CyberForce Conquer the Hill: Adventure Competition 2024. Whitehead was one of 112 students from 71 accredited U.S. colleges and universities who competed virtually to complete work-based cybersecurity tasks and challenges during a full day of energy sector-related adventure.

    • Read more
  • Chinese Nationalist Groups Are Launching Cyber-Attacks – Often Against the Wishes of the Government

    By Lewis Eves

    China is often presented as a monolithic entity, entirely at the whim of the Chinese Communist Party (CCP). However, the reality is more complex. Many Chinese cyber-attacks and other kinds of digital interference are conducted by Chinese nationalist groups.

    • Read more
  • « first
  • ‹ previous
  • …
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • …
  • next ›
  • last »

More headlines

  • Iran may go after US defense firms with cyber attacks, warn Pentagon, Homeland Security
  • Primary Mitigations to Reduce Cyber Threats to Operational Technology
  • Another cybersecurity False Claims Act settlement
  • Cyber congressman demands answers before CISA gets cut down to size
  • US to sign Pall Mall pact aimed at countering spyware abuses
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Time to Invest in Cybersecurity for U.S. Sealift Forces, Report Says
  • President Trump Extends National Emergency With Respect to Significant Cyber Threats for Another Year
  • Senators Press DHS for Details on GPS Jamming Protections
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Our Online World Relies on Encryption. What Happens If It Fails?

    By Maureen Stanton

    Quantum computers will make traditional data encryption techniques obsolete; BU researchers have turned to physics to come up with better defenses.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies