-
Agroterrorism a serious risk to Americans, U.S. economy: Experts
The word “terrorism” is typically associated with bomb and bullets, but security experts say that there are other types of terrorism which may bring death and disruption, chief among them is agroterrorism. Agroterrorism is the use of animal or plant pathogens to disrupt a nation’s food supply, or use the food supply to spread deadly disease.In 2004, Tommy Thompson, then secretary of Health and Human Services, said that, “For the life of me, I cannot understand why the terrorists have not attacked our food supply, because it is so easy to do.”
-
-
New analysis method discovers eleven security flaws in popular Internet browsers
Georgia Tech researchers developed a new cyber security analysis method which discovered eleven previously unknown Internet browser security flaws, and were honored with the Internet Defense Prize, an award offered by Facebook in partnership with USENIX, at the 24th USENIX Security Symposium. Their research explores vulnerabilities in C++ programs (such as Chrome and Firefox) which result from “bad casting” or “type confusion.” Bad casting enables an attacker to corrupt the memory in a browser so that it follows a malicious logic instead of proper instructions.
-
-
Worries about megaquake benefit preparedness, retrofitting businesses in Pacific Northwest
The sale of emergency preparedness kits has been booming in the Northwest of the United States, as more press stories have highlighted the growing confidence of scientists that the Pacific Northwest is overdue for a megaquake. Stores that sell a few preparedness kits a month, and which typically cater to survivalists, see a dramatic increase in business, as do businesses which retrofit houses to make them more quake-resilient.
-
-
Bill requiring Internet companies to report “terrorist activity” opposed by digital rights groups
A coalition of digital rights groups and trade associations last week released a joint letter opposing a proposal in the Senate to require U.S. tech firms to police the speech of their users and to report any signs of apparent “terrorist activity” to law enforcement. The letter says that this sweeping mandate covers an undefined category of activities and communications and would likely lead to significant over-reporting by communication service providers. The letter urged senators to remove the “terrorist activity” reporting requirements from the Intelligence Authorization Act (S. 1705).
-
-
Windows 10 is not really free: you are paying for it with your privacy
Windows 10, it seems, is proving a hit with both the public and the technology press after its release last week. After two days, it had been installed on sixty-seven million PCs. For those concerned about privacy, it is the very fact that the upgrade is free that has them concerned that Microsoft has adopted a new, “freemium” model for making money from its operating system. Microsoft is employing a unique “advertising ID” that is assigned to a user when Windows 10 is installed. This is used to target personalized ads at the user. There are steps users can take to mitigate the worst of the privacy issues with Windows 10, and these are highly recommended. Microsoft should have allowed users to pay a regular fee for the product in exchange for a guarantee of the levels of privacy its users deserve.
-
-
U.K. needs more “constructive” thinking on migrant welfare benefits
As the British political debate continues on whether the British government should try to impose a four-year ban on EU migrant citizens claiming in-work benefits, a new Oxford University study argues that rather than pursuing treaty change, more constructive thinking could ease the financial burden on British taxpayers. The study author says one solution could be to set up an EU fund for helping local authorities most affected by immigration. He also highlights the relatively lax access to NHS services that EU citizens enjoy in Britain compared with other EU member states.
-
-
DHS asks judge to cancel contempt hearing over immigration executive order
When President Barack Obama last year issued his Deferred Action for Childhood Arrivals (DACA) executive order, applicants covered by the order received a three-year work permit, or EADs (Employment Authorization Documents). On 16 February 2015, Brownsville, Texas-based U.S. District Judge Andrew Hanen temporarily blocked Obama’s immigration action. After the temporary injunction was in place, the federal government mistakenly issued the approximately 2,500 three-year permits. On Friday, DHS secretary Jeh Johnson asked Judge Hanen not to find him and other Obama administration officials in contempt, telling the judge that DHS had recovered all but 22 of the 2,500 offending permits. Johnson also advised the judge that DHS had corrected federal computer databases to invalidate those permits not turned over by their owners.
-
-
N.Y. village pays ransom to regain access to hacker-encrypted files
The village Ilion in central New York paid ransom twice last year — $300 and $500 — to have access to its computers two official-looking e-mails planted malware throughout the village’s computer system. The New York State comptroller’s office has audited 100 municipal computer systems the past three years, and said the experience of Ilion should serve as a warning to others municipalities of the growing cyberthreat – especially attempts by hackers to infiltrate computer systems to make them inaccessible unless ransom is paid.
-
-
Community-based flood insurance offers benefits, faces challenges
Community-based flood insurance — a single insurance policy that in theory would cover an entire community — may create new opportunities to reduce flood losses and enhance the likelihood of communities paying more attention to flood risk mitigation, says a new National Academies report. This option for providing flood insurance, however, would not provide the sole solution for all of the nation’s flood insurance challenges.
-
-
North Wales wants to be “one of the most secure places in the world to do business”
Glyndŵr University is to play a leading role in the fight against cybercrime. The Wrexham, Wales-based university hosted the first meeting of the North Wales Cyber Security Cluster on Thursday (23 July). The institution and North Wales Police saw experts in online security and e-crime join the forum, and also invited members of the public and business owners who have been targeted in the past to attend and share information and advice, in a bid, the organizers say, “to make North Wales one of the most secure places in the world to do business.”
-
-
Initiative launched to expose those who fund, profit from wars in Africa
Oscar-winner actor George Clooney, in an effort to tackle corruption in war zones, on Monday launched an initiative to identify and help bring to justice individuals funding and profiting from Africa’s deadliest conflicts. Clooney and U.S. human rights activist John Prendergast launched the project, called The Sentry, which will investigate money flowing in and out of conflict zones, and pass on the information to policymakers to take action.
-
-
SRI International working to develop screening device for radiation exposure
radiation that may lead to severe health consequences post-exposure. To rapidly triage large numbers of people to determine who needs immediate treatment, a new, simple screening test is needed. Currently, if a person has absorbed a significant dose of ionizing radiation, there is nothing that can be done beyond waiting to see what symptoms develop, which roughly correlate with exposure level. SRI International has been awarded a $12.2 million contract to continue development of a diagnostic test for absorbed doses of radiation following a radiological incident.
-
-
DHS S&T licenses third cybersecurity innovation for commercialization
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) yesterday announced that another cybersecurity technology has been licensed for commercialization. This is S&T’s third technology that has successfully gone through the Transition to Practice (TTP) program and into the commercial market. The Network Mapping System (NeMS), developed by Lawrence Livermore National Laboratory, is a software-based tool that tells users what is connected to their network so that they know what needs to be protected.
-
-
NIST, NTIA seeking industry partners for public safety communications test bed
The Commerce Department’s Public Safety Communications Research (PSCR) program is signing up a new round of industry collaborators for the test bed used to evaluate advanced broadband equipment and software for emergency first responders. So far, thirty-nine telecommunications companies have signed new, five-year Cooperative Research and Development Agreements (CRADAs) to participate in the test bed program.
-
-
Why organizations fight data breaches differently
Since digitalization began, organizations have understood how valuable their information is. In the wake of recent high-profile security breaches at retail stores such as Target and Neiman Marcus, a new study seeks to determine why differences exist in the level of information security control resources among organizations.
-
More headlines
The long view
Are We Ready for a ‘DeepSeek for Bioweapons’?
Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”
A Brief History of Federal Funding for Basic Science
Biomedical science in the United States is at a crossroads. For 75 years, the federal government has partnered with academic institutions, fueling discoveries that have transformed medicine and saved lives. Recent moves by the Trump administration — including funding cuts and proposed changes to how research support is allocated — now threaten this legacy.
Bookshelf: Preserving the U.S. Technological Republic
The United States since its founding has always been a technological republic, one whose place in the world has been made possible and advanced by its capacity for innovation. But our present advantage cannot be taken for granted.
Critical Minerals Don’t Belong in Landfills – Microwave Tech Offers a Cleaner Way to Reclaim Them from E-waste
E-waste recycling focuses on retrieving steel, copper, aluminum, but ignores tiny specks of critical materials. Once technology becomes available to recover these tiny but valuable specks of critical materials quickly and affordably, the U.S. can transform domestic recycling and take a big step toward solving its shortage of critical materials.
Microbes That Extract Rare Earth Elements Also Can Capture Carbon
A small but mighty microbe can safely extract the rare earth and other critical elements for building everything from satellites to solar panels – and it has another superpower: capturing carbon dioxide.