Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Computers / software

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • U r pwned: text messaging as a hacking tool

    Text messages appear on mobile phones without any interaction from the user, and sometimes with limited interference from the cellular network operators — giving criminals an opening to break into those devices

    • Read more
  • IBM acquires Ounce Labs

    Securing software code is a growing business, and IBM is buying code security specialist Ounce Labs

    • Read more
  • Defcon, Black Hat to open this week

    Leading cybersecurity events to open in Las Vegas this week; if you prefer security shows at which the speakers favor black T-shirts and dyed hair over suits and ties, and where goth-attired groupies and script kiddies hunkered over laptops line the hallways at all hours of the night, you should attend

    • Read more
  • Vcom3D's iPod translator device is a valuable tool for U.S. soldiers

    Florida-based Vcom3D developed software which was used in conjunction with Apple’s iPod to teach sign language to hearing-impaired students; now, the U.S. military and UN peacekeepers use the device as an instant translator in war-torn regions

    • Read more
  • Predicting hurricanes

    Researchers developed a new computer model that they hope will predict with unprecedented accuracy how many hurricanes will occur in a given season

    • Read more
  • DARPA awards BBN $30 million in Machine Reading project

    Machine reading technology would be used particularly by military intelligence staff seeking to boil down mountains of information about theaters or areas of operation into useful form

    • Read more
  • Method discovered to process encrypted data without knowing its content

    IBM researcher solves thorny mathematical problem that has confounded scientists since the invention of public-key encryption several decades ago; the breakthrough makes possible the analysis of encrypted information — data that has been intentionally scrambled — without sacrificing confidentiality

    • Read more
  • U.K. government: Best cyber defense is cyber offense

    New National Security Strategy document includes, for the first time, a public cyber security strategy; unnamed high government source: “We don’t want to engage in cyber war but we can’t remain a target for criminals to take a pop at”

    • Read more
  • U.S. cybersecurity chief says there is a lucrative market in malware

    Philip Reitinger: “There is an entire community of people who are involved, organized crime is involved” in cybercrime underground market economy

    • Read more
  • Quantum computing nears with European QAP project

    QAP co-coordinator Professor Ian Walmsley: “Quantum computing, when it arrives, could make all current cryptographic technology obsolete”

    • Read more
  • EU to rely on advanced network technology to bolster resilience

    EU security agency recommends greater use of advanced networking technologies such as IPv6, DNSSec, and MPLS to strengthen the resilience of communication networks

    • Read more
  • U.S. military developing simple-to-use cyber attack devices

    Most soldiers are not IT specialists, so DARPA is looking to develop simple-to-use cyber warfare gadgets which would allow nonspecialists to penetrate satellites, VoIP networks, and supervisory control and data acquisition systems (SCADA)

    • Read more
  • Wanted: high school hackers, crackers, and other digital deviants

    The Pentagon is looking for a few good high-school hackers; in an effort to counter sustained Chinese and Russian hacking of U.S. government and industry networks, the Pentagon is launching a new military-funded program aimed at leveraging an untapped resource: the U.S. population of geeky high school and college students

    • Read more
  • Cyber security experts unveil spammer strategies

    Computer security experts infiltrated a botnet called Storm and analyzed the way its complex internal communications worked; knowledge gained will help in writing anti-spam software

    • Read more
  • Making quantum cryptography's promise a reality

    New research details how quantum communication can be made possible without having to use cryogenic cooling or complicated optical setups, making it much more likely to become commercially viable soon

    • Read more
  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • next ›
  • last »

More headlines

  • Feds Face a Tough Challenge in Closing the Cyber Skills Gap
  • Drones, computers new weapons of U.S. shadow wars
  • New app gives early warning of mean messages
  • New Internet standard gives global network room to grow
  • Overturning Moore’s Law: DARPA seeks boosting embedded computing without adding heat and size
  • Windows 8 Beta to be released early February: Microsoft
  • Kindle Fire shipments could reach 5M by January
  • Nvidia to provide next processor for Amazon Kindle II
  • Nokia expects to release Windows 8 tablet by June
  • Barnes and Noble tablet to ship earlier than planned
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

No stories

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies