Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Computers / software

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Political denial-of-service attacks on the rise

    The cases of Estonia in 2007 and Georgia in 2008 illustrate how dedicated denial-of-service attacks can nearly paralyze a country; trouble is, now attackers can purchase tools such as Black Energy or NetBot Attacker, made by Russian and Chinese hackers, respectively, for less than $100 a piece

    • Read more
  • Kaminsky: MS Crash Analyzer a "game changer"

    Microsoft released an open-source program designed to streamline the labor-intensive process of identifying security vulnerabilities in software while it is still under development

    • Read more
  • Swimming pool game inspires robot detection

    Researchers use the Marco Polo game to solve a complex problem — how to create a system that allows robots not only to “sense” a moving target, but intercept it

    • Read more
  • Critics: Commercially driven deep packet inspection (DPI) is akin to wiretapping

    New technology now allows third parties to engage in deep packet inspection (DPI), a technique that makes it possible to peer inside packets of data transmitted across the Internet; data collected is then sold to other companies to allow them more targeted advertising

    • Read more
  • Computer models of unconventional warfare

    Wildcats researchers to design intelligent software that can analyze the behavior and customs of political and cultural groups; part of the Asymmetric Threat Response and Analysis Project, known as ATRAP

    • Read more
  • Debunking IT myths

    As IT spreads, so do IT myths and legends; two experts debunk some of the more popular myths

    • Read more
  • New software allows laptops to talk back boldly to laptop thieves

    Your laptop has been stolen? New software allows you to tell those thieves exactly — and when we say exactly, we mean exactly — what you think of them; software also helps police locate the stolen computer

    • Read more
  • Researchers spoof, bypass face-recognition authentication systems

    Vietnamese researchers have cracked facial recognition technology in Lenovo, Asus, and Toshiba laptops; the researchers demonstrated feat at this week’s Black Hat DC event

    • Read more
  • Cybersecurity contractor's network hacked

    A large U.S. government contractor specializing in providing cybersecurity and privacy services, has warned its employees their personal information may have been stolen after hackers planted a virus on its computer network

    • Read more
  • World's largest supercomputer will be used for nuclear stockpile research

    IBM to build a 20 petaflops supercomputer, called Sequoia, for the Lawrence Livermore lab; a petaflop stands for a quadrillion floating-point operations per second; to put Sequoia’s computing power in perspective, what it can do in one hour would take all 6.7 billion people on Earth with hand calculators 320 years, if they worked together on the calculation for 24 hours per day, 365 days a year

    • Read more
  • Experts watch for Conficker superworm to be activated

    Conficker has infected at least 9 million computers; security experts anxiously wait for it to be activated; infection dwarfs the zombie army created by the infamous Storm worm, which reached a mere 1 million at its peak in September 2007

    • Read more
  • Pair behind Chinese counterfeit computer components arrested

    Two California men arrested for illegally exporting sensitive technology to China; pair also accused of conspiring to purchase counterfeit electronic components for distribution in the U.S.

    • Read more
  • Software analyzes news reports to identify terrorists

    Rice University researchers develop artificial intelligence-based computer program which can scan news reports quickly to identify which terrorist group is behind a terrorist attack being covered in the reports

    • Read more
  • New, major weakness in Internet security reported

    New weakness discovered in Internet security; the vulnerability allows impersonation of secure Web sites and e-mail servers; it also allows hackers to perform virtually undetectable phishing attacks

    • Read more
  • IRS's IG says agency IT staff too lax

    IG report says IT staff were not always saving or reviewing system audit logs, and clock settings on some firewalls and routers did not comply with IRS rules, increasing likelihood of unauthorized intrusion

    • Read more
  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • next ›
  • last »

More headlines

  • Feds Face a Tough Challenge in Closing the Cyber Skills Gap
  • Drones, computers new weapons of U.S. shadow wars
  • New app gives early warning of mean messages
  • New Internet standard gives global network room to grow
  • Overturning Moore’s Law: DARPA seeks boosting embedded computing without adding heat and size
  • Windows 8 Beta to be released early February: Microsoft
  • Kindle Fire shipments could reach 5M by January
  • Nvidia to provide next processor for Amazon Kindle II
  • Nokia expects to release Windows 8 tablet by June
  • Barnes and Noble tablet to ship earlier than planned
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

No stories

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies