Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Cybersecurity

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • TRUTH DECAYGrok’s ‘White Genocide’ Responses Show How Generative AI Can Be Weaponized

    By James Foulds, Phil Feldman, and Shimei Pan

    The AI chatbot Grok spent one day in May 2025 spreading debunked conspiracy theories about “white genocide” in South Africa, echoing views publicly voiced by Elon Musk. There has been substantial research on methods for keeping AI from causing harm by avoiding such damaging statements – called AI alignment – but this incident is particularly alarming because it shows how those same techniques can be deliberately abused to produce misleading or ideologically motivated content.

    • Read more
  • QUANTUM REALITIESOur Online World Relies on Encryption. What Happens If It Fails?

    By Maureen Stanton

    Quantum computers will make traditional data encryption techniques obsolete; BU researchers have turned to physics to come up with better defenses.

    • Read more
  • HARDWARE SECURITYCircuit Boards Must Be Trusted. So We’d Better Make Them in Australia

    While national security debates have focused on chips and microelectronics, the role of printed circuit board (PCBs) in underpinning system trust has gone largely unexamined. In today’s contested environment, that carries strategic consequences.

    • Read more
  • DEMOCRACY WATCHRegulating X Isn’t Censorship. It’s Self-Defense

    By Fergus Ryan

    The European Union’s landmark new content law, the Digital Services Act (DSA) reflects hard-earned European wisdom. It comes from historical memory of democracies undone by propaganda, foreign interference, and the normalization of lies. Vice President J. D. Vance and X owner Elon Musk harshly criticize DSA, framing their agenda as “free speech,” but in Europe, it increasingly looks like a coordinated push to weaken democratic institutions and empower their far-right allies.

    • Read more
  • CHINA WATCHIt’s Not Just Software. Physical Critical Equipment Can’t Be Trusted, Either

    By Jason Van der Schyff

    Just auditing the software in critical equipment isn’t enough. We must assume that adversaries, especially China, will also exploit the hardware if they can.

    • Read more
  • RANSOMWRERansomware Drives U.S. Health Data Breaches

    Ransomware attacks — which involve a hacker putting encryption controls into a file and then demanding a ransom to unlock the files—have become the primary driver of health care data breaches in the United States, compromising 285 million patient records over 15 years.

    • Read more
  • SURVEILLANCEGovernments Continue Losing Efforts to Gain Backdoor Access to Secure Communications

    By Richard Forno

    The spotlight on encrypted apps such as Signal is a reminder of the complex debate pitting government interests against individual liberties.

    • Read more
  • DATA PROTECTIONHow We Think About Protecting Data

    By Peter Dizikes

    A new study shows public views on data privacy vary according to how the data are used, who benefits, and other conditions.

    • Read more
  • COMMON-SENSE NOTES // By Idris B. OdunewuThe Future of Open Data in the Age of AI: Safeguarding Public Assets Amid Growing Private Sector Demands

    AI offers immense potential, but that potential must be realized within a framework that protects the public’s right to its own information. The open data movement must evolve to meet this new challenge—not retreat from it.

    • Read more
  • TECHNOLOGY & CONFLICTWhat if Bin Laden Was Killed in the Era of Generative AI?

    By Matthew J. Fecteau

    By leveraging machine learning to produce AI-generated content, adversaries can weaponize synthetic media, making fact and fiction nearly indistinguishable. The death—or not—of combatant leaders is prime example of the magnitude of the challenge this emerging reality poses.

    • Read more
  • TECHNOLOGY & CONFLICTMemes and Conflict: Study Shows Surge of Imagery and Fakes Can Precede International and Political Violence

    By Tim Weninger and Ernesto Verdeja

    The widespread use of social media during times of political trouble and violence has made it harder to prevent conflict and build peace.

    • Read more
  • WATER SECURITYProtecting Florida’s Water Infrastructure from Cyber Threats

    INL and the state of Florida are collaborating on an innovative cybersecurity initiative aimed at protecting Florida’s water infrastructure from cyber threats.

    • Read more
  • QUANTUM COMPUTING & ENCRYPTIONDecrypting Tomorrow’s Threats: Critical Infrastructure Needs Post-Quantum Protection Today

    By Jason Van der Schyff

    Some argue we still have time, since quantum computing capable of breaking today’s encryption is a decade or more away. But breakthrough capabilities, especially in domains tied to strategic advantage, rarely follow predictable timelines. The time to act on the quantum computing threat was yesterday. The next best time is now.

    • Read more
  • QUANTUM COMPUTING & ENCRYPTIONQuantum Computing - How it Changes Encryption as We Know It

    All of the current encryption standards were created without the consideration of quantum computing and its capabilities. Classical computing would take thousands of years, or more, to crack encryption standards such as RSA or ECC. Quantum computing has the potential to break RSA and ECC encryption within hours or even minutes. AES encryption remains the most secure standard currently in use, but quantum computers will crack it in a fraction of the time that classical computers can.

    • Read more
  • CYBERSECURITYNeed for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report

    There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.

    • Read more
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • Primary Mitigations to Reduce Cyber Threats to Operational Technology
  • Another cybersecurity False Claims Act settlement
  • Cyber congressman demands answers before CISA gets cut down to size
  • US to sign Pall Mall pact aimed at countering spyware abuses
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Time to Invest in Cybersecurity for U.S. Sealift Forces, Report Says
  • President Trump Extends National Emergency With Respect to Significant Cyber Threats for Another Year
  • Senators Press DHS for Details on GPS Jamming Protections
  • Recently-patched Firefox bug exploited against Tor browser users
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • ENCRYPTIONEncryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models

    In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.

    • Read more
  • CYBERSECURITYNeed for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report

    There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies