Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Cybersecurity

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Fighting cyber attacks costs Pentagon $100 million

    The U.S. Department of Defense and military are subject to constant cyber attacks against their networks; the cost of repairing the damage of such attacks — manpower, computer technology, and contractors hired to clean up after both external probes and internal mistakes — is $100 million a year

    • Read more
  • Hackers of U.S. electrical grid left behind "sleeper" software programs

    The U.S. electrical grid has been penetrated by sophisticated hackers who left behind “sleeper” software programs which could be remotely activated to disrupt the system; the intelligence community says it is the work of Russian and Chinese government operatives

    • Read more
  • U.K. Home Office terrorism advisory site offered link to a porno site

    On Monday, a new EU regulation went into effect mandating that ISPs store details of user e-mails and Internet calls; a Home Office site contained a link for citizens who felt the measure was too intrusive, and who would want to send the Home Office a complaint about it; trouble is, those who clicked on the link were sent to a Japanese porno site

    • Read more
  • Aussie company targets CCTV market for its encryption technology

    Melbourne-based network encryption company Senetas Corporation, a leading developer of encryption products, said the growing CCTV market, still in its infancy as far as security is concerned, offers its encryption solutions an attractive opportunity

    • Read more
  • U.S. cybersecurity law to give feds unprecedented Internet control

    Lawmakers draft legislation giving the U.S. government unprecedented authority over the U.S. critical infrastructure, including the power to shut down or limit traffic on private networks during emergencies; the legislation is intended to protect a broad range of the U.S. infrastructure — including networks for the country’s banking industry, utilities, transportation, and telecommunications — from cyber attacks

    • Read more
  • U.S. legislators supports creation of cybersecurity czar

    Vowing to prevent Cyber Katrina, U.S. senators propose cyber czar

    • Read more
  • Dubious distinction: U.S. produces most cybercriminals -- and victims

    Cybercriminals defrauded victims out of an estimated $265 million, with the average victim losing about $1,000; two out of three cybercriminals — and 93 percent of victims — were Americans

    • Read more
  • New DHS security tool to detect Conficker worm

    Conficker had been programmed to reach out to 250 Web sites daily to download commands from its masters — but tomorrow it will begin connecting with 50,000 Web sites daily for instructions

    • Read more
  • Chemical company wants to limit disclosure on plant explosion

    An explosion in a chemical plant in West Virginia plant killed two employees and raised fears about the safety of chemical plants located near residential areas; the plant owner, citing a terrorism-related federal law, is trying to limit what the federal chemical safety agency can disclose to the public

    • Read more
  • The notion that cybercrime exceeds drug trade is a myth

    The number of $1 trillion — as in “cybercrime now generates $1 trillion a year for cybercriminals” — appears to be a myth, even it if is repeated by IT security and communication companies

    • Read more
  • Denmark, Sweden ahead of U.S. in new global IT report

    Denmark and Sweden are better than the United States in their ability to exploit information and communications technology; this good news for the United States: it climbed one spot from No. 4 in 2007 to No. 3, and the report says the United States was well placed for a technology-driven recovery as it has the top scientific research institutions in the world and best collaboration between universities and industries

    • Read more
  • Taliban continue campaign against cellular service in Waziristan

    Taliban and al-Qaeda militants believe that the CIA and U.S. military rely on cellular communication intercepts to track and kill members of the two organizations; Taliban leaders warned Pakistan not to expand the cellular network in the areas under Taliban control; those networks already in place must be shut down overnight

    • Read more
  • Video on beyond line-of-sight high-bandwidth connection possible

    Boeing demonstrates that transmitting video on beyond line-of-sight high-bandwidth connection is possible

    • Read more
  • Political denial-of-service attacks on the rise

    The cases of Estonia in 2007 and Georgia in 2008 illustrate how dedicated denial-of-service attacks can nearly paralyze a country; trouble is, now attackers can purchase tools such as Black Energy or NetBot Attacker, made by Russian and Chinese hackers, respectively, for less than $100 a piece

    • Read more
  • Experts: Russian intelligence behind cyber attacks

    A panel of IT security experts concluded that there is a “strong likelihood” that the Foreign Military Intelligence agency (the GRU) and Federal Security Service (the FSB) directed cyber attacks on Georgian government servers in July and August of 2008

    • Read more
  • « first
  • ‹ previous
  • …
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • …
  • next ›
  • last »

More headlines

  • Iran may go after US defense firms with cyber attacks, warn Pentagon, Homeland Security
  • Primary Mitigations to Reduce Cyber Threats to Operational Technology
  • Another cybersecurity False Claims Act settlement
  • Cyber congressman demands answers before CISA gets cut down to size
  • US to sign Pall Mall pact aimed at countering spyware abuses
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Time to Invest in Cybersecurity for U.S. Sealift Forces, Report Says
  • President Trump Extends National Emergency With Respect to Significant Cyber Threats for Another Year
  • Senators Press DHS for Details on GPS Jamming Protections
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Researchers Develop AI Agent That Solves Cybersecurity Challenges Autonomously

    New framework called EnIGMA demonstrates improved performance in automated vulnerability detection using interactive tools.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies