Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Cybersecurity

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Facebook Posts Linking to Problematic Sites at Alarming Rates

    Over a hundred million American adults read news on social media. In the wake of the crisis in Ukraine, antisemitism, hate speech, and disinformation have spread widely on Facebook. Researchers found evidence of the continued presence of problematic posts on the platform, the most popular site for getting news, as well as the prevalence of external links directing users to alternative platforms and sites popular among extremists.

    • Read more
  • True or False: Work Practices of Professional Fact-Checkers

    Online misinformation is a critical societal threat . While fact-checking plays a role in combating the exponential rise of misinformation, little empirical research has been done on the work practices of professional fact-checkers and fact-checking organizations.

    • Read more
  • Researchers Team Up to Launch $1.5 Million Virtual Cybersecurity Institute

    An interdisciplinary group of researchers is teaming up to co-lead a new $1.5 million virtual institute that will help train the next generation of cybersecurity professionals for future military and civilian leadership positions.

    • Read more
  • Unmasking “Clandestine,” the Figure Behind the Viral “Ukrainian Biolab” Conspiracy Theory

    “Clandestine,” the man behind the viral biolab conspiracy theory, has been identified as Jacob Creech, a self-described former restaurant manager and Army National Guard veteran living in rural Virginia. The discovery highlights how a fringe QAnon figure, harnessing the power of social media, sparked a viral conspiracy theory which, in just a few weeks, made its way from QAnon to the world stage, amplified by Tucker Carlson, extreme far-right activists, the Proud Boys, Steve Bannon – and even the Kremlin.

    • Read more
  • ‘Ukraine Biolabs’: How Attempts to Debunk a Conspiracy Theory Only Helped It Spread

    As Russian forces moved into Ukraine on 24 February, stories of U.S.-funded biolabs and bioweapon research in Ukraine began to spread on social media. The false claims spread from right-wing circles but became more wide-spread, and were soon picked up by Fox News host Tucker Carlson. It wasn’t long until the Russian government, which had spread tales of Ukrainian biolabs in the past, adopted the narrative as a belated justification for the invasion. But, ironically, the very effort to debunk the Russian propaganda promoted by Carlson and Russia only gave to story more oxygen.

    • Read more
  • Facebook Fails to Appropriately Label 80% of Bioweapon Conspiracy Articles n Its Platform

    Facebook failed to label 80 percent of articles on its service which promote conspiracy theories about U.S. labs in Ukraine and Ukraine’s supposed intent to use CBW against Russia.

    • Read more
  • How Ukraine Has Defended Itself Against Cyberattacks – Lessons for the U.S.

    In 2014, as Russia launched a proxy war in Eastern Ukraine and annexed Crimea, and in the years that followed, Russian hackers hammered Ukraine. The cyberattacks went so far as to knock out the power grid in parts of the country in 2015. Russian hackers stepped up their efforts against Ukraine in the run-up to the 2022 invasion, but with notably different results. Those differences hold lessons for U.S. national cyber defense.

    • Read more
  • Cyberattacks Have Yet to Play a Significant Role in Russia’s Battlefield Operations in Ukraine – Cyberwarfare Experts Explain the Likely Reasons

    Since the latter half of 2021 analysts offered contrasting predictions about the role cyberspace would play in an armed conflict. These predictions capture an ongoing debate about whether conflict in cyberspace is destined to supplant conventional conflict or exacerbate it. As the war has evolved, it’s clear that analysts on both sides of the debate got it wrong.

    • Read more
  • Russia’s Cyber War: What’s Next and What the European Union Should Do.

    The EU has made long-term changes which will improve it’s cybersecurity. However, the bloc needs to make a series of short-term changes to guard against potential Russian cyberattacks.

    • Read more
  • Identifying Methods to Predict Future Cyberattacks

    “Malware” is a big threat for modern society. In 201, 2.8 billion consumer data records were breached, costing more than $654 billion to U.S. organizations, posing a massive industry threat. The numbers have only increased since then. Researchers are investigating ways to accurately predict these attacks.

    • Read more
  • Deepfakes and Fake News Pose a Growing Threat to Democracy: Experts

    Experts say that both fake news and deepfakes have the negative effect of delegitimizing real news. They say fake news and deepfakes decrease the amount of true information available, reduce consumers’ trust in authentic media, and put an added burden on fact-checkers to authenticate the vast amount of content online.

    • Read more
  • Five Fact-Checking Tips from Disinformation Experts

    Saturday, 2 April, was the International Fact Checking Day. The European Digital Media Observatory is an EU-wide platform to combat disinformation while protecting the core value of freedom of expression.

    • Read more
  • Cyber and Physical Security Should Collaborate: What Does It Take to Achieve This

    To understand and mitigate threats that cross the boundary between what is cyber and what is physical, some organizations have integrated their security resources to encourage them to work more closely together.

    • Read more
  • Tiny, Cheap Solution for Quantum-Secure Encryption

    A new kind of encryption could secure data in the age of quantum computers, ensuring medical records are destroyed after being read by a doctor, or to enforce time limits on software licenses. They can secure voting records or validate NFTs or just make sure no one is reading your email. Microchips with tiny clocks may hold key to future of computing security.

    • Read more
  • Protecting Picture Passwords Using Adjustable Distortion

    Researchers developed a new system for graphical authentication online using key images with adjustable levels of distortion to thwart over-the-shoulder and screen-capture snooping, which may make online sites more secure.

    • Read more
  • « first
  • ‹ previous
  • …
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • …
  • next ›
  • last »

More headlines

  • Primary Mitigations to Reduce Cyber Threats to Operational Technology
  • Another cybersecurity False Claims Act settlement
  • Cyber congressman demands answers before CISA gets cut down to size
  • US to sign Pall Mall pact aimed at countering spyware abuses
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Time to Invest in Cybersecurity for U.S. Sealift Forces, Report Says
  • President Trump Extends National Emergency With Respect to Significant Cyber Threats for Another Year
  • Senators Press DHS for Details on GPS Jamming Protections
  • Recently-patched Firefox bug exploited against Tor browser users
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models

    In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.

    • Read more
  • Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report

    There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies