Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Cybersecurity

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Cyberattacks Have Yet to Play a Significant Role in Russia’s Battlefield Operations in Ukraine – Cyberwarfare Experts Explain the Likely Reasons

    Since the latter half of 2021 analysts offered contrasting predictions about the role cyberspace would play in an armed conflict. These predictions capture an ongoing debate about whether conflict in cyberspace is destined to supplant conventional conflict or exacerbate it. As the war has evolved, it’s clear that analysts on both sides of the debate got it wrong.

    • Read more
  • Russia’s Cyber War: What’s Next and What the European Union Should Do.

    The EU has made long-term changes which will improve it’s cybersecurity. However, the bloc needs to make a series of short-term changes to guard against potential Russian cyberattacks.

    • Read more
  • Identifying Methods to Predict Future Cyberattacks

    “Malware” is a big threat for modern society. In 201, 2.8 billion consumer data records were breached, costing more than $654 billion to U.S. organizations, posing a massive industry threat. The numbers have only increased since then. Researchers are investigating ways to accurately predict these attacks.

    • Read more
  • Deepfakes and Fake News Pose a Growing Threat to Democracy: Experts

    Experts say that both fake news and deepfakes have the negative effect of delegitimizing real news. They say fake news and deepfakes decrease the amount of true information available, reduce consumers’ trust in authentic media, and put an added burden on fact-checkers to authenticate the vast amount of content online.

    • Read more
  • Five Fact-Checking Tips from Disinformation Experts

    Saturday, 2 April, was the International Fact Checking Day. The European Digital Media Observatory is an EU-wide platform to combat disinformation while protecting the core value of freedom of expression.

    • Read more
  • Cyber and Physical Security Should Collaborate: What Does It Take to Achieve This

    To understand and mitigate threats that cross the boundary between what is cyber and what is physical, some organizations have integrated their security resources to encourage them to work more closely together.

    • Read more
  • Tiny, Cheap Solution for Quantum-Secure Encryption

    A new kind of encryption could secure data in the age of quantum computers, ensuring medical records are destroyed after being read by a doctor, or to enforce time limits on software licenses. They can secure voting records or validate NFTs or just make sure no one is reading your email. Microchips with tiny clocks may hold key to future of computing security.

    • Read more
  • Protecting Picture Passwords Using Adjustable Distortion

    Researchers developed a new system for graphical authentication online using key images with adjustable levels of distortion to thwart over-the-shoulder and screen-capture snooping, which may make online sites more secure.

    • Read more
  • Ukraine Offers Lessons for Russia’s 2024 Election Interference

    For all the media attention on the domestic political dimensions, the Kremlin’s interference in the 2016 and 2020 presidential elections (and the 2018 midterms) included a significant focus on shaping U.S. policy toward Ukraine. Exerting influence on U.S. Ukraine policy Ukraine has long been a goal of Russian disinformation efforts, so American policymakers must prepare now for this influence effort to reemerge in 2024.

    • Read more
  • Warning: Objects in Driverless Car Sensors May Be Closer Than They Appear

    Researchers have demonstrated the first attack strategy that can fool industry-standard autonomous vehicle sensors into believing nearby objects are closer (or further) than they appear without being detected.

    • Read more
  • The Digital Skills Gap: What Workers Need for the Jobs of the Future

    The COVID-19 pandemic quickened the pace of digital development around the world, as everything from meetings to movie premiers went online. That may sound like a silver lining. For tens of millions of workers, it’s not. They don’t have the skills to compete.

    • Read more
  • Anti-Semitic Conspiracy Theories “Explain” Russian Assault on Ukraine

    Since Russia’s invasion of Ukraine on February 24, 2022, extremists and anti-Semites across the ideological spectrum have used the war as fodder for promoting anti-Semitic conspiracy theories.

    • Read more
  • Russia Shows the Limits of Propaganda

    Beyond the outer fringes of Western politics, neither Russia’s contrived casus belli nor its wartime information operation have been taken seriously in Europe or America.

    • Read more
  • Extremist Propaganda Remained at Historic Levels in 2021

    The distribution of propaganda by racially or ethnically motivated violent extremists (RMVEs) remained at historic levels across the United States in 2021, with a total 4,851 cases of racist, anti-Semitic and other hateful messages. The latest data comes amid a surge in anti-Semitic hate fliering in January and February targeting at least 15 states nationwide.

    • Read more
  • A Systems Approach to Cybersecurity

    The frequency and severity of cyberattacks on critical infrastructure is a subject of concern for many governments, as are the costs associated with cyber security, making the efficient allocation of resources paramount. A new study proposes a framework featuring a more holistic picture of the cyber security landscape, along with a model that explicitly represents multiple dimensions of the potential impacts of successful cyberattacks.

    • Read more
  • « first
  • ‹ previous
  • …
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • …
  • next ›
  • last »

More headlines

  • Iran may go after US defense firms with cyber attacks, warn Pentagon, Homeland Security
  • Primary Mitigations to Reduce Cyber Threats to Operational Technology
  • Another cybersecurity False Claims Act settlement
  • Cyber congressman demands answers before CISA gets cut down to size
  • US to sign Pall Mall pact aimed at countering spyware abuses
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Time to Invest in Cybersecurity for U.S. Sealift Forces, Report Says
  • President Trump Extends National Emergency With Respect to Significant Cyber Threats for Another Year
  • Senators Press DHS for Details on GPS Jamming Protections
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Researchers Develop AI Agent That Solves Cybersecurity Challenges Autonomously

    New framework called EnIGMA demonstrates improved performance in automated vulnerability detection using interactive tools.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies