Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Cybersecurity

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Is DOGE a Cybersecurity Threat? Explaining the Dangers of Violating Protocols and Regulations That Protect Government Computer Systems

    Teams from the Department of Government Efficiency (DOGE) are dropping into federal agencies with a practically unlimited mandate to reform the federal government in accordance with recent executive orders. As a 30-year cybersecurity veteran, I find the activities of DOGE thus far concerning. Its broad mandate across government, seemingly nonexistent oversight, and the apparent lack of operational competence of its employees have demonstrated that DOGE could create conditions that are ideal for cybersecurity or data privacy incidents that affect the entire nation.

    • Read more
  • Researchers Calculate Cyberattack Risk for All 50 States

    Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.

    • Read more
  • Trump Inviting Influencers to White House Press Briefings Is Likely to Usher in a New Era of Fake News

    The steady rise in prominence of partisan influencers using increasingly dangerous language is only likely to lead to the American public having less faith in the institutions that are critical to a functioning democracy –the press included.

    • Read more
  • Security Vulnerabilities Discovered in Apple Processors

    The US tech giant Apple has always advertised security assurances alongside ever faster processor performance for its products. Now an international team of cybersecurity researchers has discovered at least two security vulnerabilities.

    • Read more
  • In Times of Crisis, States Have Few Tools to Fight Misinformation

    While officials in Southern California fought fire and falsehoods, Meta —the parent company of Facebook and Instagram —announced it would eliminate its fact-checking program in the name of free expression. As social media companies are pushing back against efforts to crack down on falsehoods, questions are asked about what, if anything, state governments can do to stop the spread of harmful lies and rumors that proliferate on social media.

    • Read more
  • Fighting Deepfakes: What’s Next After legislation?

    Deepfake technology is weaponizing artificial intelligence in a way that disproportionately targets women, especially those working public roles, compromising their dignity, safety, and ability to participate in public life.

    • Read more
  • Treasury Sanctions Company, Hacker Associated with Salt Typhoon

    The Department of the Treasury has sanctioned a Chinese national and a Chinese company for their direct involvement in the Salt Typhoon cyber group, which recently compromised the network infrastructure of multiple major U.S. telecommunication and internet service provider companies.

    • Read more
  • Climate Misinformation Is Rife on Social Media – and Poised to Get Worse

    The decision by Meta, the parent company of Facebook and Instagram, to end its fact-checking program and otherwise reduce content moderation would open the floodgates to more climate misinformation on Meta’s apps, including misleading or out-of-context claims during disasters. Crowd-sourced debunking is no match for organized disinformation campaigns in the midst of information vacuums during a crisis. The conditions for the rapid and unchecked spread of misleading, and outright false, content could get worse with Meta’s content moderation policy and algorithmic changes.

    • Read more
  • The World's Top Global Risk Is Misinformation and Disinformation: World Economic Forum

    Mis- and disinformation have once again been named the top global risk of the immediate term in the annual World Economic Forum (WEF) Global Risks Report 2025. Disinformation is deeply insidious, destructive and rapidly evolving. It often comes hand-in-hand with its less malicious but equally destructive cousin, misinformation.

    • Read more
  • The Dynamics That Polarize Us on Social Media Are About to Get Worse

    Meta founder and CEO Mark Zuckerberg has announced Facebook, Instagram and Threads, instead of relying on independent third-party factcheckers, will now emulate Elon Musk’s X in using “community notes.”But research shows that political polarization prevents community fact-checking from even occurring – and, what is worse, community-notes systems are vulnerable to manipulation by well organized groups, and foreign governments, with political agendas.

    • Read more
  • What Meta’s Move to Community Moderation Could Mean for Misinformation

    Achieving the right balance between protecting free speech and ensuring the integrity of information is a complex challenge. Meta’s shift from professional factchecking to crowdsourced community moderation risks undermining this balance by amplifying the spread of disinformation and hateful speech. Free expression without proper safeguards can enable the unchecked proliferation of harmful content, including conspiracy theories, hate speech and medical misinformation.

    • Read more
  • Meta to Move Content Moderators to Texas as Part of Plan to End Fact-Checking Program

    The tech giant’s decision to end the program comes as CEO Mark Zuckerberg seeks to mend ties with the incoming Trump administration.

    • Read more
  • Cartels Turn to Social Media to Lure Americans into Human Smuggling as Texas Enforces Stricter Laws

    Thousands of people have been arrested under Texas’ human smuggling law. Now they face at least a decade in prison under sentencing guidelines that took effect this year.

    • Read more
  • Five Cybersecurity Tips to Protect Yourself from Scams and Deepfakes

    In an age where misinformation and deepfakes blur the lines between fact and fiction, identifying scams has never been more challenging. Cybersecurity experts share their top tips to help you protect yourself and your loved ones from scams and identity theft.

    • Read more
  • Keep the U.S. Government Focused on Combating Foreign Interference Operations

    Countering foreign interference requires concerted policy efforts to raise the costs for adversaries. Harnessing military and intelligence capabilities to push back forcefully must be part of policy discussions to address foreign interference.

    • Read more
  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • Iran may go after US defense firms with cyber attacks, warn Pentagon, Homeland Security
  • Primary Mitigations to Reduce Cyber Threats to Operational Technology
  • Another cybersecurity False Claims Act settlement
  • Cyber congressman demands answers before CISA gets cut down to size
  • US to sign Pall Mall pact aimed at countering spyware abuses
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Time to Invest in Cybersecurity for U.S. Sealift Forces, Report Says
  • President Trump Extends National Emergency With Respect to Significant Cyber Threats for Another Year
  • Senators Press DHS for Details on GPS Jamming Protections
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • What Does Netflix’s Drama “Adolescence” Tell Us About Incels and the Manosphere?

    While Netflix’s psychological crime drama ‘Adolescence’ is a work of fiction, its themes offer insight into the very real and troubling rise of the incel and manosphere culture online.

    • Read more
  • Confronting Core Problems in Cybersecurity

    It’s common for governors and mayors to declare a state of emergency and activate the National Guard in the aftermath of hurricanes, tornadoes, and other natural disasters. But last month, officials in Minnesota took these steps in the wake of a major cyberattack on the city of St. Paul —a testament to how disruptive these attacks have become.

    • Read more
  • Voting from Your Sofa Is Secure Enough – but Will It Be Allowed?

    A new electronic voting system developed at NTNU can withstand attacks from quantum computers, meaning digital elections can be conducted securely, even in the future.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies