Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Cybersecurity

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Extremists Co-Opt Hurricane Response to Blame Israel, Incite a Storm of Hateful Narratives

    Right-wing extremists have been exploiting the devastation surrounding Hurricane Helene — a storm that has so far claimed the lives of at least 230 people in the southeast U.S.— and now Hurricane Milton, to advance antisemitic or anti-Israel conspiracy theories that federal disaster assistance has been slow or inadequate because they believe the U.S. is sending funds and personnel to Israel instead.

    • Read more
  • Oversight Revealed in AI Image Recognition Tools

    Artificial intelligence can help people process and comprehend large amounts of data with precision, but the image recognition platforms and computer vision models that are built into AI frequently overlook an important back-end feature called the alpha channel. Researchers developed a proprietary attack called AlphaDog to study how hackers can exploit this oversight.

    • Read more
  • 2025 Homeland Threat Assessment

    DHS has issued its 2025 threat assessment, focusing on the most direct, pressing threats to the U.S. homeland during the next year. The assessment is organized around DHS missions that most closely align or apply to these threats—public safety, border and immigration, critical infrastructure, and economic security.

    • Read more
  • Election Security: When to Worry, When to Not

    Everyone wants an election that is secure and reliable and that will ensure that the voters’ actual choices are reflected in the results. At the same time, not every problem in voting technology or systems is worth pulling the fire alarm —we have to look at the bigger story and context. And we have to stand down when our worst fears turn out to be unfounded.

    • Read more
  • U.S. Warns Voters of Disinformation Deluge

    American voters are likely about to be swamped by a flood of misinformation and influence campaigns engineered by U.S. adversaries aiming, according to senior U.S. intelligence officials, to sway the results of the upcoming presidential election and cast doubt on the process itself.

    • Read more
  • How Foreign Operations Are Manipulating Social Media to Influence Your Views

    Foreign influence campaigns, or information operations, have been widespread in the run-up to the 2024 U.S. presidential election. Influence campaigns aim to shift public opinion, push false narratives or change behaviors among a target population. Russia, China, Iran, Israel and other nations have run these campaigns by exploiting social bots, influencers, media companies and generative AI.

    • Read more
  • Subsea Communications Cables: Vital but Vulnerable

    Ensuring the resilience of the submarine cable network against disruptions is crucial. Lying deep on the ocean floor, these fiber-optic cables can transmit massive amounts of data at high speeds with low latency, making them far more efficient than satellites, which handle only a fraction of global data transmission. 

    • Read more
  • Governments Respond to Multiple Claims on Helene

    Bad actors coming in behind hurricanes in North Carolina to spread false claims is nothing new. This time, the White House felt the need to respond.

    • Read more
  • Fact-Checking the Viral Conspiracies in the Wake of Hurricane Helene

    Buoyed by firebrands like Alex Jones and Marjorie Taylor Greene, Helene stirred up a toxic stew of conspiracy theories and culture war politics.

    • Read more
  • Some Online Conspiracy-Spreaders Don’t Even Believe the Lies They’re Spewing

    There has been a lot of research on the types of people who believe conspiracy theories, and their reasons for doing so. But there’s a wrinkle: My colleagues and I have found that there are a number of people sharing conspiracies online who don’t believe their own content.

    • Read more
  • Online Misinformation Most Likely to Be Believed by Ideological Extremists: Study

    There has been a dramatic rise of online misinformation, but the influence of misinformation is not universal. Rather, users with extreme political views are more likely than are others to both encounter and believe false news.

    • Read more
  • You’d Never Fall for an Online Scam, Right?

    Wrong, says cybersecurity expert. Con artists use time-tested tricks that can work on anyone regardless of age, IQ — what’s changed is scale.

    • Read more
  • Online Signals of Extremist Mobilization

    Olivia Brown’s study analyses the online behaviors of individuals who mobilized to right-wing extremist action, revealing that discussions about violent actions and logistical planning, rather than ideological content, are key indicators of mobilization.

    • Read more
  • New Security Protocol Shields Data from Attackers During Cloud-Based Computation

    The technique leverages quantum properties of light to guarantee security while preserving the accuracy of a deep-learning model.

    • Read more
  • Research Showing Facebook's News-Feed Algorithm Curbs Election Misinformation Debunked

    Though Facebook can limit untrustworthy content, new research suggests it often chooses not to. A flawed Meta-funded research helped to create the misperception, widely reported by the media, that Facebook and Instagram’s news feeds are largely reliable sources of trustworthy news.

    • Read more
  • « first
  • ‹ previous
  • …
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • …
  • next ›
  • last »

More headlines

  • Primary Mitigations to Reduce Cyber Threats to Operational Technology
  • Another cybersecurity False Claims Act settlement
  • Cyber congressman demands answers before CISA gets cut down to size
  • US to sign Pall Mall pact aimed at countering spyware abuses
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Time to Invest in Cybersecurity for U.S. Sealift Forces, Report Says
  • President Trump Extends National Emergency With Respect to Significant Cyber Threats for Another Year
  • Senators Press DHS for Details on GPS Jamming Protections
  • Recently-patched Firefox bug exploited against Tor browser users
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models

    In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.

    • Read more
  • Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report

    There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies