Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Cybersecurity

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models

    In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.

    • Read more
  • Israeli Startup Raises $50m to Stop App-Based Cyberattacks

    Oligo Security’s platform allows for quick identification of vulnerabilities in cloud-native software before they are exploited by third parties.

    • Read more
  • Standardized Security Playbooks Improve Protection Against Cyberattacks

    Each company relies on its own security concepts and devises its playbooks individually. This means hardly any security-related information is shared between these organizations. And that is a problem, especially when business partners regularly exchange data, as is the case with industrial firms and their suppliers.

    • Read more
  • A Win for Encryption: France Rejects Backdoor Mandate

    In a moment of clarity after initially moving forward a deeply flawed piece of legislation, the French National Assembly has done the right thing: it rejected a dangerous proposal that would have gutted end-to-end encryption in the name of fighting drug trafficking.

    • Read more
  • Security Scheme Could Protect Sensitive Data During Cloud Computation

    MIT researchers crafted a new approach that could allow anyone to run operations on encrypted data without decrypting it first.

    • Read more
  • South Korea Has Acted Decisively on DeepSeek. Other Countries Must Stop Hesitating

    South Korea has suspended new downloads of DeepSeek, and it was right to do so. Chinese tech firms operate under the shadow of state influence, misusing data for surveillance and geopolitical advantage. Any country that values its data and sovereignty must watch this national security threat and take note of South Korea’s response.

    • Read more
  • The Rise and Fall of Terrorgram: Inside a Global Online Hate Network

    White supremacists from around the world used Telegram to spread hateful content promoting murder and destruction in a community they called Terrorgram. ProPublica and FRONTLINE identified 35 crimes linked to Terrorgram, including bomb plots, stabbings, and shootings. After several arrests of alleged Terrorgram members and reforms by Telegram, experts expect that extremists will find a new platform for their hate.

    • Read more
  • How a Global Online Network of White Supremacists Groomed a Teen to Kill

    Neo-Nazi influencers on the social media platform Telegram created a network of chats and channels where they stoked racist, antisemitic and homophobic hate. The influencers, known as the Terrorgram Collective, targeted a teen in Slovakia and groomed him for three years to kill.

    • Read more
  • Trump Is Giving Russian Cyber Ops a Free Pass – and Putting Western Democracy on the Line

    Secretary of Defense Pete Hegseth last weekend announced that the U.S. will halt all offensive cyber operations –and planning for such operations –against Russia. The Kremlin has long sought to sow chaos in the United States and other democracies by using “information confrontation.” That job just got a lot easier.

    • Read more
  • In Case We Forgot, Typhoon Attacks Remind Us of China’s Cyber Capability—and Intent

    The Salt Typhoon incident reminds us that China has the intent, and increasingly the capability, to seriously challenge US and Western technology advantage.

    • Read more
  • DOGE Threat: How Government Data Would Give an AI Company Extraordinary Power

    The Department of Government Efficiency, or DOGE, has secured unprecedented access to at least seven sensitive federal databases. Since information is power, concentrating unprecedented data in the hands of a private entity with an explicit political agenda represents a profound challenge to the republic. I believe that the question is whether the American people can stand up to the potentially democracy-shattering corruption such a concentration would enable. If not, Americans should prepare to become digital subjects rather than human citizens.

    • Read more
  • Cornered by the UK’s Demand for an Encryption Backdoor, Apple Turns Off Its Strongest Security Setting

    In response to the U.K. demands for a backdoor, Apple has stopped offering users in the U.K. Advanced Data Protection, an optional feature in iCloud that turns on end-to-end encryption for files, backups, and more.

    • Read more
  • Election Officials Blast Trump’s “Retreat” from Protecting Voting Against Foreign Threats

    The Trump administration has begun dismantling the nation’s defenses against foreign interference in voting, a sweeping retreat that has alarmed state and local election officials. The administration is shuttering the FBI’s Foreign Influence Task Force and last week cut more than 100 positions at the U.S. Cybersecurity and Infrastructure Security Agency.

    • Read more
  • As Facebook Abandons Fact-Checking, It’s Also Offering Bonuses for Viral Content

    Meta decided to stop working with U.S. fact-checkers at the same time as it’s revamping a program to pay bonuses to creators with high engagement numbers, potentially pouring accelerant on the kind of false posts the company once policed.

    • Read more
  • UA Little Rock Secures $4.65 Million Grant to Advance Cybersecurity Education

    The grant, funded by the National Centers of Academic Excellence in Cybersecurity (NCAE-C) within the National Security Agency, will enable UA Little Rock to enhance its efforts in preparing high school teachers to teach cybersecurity.

    • Read more
  • « first
  • ‹ previous
  • …
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • …
  • next ›
  • last »

More headlines

  • Researchers report increased ransomware and hacktivist activities targeting industrial systems in 2025
  • New Study Claims GPT-5.2 Can Reliably Develop Zero-Day Exploits at Scale
  • Cyber takes back seat to immigration in global threats hearing
  • UL Solutions withdraws as lead admin for FCC cyber label program amid probe into China ties
  • Iran may go after US defense firms with cyber attacks, warn Pentagon, Homeland Security
  • Primary Mitigations to Reduce Cyber Threats to Operational Technology
  • Another cybersecurity False Claims Act settlement
  • Cyber congressman demands answers before CISA gets cut down to size
  • US to sign Pall Mall pact aimed at countering spyware abuses
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Political Violence Offers Extremist “Trigger Events” for Recruiting Supporters

    Extremists are exploiting political violence by using online platforms to recruit new people to their causes and amplify the use of violence for political goals. High-profile incidents of political violence are useful trigger events for justifying extremist ideologies and calls for retaliation.

    • Read more
  • Fake survey Answers from AI Could Quietly Sway Election Predictions

    Public opinion polls and other surveys rely on data to understand human behavior. New research reveals that artificial intelligence can now corrupt public opinion surveys at scale—passing every quality check, mimicking real humans, and manipulating results without leaving a trace.

    • Read more
  • Building Trust into Tech: A Framework for Sovereign Resilience

    Governments are facing a critical question: who can be trusted to build and manage their countries’ most sensitive systems? Vendor choices, for everything from cloud infrastructure to identity platforms, are no longer just commercial; they are strategic.

    • Read more
  • Researchers Unveil First-Ever Defense Against Cryptanalytic Attacks on AI

    Security researchers have developed the first functional defense mechanism capable of protecting against “cryptanalytic” attacks used to “steal” the model parameters that define how an AI system works.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies