Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Cybersecurity

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Computer Scientists Discover Vulnerabilities in a Popular Security Protocol

    A widely used security protocol that dates back to the days of dial-up Internet has vulnerabilities that could expose large numbers of networked devices to an attack and allow an attacker to gain control of traffic on an organization’s network.

    • Read more
  • Conspiracy, Fake News, Crime: Why Is Telegram Controversial?

    Telegram has been used by all sides in Russia, both pro-and anti-government groups. The arrest of CEO Pavel Durov in Paris has left Russia’s opposition worried. But the messaging app is well known for its drawbacks.

    • Read more
  • As Tools for Hybrid Threats, Apps Like Telegram Must Be Accountable

    Once celebrated as the ultimate tool for free communication thanks to its encryption and lax moderation practices, Telegram now stands accused by French authorities of facilitating criminal activities and possibly being exploited for hybrid threats, particularly by Russian state actors. Hybrid threats blend military force with non-military tactics including cyberattacks and disinformation.

    • Read more
  • How Smart Toys May e Spying on Kids: What Parents Need to Know

    Toniebox, Tiptoi, and Tamagotchi are smart toys, offering interactive play through software and internet access. However, many of these toys raise privacy concerns, and some even collect extensive behavioral data about children.

    • Read more
  • Vulnerabilities in a Popular Security Protocol

    A widely used security protocol that dates back to the days of dial-up Internet has vulnerabilities that could expose large numbers of networked devices to an attack and allow an attacker to gain control of traffic on an organization’s network.

    • Read more
  • The Hacking of the Trump Campaign Is 2016 All Over Again

    Hackers affiliated with the intelligence service of a foreign county hack the campaign of a candidate for the U.S. presidency, scoop damaging material, and disseminate it to reporters. This describes both the 2016 hacking of the Clinton campaign by Russian hackers, and the 2024 hacking of the Trump campaign by Iranian hackers. But there are differences: In 2016, “The press seized on the hacked emails,” Quinta Jurecic writes, “and the Trump campaign capitalized exuberantly on Russia’s involvement in the election.” Trump called on Russia to do even more. Now, the press has behaved more responsibly, and “Kamala Harris has not yet weighed in on the campaign trail with any winking suggestions that Iran might want to continue rummaging around in the Trump campaign’s systems.”

    • Read more
  • Foreign Actors Could Sow 'Chaos' in the 2024 Presidential Election, Cybersecurity Expert Says

    In a tightly contested election, a “hack and leak” campaigns can be hugely “consequential” at the margins, says an expert.

    • Read more
  • AI Disinformation: Lessons from the U.K. Election

    The record-breaking 2024 figure of about 4 billion voters eligible to go to the polls across more than 60 countries coincided with the full-fledged arrival and widespread uptake of multimodal generative artificial intelligence (AI), which enables almost anyone to make fake images, videos and sound.

    • Read more
  • What Is the Online Safety Act and Why Have Riots in the U.K. Reopened Debates About It?

    Social media played a key role in the widespread coordination of riots in locations across the country. Online platforms have also served as a vehicle through which misinformation and hateful rhetoric has spread.

    • Read more
  • Protecting Our Elections Against Tech-Enabled Disinformation

    Electoral administrators around the world are dealing with a radically changed democratic landscape. Concerns focus on the pervasive presence of disinformation and false narratives, the rise of new technologies such as generative artificial intelligence, occasional madcap conspiracy theories, threats to electoral workers, and the need to maintain citizens’ confidence in electoral outcomes.

    • Read more
  • Study Highlights Challenges in Detecting Violent Speech Aimed at Asian Communities

    A study of language detection software found that algorithms struggle to differentiate anti-Asian violence-provoking speech from general hate speech. Left unchecked, threats of violence online can go unnoticed and turn into real-world attacks.

    • Read more
  • App Helps Users Transition from Doom-Scrolling to Mindfulness

    Do you find yourself doom-scrolling, or spending more time than you should consuming negative news on the internet and social media and want to stop? New app unites principles from art and technology to encourage mindfulness on-the-go.

    • Read more
  • State Lawmakers Eye Promise, Pitfalls of AI Ahead of November Elections

    This presidential election cycle is the first since generative AI — a form of artificial intelligence that can create new images, audio and video — became widely available. Artificial intelligence proved the ‘topic du jour’ at the largest annual meeting of state lawmakers this week in Kentucky.

    • Read more
  • DOJ Sues TikTok and Parent Company ByteDance for Widespread Violations of Children’s Privacy Laws

    U.S. law prohibits website operators from knowingly collecting, using, or disclosing personal information from children under the age of 13, unless they provide notice to and obtain consent from those children’s parents.

    • Read more
  • Despite Security Concerns, TikTok Still Plays Key Role in 2024 Race

    Despite national security concerns about TikTok – and its ties to China – the popular short-form video app is playing an important role on the campaign trail for both former President Donald Trump and Vice President Kamala Harris. The reason, experts say, is because the platform remains a crucial tool for candidates to reach young voters.

    • Read more
  • « first
  • ‹ previous
  • …
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • …
  • next ›
  • last »

More headlines

  • Primary Mitigations to Reduce Cyber Threats to Operational Technology
  • Another cybersecurity False Claims Act settlement
  • Cyber congressman demands answers before CISA gets cut down to size
  • US to sign Pall Mall pact aimed at countering spyware abuses
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Time to Invest in Cybersecurity for U.S. Sealift Forces, Report Says
  • President Trump Extends National Emergency With Respect to Significant Cyber Threats for Another Year
  • Senators Press DHS for Details on GPS Jamming Protections
  • Recently-patched Firefox bug exploited against Tor browser users
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models

    In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.

    • Read more
  • Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report

    There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies