Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

E-commerce

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • U.K. businesses complacent about safety of intellectual property

    A new survey finds that many companies understand the need to protect IP but fail to do anything about it

    • Read more
  • Five myths about two-factor authentication

    Too many organizations allow themselves to be vulnerable to cybercrime because of prevailing myths about the cost, inconvenience, and efficacy of two-factor authentication; close examination reveals these myths to be just that — myths

    • Read more
  • A first: quantum cryptography used within a commercial network

    European consortium demonstrates transmission of quantum-encrypted data within commercial telecommunications network

    • Read more
  • Age-guessing software has security, commercial applications

    Fighting Illini researchers develop an age-guessing software which can perform tasks such as security control and surveillance monitoring, and may also be used for electronic customer relationship management

    • Read more
  • Colorado to remove Social Security numbers from public Web sites

    Colorado attorney general asks counties to remove documents containing Social Security numbers from public Web sites, saying that the “The availability of this information online increases the possibility of Colorado citizens becoming the victims of identity theft”

    • Read more
  • CaTS, PerSay collaborate on voice recognition

    South African, Israeli companies collaborate on offering voice recognition security solution for e-commerce applications

    • Read more
  • Snafu at biometric show

    A London biometric show offered visitors the chance to view their biometrics data, and see it expressed as as a unique pretty flower diagram; trouble is, a glitch caused the biometric data of dozens of individuals to be e-mailed in a Thank You note to visitors to the show

    • Read more
  • Taiwan nabs major hacking ring

    Criminal ring steals personal data of more than 50 million individuals — including Taiwan’s current and former presidents, and the current Taiwanese chief of police

    • Read more
  • Judge imposes gag order on Boston subway hackers

    Three MIT students hacked smartcards used by the Boston subway system; they were planning to make a presentation about the hacking at this weekend Defcon event in Las Vegas — but a U.S. district judge imposed a gag rule on them

    • Read more
  • Calls for tougher debit card regulation

    On Tuesday the Justice Department announced the indictment of eleven people for stealing and selling more than 40 million credit card and debit card numbers; watchgroups say this is evidence, if one were needed, that federal laws governing debit cards should be tougher — and more uniform

    • Read more
  • Security flaws in online banking sites widespread

    Researchers find widespread security flaws in online banking Web sites; these design flaws are not bugs that can be fixed with a patch; rather, they stem from the flow and the layout of these Web sites

    • Read more
  • Draft security publication looks at cell phones, PDAs

    PDAs are offering more and more features, and more people now use them; NIST publishes a draft guidelines on security considerations for cell phones and PDAs

    • Read more
  • Biometrics for U.K. home bankers

    Digital DNA fingerprinting technology launched to improve IT security and reduce ID theft and fraud for the U.K. banking industry

    • Read more
  • Banks' PIN codes susceptible to hackers' theft

    Network of PIN codes’ thieves nets millions of dollars; hackers are targeting the ATM system’s infrastructure, which is increasingly built on Microsoft’s Windows operating system and allows machines to be remotely diagnosed and repaired over the Internet

    • Read more
  • VCG offers back-office voice biometrics

    New voice activated payments are in the pipeline; voice recognition will be used for both front-end and back-room applications

    • Read more
  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • next ›
  • last »

More headlines

  • Department of Homeland Security seeks to quell confusion over refugee ban
  • Changes may help with N.C. emergency response times
  • FBI Announces Creation of Biometric Database
  • Texas Lawmakers Attempt to Ban TSA Full Body Scanners
  • US Homeland Security postpones Real ID deadline
  • After touching your junk, TSA wants to harvest your DNA
  • Microsoft says phone update failed 1 in 10 users
  • Verizon, Intrado 0ffer next-gen 911
  • US looking at inbound mail security delays
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

No stories

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies