• Pipe inspecting robot

    Robot able to climb vertically in gas, water, and oil pipes, detecting leaks and monitoring conditions as it moves along

  • TSA launches news airport airside and perimeter security

    Billions of dollars have been invested in — and strict regulations promulgated for — passenger and baggage screening to prevent explosives from being taken on board; very little money has been invested in and no specific mandates imposed regarding airport perimeter security; TSA is changing this — and also takes the next essential step: coordination among the different money bodies involved in airport perimeter security

  • New Trojan targets Australian business bankers

    A systematic phishing campaign has been targeting Aussie financial institutions; a Trojan masked as a bank’s security update proceeds to launch a multi-staged attack, looking for not just usernames and passwords, but chat room credentials, secure downloads, and anything the attackers believe may be useful

  • Lower Mississippi River region braces for major flood

    Floodwaters are projected to crest at St. Louis at 38 feet on 22 or 23 June, marking the eleventh time since the Civil War that St. Louis has reached that flood stage; during the flood of 1993 waters at St. Louis crested at 49.6 feet

  • Assessing landslide risk

    Researchers develop new technique for assessing areas most at risk from landslides

  • Royal Mint issues urgent call for disaster recovery system

    Tender comes after critical review warns about inadequate contingency plans

  • Experts: Surprise quake shows Japan's vulnerability

    Saturday’s 7.2 magnitude quake was the most powerful to strike inland Japan in eight years; experts say the Big One may hit anywhere in the country, in a repeat of the 1923 Great Kanto Earthquake which left 142,807 people dead

  • Security hole exposes utilities to Internet attack

    Supervisory control and data acquisition (SCADA) systems remotely manage computers that control machinery, including water supply valves, industrial baking equipment, and security systems at nuclear power plants; security vulnerability is discovered in SCADA — and patched, but other vulnerabilities may remain

  • Cyber mishap causes nuclear power plant shutdown

    Worries about critical infrastructure vulnerabilities: The move to SCADA systems boosts efficiency at utilities because it allows workers to operate equipment remotely, but experts say it also exposes these once-closed systems to cyber attacks

  • Top ten rules for IT security

    Uniloc offers ten useful rules to keep the organization’s networks safe from intruders and hackers;

  • Flood protection call for utilities

    Twelve months after the devastating U.K. floods a government agency says much more must be done to tackle the vulnerability of buildings such as power stations and hospitals to flooding

  • Increasing attacks on oil infrastructure in Nigeria

    Rebels in the Nigerian Delta are increasing their attacks on the country’s oil infrastructure — and lately have been targeting sea-based targets auch as tankers and oil rigs

  • Killing Internet worms dead

    Internet worms flood the Internet with junk traffic, and at their most benign, they overload computer networks and shut them down; Buckeyes researchers find new way to combat worms

  • Green protection against terrorist attacks

    Here is a solution which combines responses to two great concerns of the time: terrorism and the environment; Georgia company offers an environmentally friendly anti-terrorist vehicle barrier

  • Glaring gaps in network security, II

    Specialists in penetration testing take six hours to hack the FBI; hacking the networks of Fortune 500 companies takes much less time; even companies which have been Sarbanes-Oxley compliant for several years have been hacked within twenty minutes, with the hackers taking control of the business; these hackers proved they could actively change general ledgers and do other critical tasks