• Is California's Big One coming?

    In 1992 and in 2004, remote earthquakes caused changes to the San Andreas fault; in both cases, there were distinct changes in the movement of fluids and an increase in the frequency of micro-earthquakes deep within the fault below Parkfield; what will be the effect on the fault of the recent Sumatra earthquake?

  • Raytheon delivers mobile radiation detection system

    Raytheon delivers advanced SUV-based radiation detection system to Florida’s Department of Transportation

  • DHS to hire 1,000 cyber experts

    The White House told DHS it could be more competitive and choosy as it hires up to 1,000 new cyber experts over the next three years; move is part of U.S. efforts to beef up cyber security

  • Denying denial-of-service attacks

    Denial of Service (DoS) and distributed Denial of Service (DDoS) attacks involve an attempt to make a computer resource unavailable to its intended users; new filtering system could protect networks from such attacks

  • California faces major decision on dams

    California already has upward of 1,000 dams that provide water supply, flood control, and hydropower, but California growing water shortages; last month Governor Arnold Schwarzenegger insisted he would not sign off on any major overhaul of the water system without money for new dams and reservoirs

  • Experts offer insights on current security issues

    Attendees at the ASIS annual event were offered the latest insights into the latest thinking on a range of security issues, from protecting the hospitality industry to protecting house of worship, and much more

  • Earthquake-resistant building structure developed

    The system dissipates energy through the movement of steel frames that are situated around the building’s core or along exterior walls; the frames rock off their foundation under large earthquakes

  • Improving home computer security

    Researchers have developed a specification for security policy on home networks that can guarantee reliability and availability; the specification also takes into account authentication, authorization, security policy deployment so that all users in the home are not only protected from malware but also can help ensure everyone can use the network when they need to

  • Rolls-Royce, EDF to construct four nuclear reactors in U.K.

    The civil nuclear market is worth around £30 billion a year globally and is expected to grow to £50 billion a year in fifteen years’ time, more than 70 percent of which will relate to the build and support of new facilities

  • Malware lingers on for months on infected PCs

    New study says that if computer systems are not disinfected quickly after infection, then infection tends to linger around indefinitely, possibly until the point users exchange compromised boxes for new machines

  • U.S. government takes leap into the Internet cloud

    Vivek Kundra, the White House CIO, said wider adoption of cloud computing solutions would allow federal agencies to “fulfill their missions at lower cost, faster, and ultimately, in a more sustainable manner”

  • How cloud computing can help the U.S. government -- and citizens

    The administration has seen benefits in the way private industry uses cloud computing, and intends to mirror these benefits; ultimately, the idea is to make it simple for agencies to procure the applications they need

  • U.S. Government recommends weighing laptop before and after visit to China

    The U.S. government urges travelers to follow extremely strict policies for visits to China which extend far beyond standard software protection; the policies encourage them to leave their standard IT equipment at home and to buy separate gear only for use in China

  • More efficient nuclear fuel sought

    DoE funds research to address the shortcomings of uranium dioxide — the fuel most commonly used to generate nuclear energy

  • Swayze's death, Williams's outburst, exploited to serve up fake anti-virus

    Cyber criminals exploit the interest of people in breaking news by creating Web sites designed to rip off users searching for more information; surfers visiting these sites are warned of non-existent security problems in a bid to trick them into buying software of little or no utility