Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Infrastructure

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • "Digital DNA" to fight cyber crime

    Scottish researchers develop what they call “digital DNA”: It is based on analyzing the way in which users access data on their computers and then creating a digital fingerprint that is unique to each user

    • Read more
  • Good code, bad computations: A computer security vulnerability

    Beware of return-oriented programming — that is, if you want to make sure your computer or server is not tricked into undertaking malicious or undesirable behavior

    • Read more
  • Cyberattacks target U.K. national infrastructure

    The computer systems of critical businesses in the United Kingdom, such as power companies and large financial institutions, are being repeatedly probed to steal information or uncover weaknesses that could take them down

    • Read more
  • Earthquake's trampoline effect

    During earthquakes the ground not only shakes from side to side, but also bounces up and down; this has important implications for designing quake-proof structures

    • Read more
  • Briefly noted

    Australia opens national tsunami warning center… Document requirements announced for visitors to international peace garden… European data breach laws could land in 2011… Aberdeen: Unified threat management can shave IT costs

    • Read more
  • Using laptops to detect earthquakes

    Laptops have a small accelerometer chip built into them in order to protect the delicate moving parts of the hard disk from sudden jolts; same chip is a pretty good earthquake sensor, too

    • Read more
  • Briefly noted

    Global CCTV market analysis 2008-12… U.S. intelligence agencies spend $47.5 billion in 2008… Changing role for DHS in cyber security… Auditors: Private security in Iraq cost over $6 billion… China begins investigation of tainted eggs

    • Read more
  • U.K. project examines the idea of a nuclear-powered passenger aircraft

    As worries about the rising price of oil and climate change grow, so grows the interest in nuclear power — but not only for ground-based power generation; a U.K. government-funded project examines the idea of nuclear-powered passenger plane

    • Read more
  • Eight times more malicious e-mail attachments spammed out in Q3 2008

    Sophos reports identity thieves and hackers striking Windows users on all fronts; Russia becomes a more important player in the Dirty Dozen league of spam-relaying nations

    • Read more
  • Canadian universities study the two sides of the Internet

    Terrorists and hackers use the Internet to spread their nefarious programs; some governments use the Internet to spy on their citizens; Dalhousie is working on a way to spot criminal behavior, while U Toronto keeps censors at bay halfway around the globe

    • Read more
  • Energy companies targeted by Web-borne malware

    New report says the energy companies experienced more Web-based malware attacks than any other vertical market in the third quarter of this year, with an increased rate of exposure of 189 percent

    • Read more
  • New reactor design lessens risk of weapon proliferation

    Nuclear materials for power reactors cannot be stolen by those interested in using it for nuclear weapons while the material is in the reactor — it is too hot to handle; the risks of diversion are during the enrichment process, and while the material is being transported; to lessen the risk, researchers offer innovative reactor design

    • Read more
  • Businesses to increase IT security budgets

    Ernst & Young finds that at least 50 percent of companies are set to increase their IT budgets, the current financial difficulties notwithstanding

    • Read more
  • Closed Maine suspension bridge used for anti-terror testing

    DHS is using a closed Maine bridge for tests on how to fortify bridges against terrorist attacks

    • Read more
  • Report: Private sector can better prepare for cyber attack risks

    New expert panel report suggests shifting control of corporate cyber infrastructures from IT departments to chief financial officers

    • Read more
  • « first
  • ‹ previous
  • …
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • …
  • next ›
  • last »

More headlines

  • Cyber congressman demands answers before CISA gets cut down to size
  • AI's thirst for power keeps coal fires burning bright
  • CISA advisory committee approves four draft reports on critical infrastructure resilience
  • Hurricane Helene brought devastation — and an opportunity — to Appalachia’s power grids
  • Researchers propose hydrogen storage using existing infrastructure in lakes and reservoirs
  • DHS warns of escalating threats to US critical infrastructure in 2025 Homeland Threat Assessment
  • US wastewater tests show bird flu virus limited to areas with farm animals
  • Potential China Threats to U.S. Port Infrastructure Security: House Homeland Security Committee
  • China has a ‘near monopoly’ on many critical minerals. JPMorgan says it could be the next battleground with the U.S.
  • Is the nation’s water supply safe from attack?
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Nuclear Has Changed. Will the U.S. Change with It?

    Fueled by artificial intelligence, cloud service providers, and ambitious new climate regulations, U.S. demand for carbon-free electricity is on the rise. In response, analysts and lawmakers are taking a fresh look at a controversial energy source: nuclear power.

    • Read more
  • Water Is the Other U.S.-Mexico Border Crisis, and the Supply Crunch Is Getting Worse

    The United States and Mexico are aware of the political and economic importance of the border region. But if water scarcity worsens, it could supplant other border priorities. The two countries should recognize that conditions are deteriorating and update the existing cross-border governance regime so that it reflects today’s new water realities.

    • Read more
  • Exploring the New Nuclear Energy Landscape

    In the last few years, the U.S. has seen a resurgence of interest in nuclear energy and its potential for helping meet the nation’s growing demands for clean electricity and energy security. Meanwhile, nuclear energy technologies themselves have advanced, opening up new possibilities for their use.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies