Quantcast
Channel: ITworld dhs
Browsing latest articles
Browse All 15 View Live

On the front line against the next Stuxnet

Meet the people who will get the call when the next Stuxnet worm strikes.read more

View Article



Inside ICS-CERT's war room

A tour of ICS-CERT facilities at Idaho National Labs. Meet the people who will get the call when the next Stuxnet worm strikes.read more

View Article

U.S. power grid is a big, soft target for cyberattack, MIT study shows

Mistaken reports that an Illinois water utility was hacked have reduced the angst about Stuxnet-like attacks on U.S. utilities, but the risk is actually worse than ever and increasing in scope every...

View Article

Could hypocrisy at RIAA, DHS derail draconian rules against free downloads?

YouHaveDownloaded crawls BitTorrent sites, recording IP addresses of those downloading files and the files they're downloading. It turns out, if the record is correct, that two of the most energetic...

View Article

GAO: DHS floods critical industries with irrelevant cybersecurity advice

When the president ordered DHS to provide cybersecurity guidance to seven industries that make up the critical infrastructure,' it responded, according to a GAO report, with a ton of data and advice...

View Article


DHS media monitoring could chill public dissent, EPIC warns

The U.S. Department of Homeland Security is engaging in media monitoring activity that achieves no public safety goals and will likely have a chilling effect on legitimate criticism of the agency, a...

View Article

Use Twitter, get sent to Gitmo?

The FBI wants new ways to mine social media for threats. The DHS is deporting people for tweeting. Remember: What you say on Twitter and Facebook can be used against you. read more

View Article

Exactly what is Homeland Security watching for on Facebook, Twitter, YouTube?

The idea that any number of federal institutions are watching your every move on social networks like Facebook, Twitter is unnerving at best. The Department of Homeland Security is one of those...

View Article


When you tweet, the CIA listens

Documents obtained by privacy advocates reveal that Uncle Sam is monitoring social networks for people critical of the government. Can an enemies list be far behind?read more

View Article


Security of industrial control systems questioned at DHS conference

Operators of America's vital power, water and manufacturing facilities use industrial control systems (ICS) to manage them, and the security of these systems, increasingly linked with Microsoft Windows...

View Article

U.S.-Israel project with Motorola leads to security-hardened industrial...

The security associated with industrial control systems (ICS) is facing heavy criticism this week at the ICS Joint Working Group 2012 Spring Conference, sponsored by the U.S. Department of Homeland...

View Article

DHS list of words you should never ever blog or Tweet. Ever.

The Electronic Privacy Information Center used the FOIA to get a copy of DHS' training manual, including the list of words you should never type online unless you want a visit from your future hosts at...

View Article

Big data, big problems -- and, maybe, a solution

The era of big data is here. But better search tools can make it more useful for organizations and less risky for the rest of us.read more

View Article


DHS use of deep packet inspection technology in new net security system...

Department of Homeland Security is preparing to deploy a much more powerful version of its EINSTEIN intrusion-detection system that can capture e-mail content and personally identifiable data.read more

View Article

DHS warns employees that years-old database hole puts their privacy at risk

Vulnerability in software used for Department of Homeland Security background investigations allowed potential unauthorized access since 2009.read more

View Article

Browsing latest articles
Browse All 15 View Live




Latest Images