On the front line against the next Stuxnet
Meet the people who will get the call when the next Stuxnet worm strikes.read more
View ArticleInside ICS-CERT's war room
A tour of ICS-CERT facilities at Idaho National Labs. Meet the people who will get the call when the next Stuxnet worm strikes.read more
View ArticleU.S. power grid is a big, soft target for cyberattack, MIT study shows
Mistaken reports that an Illinois water utility was hacked have reduced the angst about Stuxnet-like attacks on U.S. utilities, but the risk is actually worse than ever and increasing in scope every...
View ArticleCould hypocrisy at RIAA, DHS derail draconian rules against free downloads?
YouHaveDownloaded crawls BitTorrent sites, recording IP addresses of those downloading files and the files they're downloading. It turns out, if the record is correct, that two of the most energetic...
View ArticleGAO: DHS floods critical industries with irrelevant cybersecurity advice
When the president ordered DHS to provide cybersecurity guidance to seven industries that make up the critical infrastructure,' it responded, according to a GAO report, with a ton of data and advice...
View ArticleDHS media monitoring could chill public dissent, EPIC warns
The U.S. Department of Homeland Security is engaging in media monitoring activity that achieves no public safety goals and will likely have a chilling effect on legitimate criticism of the agency, a...
View ArticleUse Twitter, get sent to Gitmo?
The FBI wants new ways to mine social media for threats. The DHS is deporting people for tweeting. Remember: What you say on Twitter and Facebook can be used against you. read more
View ArticleExactly what is Homeland Security watching for on Facebook, Twitter, YouTube?
The idea that any number of federal institutions are watching your every move on social networks like Facebook, Twitter is unnerving at best. The Department of Homeland Security is one of those...
View ArticleWhen you tweet, the CIA listens
Documents obtained by privacy advocates reveal that Uncle Sam is monitoring social networks for people critical of the government. Can an enemies list be far behind?read more
View ArticleSecurity of industrial control systems questioned at DHS conference
Operators of America's vital power, water and manufacturing facilities use industrial control systems (ICS) to manage them, and the security of these systems, increasingly linked with Microsoft Windows...
View ArticleU.S.-Israel project with Motorola leads to security-hardened industrial...
The security associated with industrial control systems (ICS) is facing heavy criticism this week at the ICS Joint Working Group 2012 Spring Conference, sponsored by the U.S. Department of Homeland...
View ArticleDHS list of words you should never ever blog or Tweet. Ever.
The Electronic Privacy Information Center used the FOIA to get a copy of DHS' training manual, including the list of words you should never type online unless you want a visit from your future hosts at...
View ArticleBig data, big problems -- and, maybe, a solution
The era of big data is here. But better search tools can make it more useful for organizations and less risky for the rest of us.read more
View ArticleDHS use of deep packet inspection technology in new net security system...
Department of Homeland Security is preparing to deploy a much more powerful version of its EINSTEIN intrusion-detection system that can capture e-mail content and personally identifiable data.read more
View ArticleDHS warns employees that years-old database hole puts their privacy at risk
Vulnerability in software used for Department of Homeland Security background investigations allowed potential unauthorized access since 2009.read more
View Article
More Pages to Explore .....