More than 17,600 users in U.S. Immigration & Customs Enforcement (ICE) are being moved from their BlackBerry devices to Apple's iPhone, after it was found that technology from Research In Motion cannot meet the mobile technology needs of ...
Tags: U.S., ICE, BlackBerry devices, Apple, iPhone
Computerworld - Congress might need to pass legislation to limit the way government agencies and private companies use facial recognition technology to identify people, a U.S. senator said recently. The growing use of facial recognition ...
Tags: al recognition technology, facial recognition tools, privacy concerns
IDG News Service - The U.S. Federal Communications Commission is advising smartphone users on how to protect their mobile devices and data from mobile security threats. The Commission released an online tool called the "Smartphone ...
Tags: FCC, security advice, smartphone, mobile devices.data
It's urgent for the U.S. Senate to pass a cybersecurity bill now stalled because of opposition from several lawmakers, officials from the U.S. White House said Wednesday. Four White House officials called on the Senate to pass the revised ...
Tags: U.S.Senate, cybersecurity, bill, lawmakers, White House
CSO - It happened more than three and a half years ago. So it presumably would be old news that Chinese hackers broke into soft-drink behemoth Coca-Cola's computer systems and stole confidential files relating to its effort to acquire the ...
Tags: Chinese hackers, Coca Cola, computer system, IT security
Yahoo today said it has fixed the flaw that allowed hackers to steal more than 450,000 passwords from one of its many services. The company also provided more information about whose passwords had been pilfered. "We have...now fixed ...
Microsoft and Hewlett-Packard are using "loopholes and gimmicks" to avoid paying millions of dollars in U.S. taxes, the chairman of a U.S. Senate subcommittee said Thursday. Microsoft is shifting a disproportionate amount of its profits ...
Congress may need to pass legislation that limits the way government agencies and private companies use facial recognition technology to identify people, a U.S. senator said Wednesday. The growing use of facial recognition technology ...
Tags: regulation, U.S.senator, facial recognition, technology
The Department of Homeland Security has chosen to feature Code Dx, software assurance visualization technology developed by the Secure Decisions division of Applied Visions, on its Build Security In website. NORTHPORT, NY, August 05, 2012 ...
Tags: Secure Decisions, Security, Website, NIST SAMATE Website, software
The Secure Decisions Division of Applied Visions has released a new version of its wireless network security visualization tool, MeerCAT Pro Version 4.0. NORTHPORT, NY, August 26, 2012 /24-7PressRelease/ -- MeerCAT, a visualization tool ...
Tags: Secure Decisions, MeerCAT, wireless network, security visualization tool
Computer vulnerabilities and how they can affect Americans' security are on the agenda for the U.S. Senate, and strong rhetoric is being used to support new legislation. The Cybersecurity Act of 2012 is expected to move to the Senate ...
Tags: Rhetoric, Cybersecurity Bill, Washington, Computer Vulnerabilities
LANSING, MI, October 25, 2012 /24-7PressRelease/ -- IDV Solutions today released Visual Command Center 2.0, an upgrade to its risk awareness and response software. Visual Command Center helps corporations, public safety agencies, and other ...
Tags: Risk Awareness, Response Software, IDV Solutions, data stores
Two U.S. agencies have seized 686 websites accused of selling counterfeit and illegal medicines as part of an international crackdown on online sales of fake drugs. U.S. Immigration and Customs Enforcement's (ICE) Homeland Security ...
Tags: U.S.agencies, websites, counterfeit and illegal medicines, online sales
A perplexing risk has emerged for parents, as kids are drawn into chat rooms, online commerce, and submitting private data to join groups of "friends" they have never met, undermining traditional safety precautions of American families. ...
Tags: risk, online commerce, chat rooms, groups of"friends"
You will find the Counter Terrorist magazine at conferences and exercises such as the Homeland Security Professionals Conference, NTOA annual, Urban Shield, Counter Terror Expo, GovSec in addition to numerous military trade shows through ...
Tags: Homeland Security Professionals Conference, Counter Terrorist Magazine