Less than six week after the Department of Homeland Security (DHS) issued a civil rights impact assessment stating that the government needed no warrant or cause to search laptops and other electronic devices at U.S. borders, a federal ...
Tags: laptops, electronic devices, smartphones
The need to meet new environmental standards, the growing demand for water and the need to replace obsolete infrastructure are causing U.S. water utilities to embark on thousands of capital improvement projects. These projects are tracked ...
Tags: environmental standards, US, water utilities
President Barack Obama's cybersecurity executive order, signed on Tuesday, could significantly expand the list of companies categorized as part of U.S. critical infrastructure sector, security experts said Wednesday. The executive order ...
Tags: cybersecurity, infrastructure sector, US
President Barack Obama's cybersecurity executive order, announced during his State of the Union address Tuesday night, elicited guarded praise from several quarters even as it revived calls for more comprehensive bipartisan legislation to ...
Mac computers have stopped running programs written using the Java programming language in their browsers, as Apple blocked it because of security problems. Apple has previously blocked, then unblocked, the latest version of Java on the ...
Oracle on Sunday issued an emergency Java update to patch two critical vulnerabilities, including one that had been exploited in ongoing and accelerating attacks. Also yesterday, a researcher noted for uncovering scores of Java bugs ...
Tags: Oracle, emergency Java, Java bugs
Oracle is distributing a patch for Java software flaws deemed so dangerous that the US Department of Homeland Security said that people should stop using it. "Oracle recommends that this Security Alert be applied as soon as possible ...
Tags: Oracle, Java holes, software
A cybersecurity proposal released Wedneday by the influential Business Roundtable supports many of the provisions contained in the controversial Cyber Intelligence Sharing and Protection Act(CISPA)that was passed by the U.S.House of ...
BRUSSELS, Belgium (BRAIN) — The early months of this year could bring resolutions on one or more duty and subsidy related investigations currently under consideration by the European Commission relative to trade between Asia and the ...
Tags: bike, bike industry, bike market, Belgium, bike manufacturing
Groups of companies in the same industry could pool infrastructure resources to help each other mitigate the effects of cyberattacks and work together on security issues, a senior official in the U.S. Department of Homeland Security ...
Tags: DHS, cyberattack, security, cybersecurity
Unistar-Sparco Computers, Inc. Was awarded a Department of Homeland Security FirstSource II Contract. Unistar-Sparco Computers, Inc. is proud to be among the seven businesses within the 8(a) socioeconomic category who were awarded a ...
Tags: Unistar Sparco Computers, Computers, Homeland Security
The U.S. Senate has voted against moving forward on a cybersecurity bill that supporters have called critical for national security. The Senate late Wednesday voted 51-47 to end debate and move toward a final vote on the Cybersecurity Act ...
Groups of companies in the same industry could mitigate the effects of cyberattacks by pooling infrastructure resources and working together on security issues, a senior official in the U.S. Department of Homeland Security has suggested. ...
Tags: DHS Official, IT Resources, Hacks, cyberattacks
Yahoo today said it has fixed the flaw that allowed hackers to steal more than 450,000 passwords from one of its many services. The company also provided more information about whose passwords had been pilfered. "We have...now fixed ...
There has been an unprecedented volume of malicious code and attacks - including many high profile incidents - in the Middle East during 2012. Attacks ranged from those performed by cyber criminals to hacktivists and in some cases ...
Tags: malicious code, malicious attacks, high profile incidents, IT Security