Mark Rockwell Top Priority Sector: cyber_security Five companies working to develop trusted electronic identity technologies to combat identity theft, protect online transactions and secure information sharing were given $10 million in grants under NIST’s National Strategy for Trusted Identities in Cyberspace (NSTIC) program. Homepage position: 10 read more View full…
Visa waivers, processing and trusted traveler programs working to attract tourism
Mark Rockwell Top Priority Sector: border_security Significant progress is being made to streamline key travel documentation and security procedures to attract foreign visitors to the U.S., said the White House in an initial report on the effectiveness of a six-month-old presidential tourism directive. Homepage position: 10 read more View full…
Visa waivers, processing, trusted traveler programs working to attract tourism
Mark Rockwell Top Priority Sector: border_security Significant progress is being made to streamline key travel documentation and security procedures to attract foreign visitors to the U.S., said the White House in an initial report on the effectiveness of a six-month-old presidential tourism directive. Homepage position: 10 read more View full…
‘Sequestration’ cuts would hit a wide variety of DHS programs and offices
Jacob Goodwin Top Priority Sector: federal_agencies_legislative The automatic spending cuts that are due to begin in January if Democrats and Republicans fail to reach agreement on massive deficit reductions – a process that is being called “sequestration” – would cut about $580 million from FEMA’s disaster relief program, another $183…
U.S. funds approved for nuclear security programs in Ukraine, Russia
Mark Rockwell Top Priority Sector: cbrne_detection Almost $3 million has been approved by U.S. nuclear security agencies to fuel collaborative nuclear security and development projects in the Ukraine and Russian Federation, said National Nuclear Security Administration (NNSA) on July 26. The projects, financed by NNSA’s Global Initiatives for Proliferation Prevention…
Congress Eyes Crackdown Over Leaks About Secret Programs
Beginning with comments from Sen. John McCain Tuesday citing accounts of what appear to be high-level government leaks, Congress is engaged in an investigation about war tactics. Jeffrey Brown discusses the varied secret programs, from cyber attacks to drone strikes, […] ↓ Read the rest of this entry… View full…
Twitter spammers infect users with fake antivirus programs
A large spam campaign observed on Twitter during the last couple of days directed users to malicious websites that exploited vulnerabilities in browser plug-ins to infect their computers with rogue antivirus programs, according to security researchers from antivirus firm Kaspersky Lab. While monitoring the spam campaign for several hours, Kaspersky’s…
Secunia brings own spin to vulnerability rewards programs
Another day, another vulnerability reporting reward program. Kinda. Secunia, a vulnerability management vendor from Denmark, is the latest to join the bounty brigade, but it is bringing its spin to the market. Secunia’s new Secunia Vulnerability Coordination Reward Program is another platform for researchers to report software security flaws, but Secunia…
German police trojan can snoop on other programs
A “lawful” malware recently discovered by a Germany-based hacker club which could supposedly snoop on Skype calls has been found to be capable of doing much more, a computer security firm said. Trend Micro said it has also set its software to detect the malware as BKDR_R2D2.A or R2D2, based…
Pentagon: Budget cuts likely to exclude military cyber programs, counterterrorism forces
Even as wars in Iraq and Afghanistan wind down, high demand for U.S. forces trained to counter terrorist threats is likely to continue. View full post on cyber wars – Yahoo! News Search Results View full post on National Cyber Security