Widgetized Section

Go to Admin » Appearance » Widgets » and move Gabfire Widget: Social into that MastheadOverlay zone

Home » Archives by category » SECURITY INFORMATICS » Terrorism Informatics

Desmentido a difamación de Rebelion.org, Victor Bjorgan no fue apartado de Canal 5.

Es totalmente falso que en aquella ocasión (25 de Marzo, 1994) Bjorgan sostuvo: “Fasano se metió con la política”, ni que existiera intención de censurar al Dr. Federico Fasano.  Además,…

U.S. Senate passed Cybersecurity Information Sharing Act – CISA bill.

U.S. Senate passed Cybersecurity Information Sharing Act – CISA bill.

Senate votes in favor of bill critics including Edward Snowden say will allow the government to collect sensitive personal data unchecked. Robyn Greene of the New America Foundation characterized the…

Report shows Daesh formed online “help desks” to teach terrorists about secure comms.

Report shows Daesh formed online “help desks” to teach terrorists about secure comms.

Jihadists, including members and supporters of the Islamic State of Iraq and the Levant, have formed online ‘help desks’ to teach their comrades safe practice, and develop their own secure…

How to control Terrorism Recruitment.

How to control Terrorism Recruitment.

According to WashingtonOutsider.org , the ongoing recruitment of Americans and other foreigners into the Islamic State terrorist group demands a greater effort to understand the reasons individuals may be drawn…

New statistical model predict violence and potential areas of conflict in Liberia.

New statistical model predict violence and potential areas of conflict in Liberia.

Computers have long been used to identify potential areas of conflict, but a new model being used in Liberia means that violence can now be predicted on a grassroots level.…

Fortifying cyber defences of commercially available cars.

Fortifying cyber defences of commercially available cars.

Chris Valasek revealed last year that he hacked into and controlled a 2010 Toyota Prius and 2010 Ford Escape by plugging into a port used by mechanics. Meticulously overwhelming its…

Washington DC: hub for cyber security technology companies.

Washington DC: hub for cyber security technology companies.

Many U.S. companies  wants to buy  software that fortifies their networks and fends off hackers from cyber-attacks like those that afflicted  big-name businesses, including Target, JPMorgan Chase, Home Depot, Citigroup and…

Hackers can attack Satcom´s and planes.

Hackers can attack Satcom´s and planes.

Speaking at the Black Hat cyber security conference in Las Vegas, analyst Ruben Santamarta of IOActive presented a much anticipated paper showing that SATCOM´s and communications devices from Harris, Hughes, Cobham,…

Attn developers, DHS launched SWAMP to test security in software.

Attn developers, DHS launched SWAMP to test security in software.

A new online environment to help developers and researchers test their software for security weaknesses and vulnerabilities – and improve them – is open for business, the U.S. Homeland Security…

World Cup Brazil 2014: what to do to avoid hackers.

World Cup Brazil 2014: what to do to avoid hackers.

When the 2014 World Cup kicks of in Brazil this week, the event is expected to draw hundreds of thousands of diehard soccer fans from around the world. Since those fans are…

Page 1 of 41234