Two companies have joined forces to create the world's first instantaneous gunshot detection and facial recognition system, according to an article from Security CCTV News.
A mutli-agency exercise was staged on Wednesday, March 7, 2012, to simulate a cybersecurity attack on the New York City electric supply during a summer heat wave.
Counter terrorism today is an increasingly complex matter. No longer do counter-terror and homeland security efforts just consist of securing our homeland’s borders. We are faced with mounting threats of cyberterrorism and attacks on critical national infrastructure; challenges in protecting our nation and its citizens in times of disaster; along with emerging extremists and threats from radicalization.
The US National Institute of Standards and Technology (NIST) announced plans to break ground on a new center that will be committed to cybersecurity research.
Security researchers said they found a vulnerability in the Google Inc mobile payments platform which is currently available in phones sold by Sprint Nextel Corp.
More than half of Federal employees use at least one mobile device at work, a CDW-G survey found, and many are using personal devices to accomplish work-related tasks.
The UK and the US have better defenses against cyberattacks than China, partly because they have better internal data-sharing practices, according to a McAfee report.
IN.gov, the official website of the state of Indiana, and Indiana Attorney General Greg Zoeller launched an Identity theft Prevention Toolkit in an effort to aid Hoosiers in protecting themselves against identity theft through education, detection practices, and corrective procedures.
Mobile technology security threats, social media, "hactivism" and more will be at an all-time high in 2012, according to an annual security forecast by the Cyber Security and Information Assurance Division of Kroll Inc.