The Security Blog is curated by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.
Salesmen in China are making money from long-known weaknesses in a Wi-Fi encryption standard by selling network key-cracking kits for the average consumer. Wi-Fi USB adapters bundled with a Linux
DoD is already testing unmanned BlackHawk helicopters. But there is more. The Defense Department is reassessing its view of unmanned aerial vehicles – a key component of modern combat operations
Stopping nuclear smuggling is already tough. But it’s about to get a lot harder. Helium-3, a crucial ingredient in neutron-particle-detection technology, is in extremely short supply. A Democratic congressman from
Valiant, a provider of comprehensive workforce management solutions delivered on a hosted Software as a Service (SaaS) platform, drew nearly 75 owners and senior management from large national and regional
A federal bank regulator is concerned about what he or she said are cybercriminals targeting small and midsize businesses. The Federal Deposit Insurance Corporation said such attacks are on the
While law enforcement and government agencies continue to drill for potential domestic violence incidents, there continues to be white powder and bomb threats aimed at government entities. Two arrest in
Special educational events are aiming at sports facilities with organizations ranging from the University of Southern Mississippi’s National Center for Spectator Sports Safety and Security to U.S. Department of Homeland
By Winn SchwartauEugene Kaspersky is incredibly wrong on several of his recent headline-grabbing assertions. So help me, he is. First, as reported on March 19th, 2010 by SC Magazine, he
Emergency responders are finding on-the-job uses for the technology. For example in Durham, North Carolina, officials have started using 3-D technology to observe the locations of residents in trouble, according