The Department of Homeland Security found a vulnerability in one of its vendor’s software solutions that keeps information on background check investigations.
3D printed guns are going to be tough to control, and the Department of Homeland security knows it.
Guest Post The process of implementing an American national identity card would be an expensive logistical and bureaucratic nightmare.
Only one day after Oracle fixed a highly-publicized hole in Java, a new zero-day attack surfaced on online hacker forums. The zero-day owner says the exploit will be released to the highest bidder.
The Department of Homeland Security says, despite Oracle’s recent Java patch, that you should keep Java disabled to “mitigate other Java vulnerabilities that may be discovered in the future.”
Oracle patches a hole in Java 7 that allowed hackers to hijack computers for botnets. The fix comes after a warning from the Department of Homeland Security.
The U.S. Department of Homeland Security believes you shouldn’t be using Java until an update has been issued to fix a dangerous hole.
The pace of attacks by cyber vigilantes seems to be increasing in 2012. Yesterday news broke that the website of the CIA was down, an attack for which Anonymous claimed responsibility. Today CNN is reporting that attacks also hit government agencies in Mexico and Alabama, and that “information was compromised” at Alabama’s Department of Homeland Security.
Two British tourists were detained and barred from entering the U.S. after the Department of Homeland Security flagged one of them for joking to “destroy America” and to dig up Marilyn Monroe’s grave on Twitter.
Sony said today that is has hired a former official at the Department of Homeland Security to its new post of chief information security officer. The new hire takes place months after a massive hacker attack leaked data on 100 million accounts on Sony’s game networks.
The U.S. Department of Homeland Security on Thursday warned that Chinese-made software used by chemical, defense, and energy firms contains major security holes that hackers could exploit and use to harm critical systems.