Homeland Security


The 25 most dangerous programming errors

The Common Weakness Enumeration project, co-sponsored by DHS, identifies the most common coding mistakes in a list of more than 800 weaknesses.

Texas tries again to criminalize some TSA pat-downs

The Lone Star state is close to putting restrictions on how and when TSA agents can conduct pat-downs when travelers can't or won't pass through security scanners.

LulzSec exposes Arizona law enforcement documents

The hacker group releases hundreds of e-mails, intell bulletins, images and other files in what it says is a protest of the state's immigration laws.

Spoiler alert: Spy techniques dissect GOP presidential nominees

The facial analysis technology that helps the CIA and TSA identify threats helps political analysts predict presidential campaigns.

DHS comes to first responders' rescue

Two new devices from the Homeland Security Department's Science and Technology Directorate will help track the movements and vital signs of firefighters responding to a blaze.

How budget cuts could rain on your picnic

NOAA needs another satellite in orbit to continue providing accurate long-range forecasts, but Congress has pegged the satellite’s funding for cuts.

4 smart-phone security tips from DHS

The Homeland Security Department has some advice for smart-phone users, and it sounds pretty familiar.

DHS' guide to managing Domain Name System risks

The Homeland Security Department, working with the private IT industry sector, has developed a set of practices to help mitigate the most serious risks to the Domain Name System.

Continuous monitoring has some growing up to do

Tools for monitoring the security status of IT systems are available, but a lack of standardization leaves administrators “drowning in noise,” government officials say.

Government IT security: Running to stand still

Government IT security is improving but still not keeping up with the bad guys, according to a panel of government security officials.

Date set for first national test of alert system

Don’t plan on watching the first few minutes of a TV show or listening to a radio station at 2 p.m. Nov. 9.

Accurate flood mapping is still a work in progress

Agencies are still at work gathering data needed to bring the latest GPS technology to bear in creating more accurate flood maps for the United States.

How to avoid a Stuxnet of your own

As industrial control systems that underlie the nation’s critical infrastructure become standardized and networked, securing them from attack has become a pressing issue. NIST offers a guide to protecting them.

Plan would help agencies control sensitive data

The National Archives and Records Administration is creating a governmentwide policy for handling Controlled Unclassified Information that would replace the current patchwork of ad hoc agency-specific policies.

Get through airport security in five seconds?

A new technology unveiled this week could let trusted travelers pass through a short scanning tunnel without shedding clothes and shoes.