Category: computer security

What you get when you recycle

Another apparent breach of classified material is under federal investigation at the nation’s premier nuclear weapons laboratory: Los Alamos National Laboratory, sources tell CBS News correspondent Sharyl Attkisson. The breach apparently was discovered when Los Alamos police recently conducted a…

FID: Fear, Incompetence & Doubt

Dr. Stephen Haag spends upwards of 80 hours each week on his computer, mapping out terrorist attacks. Haag, an expert in emerging technologies, believes the next attack on the U.S. will come not in the form of bombings or military…

Who is Really Sharing Intel

Criminals covet your identity data like never before. What’s more, they’ve perfected more ways to access your bank accounts, grab your Social Security number and manipulate your identity than you can imagine. Want proof? Just visit any of a dozen…

Defeating Internet Terrorists

The Internet has become the “seductive hypermedia” for radical Islamic terrorists, with official and unofficial Web sites, forums and chatrooms that appeal to supporters worldwide. Most Web sites are intended to advance a group’s propaganda to increase their supporting audience,…