4:25 am, May 29, 2015

Search Result

Search Tags:  Google

Terrorist Technology

It should come as no surprise to you that terrorists and criminals are adapting to exploit different technologies to achieve its goals. Now we're hearing that international drug trafficking networks are using Google Earth to locate the roadblocks and security forces so as to avoid them. Algerian police say Al Qaida in the land of the Mahgreb actually bragged about in a web posting. Authorities around the world have also noted more reliance on technology such as blue tooth to carry out criminal and terrorist deeds.

Tags: technology , Pentagon , terrorist , Al Qaida

Monday - 08/10/2009, 07:03pm EDT

Google Gets a Do-over

The internet Giant said Wednesday it will reshoot all photos in Japan for its Street View service after residents complained the 360-degree panoramic images provided a view over the fences around their homes. The service has triggered privacy complaints around the world, including most recently in Greece, where y the way it is banned. The photos currently on the Web site were taken by cameras mounted on a stick attached to a car roof. But it has drawn complaints from individuals and institutions that have been photographed, including the Pentagon.

Tags: Pentagon , Japan , privacy

Wednesday - 05/13/2009, 07:15pm EDT

Google cyberhacks used new IE hole

Microsoft has admitted that its Internet Explorer was a weak link in the recent attacks on Google's systems that originated in China; and Conficker still out there.

Tags: Cybersecurity Update , Cybersecurity , Internet Explorer , Adobe , Microsoft , Conficker

Friday - 01/15/2010, 08:49am EST

USGS maps for a new generation

US Topo maps provide technical advantages that support faster, wider public distribution and enable basic, on-screen geographic analysis for all users.

Tags: tech , USGS , National Geospatial Technical Operations Center , Kari Craun , TerraGo , Adobe , partnership , best practices

Monday - 12/14/2009, 09:30am EST

Google's new app is a security risk

Defense contractors battle 'relentless' online assaults

Tags: Cybersecurity Update , Cybersecurity , Defense , DoD , Gartner

Tuesday - 04/06/2010, 08:52am EDT

Bounty offered to cyber-bug hunters

Chrome offers $1,337 to help feed the geek inside.

Tags: Cybersecurity Update , Cybersecurity , Chrome , Chromium , CSIS , Twitter , Kaspersky Lab

Monday - 02/01/2010, 08:34am EST

China denies involvement in Google hackings

China denied involvement in Internet attacks and defended its online restrictions as lawful Monday after the United States urged Beijing to investigate a computer attack against search engine giant Google.

Tags: Cybersecurity Update , Cybersecurity , China , DarkReading , Facebook , CERT , RealAudio

Monday - 01/25/2010, 08:08am EST

Wormy attack could spread via PDF

National Security cyberattack concerns are high, Report: China-based hackers stole India secrets

Tags: Cybersecurity Update , Cybersecurity , security , Yahoo , Twitter , China , dali lama , Adobe , technology

Wednesday - 04/07/2010, 08:30am EDT

Norton ranks riskiest cities for cybercrime

Google ends 4 years of censoring the Web for China, CIOs struggle to balance security, openness

Tags: Cybersecurity Update , norton , cybercrime , Cybersecurity , CIO , CIO survey

Tuesday - 03/23/2010, 08:49am EDT

Army considers hybrid cybercommand

"The Army cyber command would involve a hybrid approach, headed up by a three-star general and comprising elements of Army communications and intelligence communities." FCW

Tags: Cybersecurity Update , Cybersecurity , Army , CyberCommand , Facebook ,

Tuesday - 01/19/2010, 08:33am EST
  • 6