Border Security System Under FireThe US-VISIT program, a computer system that tries to identify terrorists and criminals from among millions of foreign visitors, has come under fire because its components cannot easily exchange information, according to one critic. The Los Angeles Times reports that the program, U.S. Visitor and Imiigrant Status Indicator Technology (IS-VISIT), which is now deployed at airports and seaports is now to be phased in at major land border crossings late this year. According to the story, the government has spent $700 million on the technology and could spend another $10 billion over the next decade. Rep. Jim Turner (D-Texas) said that an investigation by his staff showed that some databases are not fully compatible and that the system is not an effective anti-terrorism tool.For more details, read the full article in the Los Angeles Times.Citigroup Stores Still Suffering in Aftermath of Terror Alert The stores and restaurants in the Citigroup building have seen a precipitous drop in business since the terror alert issued in early August. According to a report in The New York Times, the atrium of the building has been closed to the public for two weeks, cutting off a major source of business for the merchants. For instance, Eastside Photo would develop 150 rolls of film on a typical Monday. Yesterday, it had 15 orders. According to an executive with Boston Properties, the company that manages the Citigroup Center, said the atrium would be opening in a matter of days. For more details, read the full article in The New York Times. X-Rated Spam Sizzles in SummerThe Register reports that the amount of pornographic spam sent to consumers has risen 350 percent since June. According to data from Clearswift, an e-mail security company, the surge in pornographic spam is akin to an increase last year. Overall, pornographic spam accounts for only about 5 percent of all spam. Financial spam is the leader, making up 39 percent of spam messages. For more details, read the full article in The Register. Related content opinion Preparing for the post-quantum cryptography environment today It’s a mistake to put off the creation of precautions against quantum threats, no matter how far in the future you might think quantum computing will become a reality. By Christopher Burgess Sep 26, 2023 5 mins CSO and CISO Encryption Threat and Vulnerability Management feature What is WorldCoin's proof-of-personhood system? What does the blockchain, AI, and custom hardware system featuring a shiny, eye-scanning orb mean for the future of identity access management? By Matthew Tyson Sep 26, 2023 12 mins Cryptocurrency Cryptocurrency Cryptocurrency news analysis DHS unveils one common platform for reporting cyber incidents Ahead of CISA cyber incident reporting regulations, DHS issued a report on harmonizing 52 cyber incident reporting requirements, presenting a model common reporting platform that could encompass them all. By Cynthia Brumfield Sep 25, 2023 10 mins Regulation Government Incident Response news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Cyberattacks Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe