Breaking News Channels

Cybersecurity

Filters:

  • (Press "esc" to clear)

Science

Channels:

Keywords:

Flaw in ‘Secure’ Cloud Storage Could Put Privacy at Risk

CloudProviderAttackScenario48.jpg

Johns Hopkins computer scientists have found a flaw in the way that secure cloud storage companies protect their customers’ data.

View | Comment

Science

Channels:

Keywords:

UT Dallas Cybersecurity Researchers Roll Out a New Heartbleed Solution

As companies scrambled in recent days to address the latest cybersecurity bug known as Heartbleed, researchers at The University of Texas at Dallas had a solution that fixes the vulnerability, and also detects and entraps hackers who might be using it to steal sensitive data

View | Comment

Life

Law and Public Policy

Channels:

Keywords:

Report NSA Knew of Heartbleed Bug Highlights Credibility Issues

Cate.jpg

View

Life

Social and Behavioral Sciences

Channels:

Keywords:

MSU Information Systems Expert Advises on Creating Strong Passwords in Response to 'Heartbleed'

Warkentin_Merrill_M3B0459--8x10.jpg

View

Life

Social and Behavioral Sciences

Channels:

Keywords:

MSU Information Systems Expert Advises on Creating Strong Passwords

Warkentin_Merrill_M3B0459--8x10_1.jpg

The recently-discovered “Heartbleed” bug affecting as much as two-thirds of the Internet is causing people to hurriedly change passwords and further secure online personal information. Merrill Warkentin of Mississippi State University said Friday [April 11] that choosing strong passwords is among the best proactive steps for minimizing vulnerability to identity theft.

View | Comment

Science

Channels:

Keywords:

With Heartbleed, Time Is Not on Your Side

Guy_Hembroff.jpg

View

Life

Law and Public Policy

Channels:

Keywords:

Security Expert: Heartbleed Bug Puts Computer Users at Risk

StevenMyers.jpg

View

Science

Channels:

Keywords:

Personal Touch Signature Makes Mobile Devices More Secure

latentgesture_study_tablet.jpeg

Georgia Tech researchers have developed a new security system that continuously monitors how a user taps and swipes a mobile device. If the movements don’t match the owner’s tendencies, the system recognizes the differences and can be programmed to lock the device.

View | Comment

Science

Business

Channels:

Keywords:

NYIT Hosts First Global Cybersecurity Conference in Abu Dhabi

NA-HESN-EG-AD-Cyber_1.jpg

NYIT held its first Global Cybersecurity Conference in Abu Dhabi today, which was inaugurated the U.A.E. Minister of Culture, Youth and Community Development. NYIT’s conference welcomed cyber defense professionals, information technologists, banking and finance executives, and others across these fields from the U.S., China, the United Arab Emirates and beyond. NYIT has a history of hosting cybersecurity events at its New York City campus. Today’s event was its first cybersecurity conference with a truly worldwide reach.

View

Science

Channels:

Keywords:

Iowa State Engineers Build Software Tools to Assure Security of Smartphones

KothariGroup1000.jpg

Iowa State's Suraj Kothari is leading researchers from Iowa State University and Ames, Iowa-based EnSoft Corp. who are developing ways to secure smartphone software for the Defense Department.

View | Comment