Breaking News Channels

Cybersecurity

Filters:

  • (Press "esc" to clear)

Life

Law and Public Policy

Channels:

Keywords:

Georgia Tech Releases 2015 Emerging Cyber Threats Report

In its latest Emerging Cyber Threats Report, Georgia Tech warns about loss of privacy; abuse of trust between users and machines; attacks against the mobile ecosystem; rogue insiders; and the increasing involvement of cyberspace in nation-state conflicts.

View | Comment

Science

Channels:

Keywords:

“Virtual Internet” Tests Software Solutions for Real World Problems

DETERGroupPhoto.png

Developed by the Department of Homeland Security Science and Technology Directorate’s (S&T) Cyber Security Division (CSD), the DETER testbed, described as the “Internet in a box” or a “virtual Internet,” provides a safe and secure option to conduct critical cybersecurity experimentation and testing in the context of complex networks and cyber‐physical systems designed to protect the nation’s critical cyber infrastructure.

View | Comment

Science

Life

Social and Behavioral Sciences

Channels:

Keywords:

Undue Influence: How Can We Be Effectively Warned Not to Give Away Our Information Online?

hacking128.jpg

Two University of Alabama in Huntsville (UAH) professors are figuring out the most effective ways we’re influenced to give away personal information online and what warnings would be most effective to get us to stop.

View | Comment

Science

Channels:

Keywords:

Johns Hopkins to Co-Host Cyber Security Conference for Top Business Executives

Johns Hopkins information security experts have helped organize an upcoming conference to inform top executives about the growing risks of digital break-ins, how to reduce these risks, and how to manage the aftermath of a data breach.

View | Comment

Science

Channels:

Keywords:

U.S. Army Looks to Daphne Yao to Provide a More Secure Cyber Space

YaoDaphne2014.jpg

Virginia Tech computer scientist Daphne Yao’s proposed solutions to prevent insider attacks in the cyber security world will provide a leap forward to stronger Army command and control of cyberspace capabilities on the battlefield as well as in day-to-day operations.

View | Comment

Science

Channels:

Keywords:

Dynamic, Radical Solutions Needed: 2014 NYIT Cybersecurity Conference Highlights

cyber_200_2014.png

Pressing questions fueled lively discussion and much debate during NYIT’s annual cybersecurity conference, at which nearly 250 attendees gathered to gain insights from expert speakers and panelists representing industry, government, and academia.

View | Comment

Science

Channels:

Sandia Cyber-Testing Contributes to DHS Transition to Practice

PozmantierwithDanielSoh.JPG

Through the Department of Homeland Security’s Transition to Practice (TTP) program, cybersecurity technologies developed at Sandia National Laboratories — and at other federal labs — now stand a better chance of finding their way into the real world.

View | Comment

Science

Channels:

Keywords:

WUSTL Helps Found Consortium to Advance Internet of the Future

Washington University in St. Louis has helped to establish a new consortium of U.S. universities and leading technology companies designed to promote development and adoption of Named Data Networking.

View | Comment

Science

Channels:

Keywords:

Can We Ever Truly Master Password Security? Computer Scientist Weighs In

A Georgia State University computer scientist says having to remember dozens of account passwords makes password security tricky -- and some of the faults with password security fall upon the operators of websites.

View | Comment

Life

Law and Public Policy

Channels:

Keywords:

Drexel U. Cybersecurity Experts Available to Discuss Recent Cyberattacks on U.S. Financial Institutions

View | Comment