breaking news:

Cybersecurity

Add to Favorites | Subscribe | Share

Filters:

  • (Press "esc" to clear)

Business

Channels:

Keywords:

DHS S&T, DARPA Co-Leading Development of Higher-Level Mobile Device Authentication Methods

CSD_Mobile_Auth_Snapshot_2016_Facebook.png

DARPA DHS S&T Cyber Security Division are collaborating actively to make enterprise-grade mobile security solutions commercially available to government agencies with high assurance needs as well as the broader community.

Science

Channels:

Keywords:

Can We Protect Against Computers Being Fingerprinted?

Researchers at the University of Adelaide are working to find new methods of protecting against the "fingerprinting" of personal computers – and are now giving members of the community the chance to see firsthand their own computer browserprint.

Science

Business

Channels:

Keywords:

DHS Seeks Input to Study Safeguards to Mobile Devices; Industry Day Events to Follow

DHS S&T seeks input from the mobile and cellular industry to study defense capability gaps and additional safeguards for government devices & will hold two Industry Day events.

Business

Channels:

Keywords:

Cyber Security Division’s TTP Program Hosts Tech Showcase Series

ttp_puzzle_facebook.png

The demo events—hosted by the DHS S&T Cyber Security Division—showcased technologies developed by DoE national laboratories, DoD-affiliated labs, and National Science Foundation-funded university projects.

Science

Channels:

Keywords:

UAB’s Walker Awarded MITRE Seed Grant to Study Cybersecurity

JefferyWalker12-scr.jpg

Walker will help identify which types of businesses embrace or overlook the importance of cybersecurity, and help capture best practices to increase the adoption of cybersecurity technologies.

Science

Channels:

Keywords:

Extortion Extinction

Ransomware – what hackers use to encrypt your computer files and demand money in exchange for freeing those contents – is an exploding global problem with few solutions, but a team of University of Florida researchers says it has developed a way to stop it dead in its tracks.

Science

Channels:

Keywords:

Your Smartwatch Is Giving Away Your ATM PIN

Wearable devices can give away your passwords, according to new research. In the paper “Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN” scientists from Binghamton University and the Stevens Institute of Technology combined data from embedded sensors in wearable technologies, such as smartwatches and fitness trackers, along with a computer algorithm to crack private PINs and passwords with 80-percent accuracy on the first try and more than 90-percent accuracy after three tries.

Science

Channels:

Keywords:

UTEP Designated National Center of Academic Excellence (CAE) by NSA

328.jpg

The University of Texas at El Paso recently earned recognition as a National Center of Academic Excellence (CAE) in Cyber Operations. The designation from the National Security Agency is for academic years 2016–21.

Science

Channels:

Keywords:

Johns Hopkins Team Makes Hobby Drones Crash to Expose Design Flaws

New research raises concerns about how easily hackers could take control of flying drones and land or, more drastically, crash them.

Business

Channels:

Keywords:

DHS to Hold Mobile App Security Research and Development Industry Day

DHS S&T will hold an Industry Day to present information and answer questions regarding Broad Agency Announcement BAA call HSHQDC-16-R-B0006, which solicits proposals for mobile application security research and development.

Science

Channels:

Reduce Cyberslacking and Increase Physical Activity with a Tap, a Click or a Kick

An innovative wearable technology for standing desks that creates a new way of interacting with your computer could reduce cyberslacking and increase healthy movement.

Science

Life

Social and Behavioral Sciences

Channels:

De-Coding the Character of a Hacker

116684_web.jpg

Malicious hacking online costs the private and corporate sectors up to $575 billion annually, according to internet security firm McAfee. While security agencies seek out "ethical" hackers to help combat such attacks, little is known about the personality traits that lead people to pursue and excel at hacking. A recent study published on Frontiers in Human Neuroscience now shows that a characteristic called systemizing provides insight into what makes and motivates a hacker.

Life

Law and Public Policy

Channels:

Keywords:

Changing Technology Prompts NATO’s Shift on Cyber Warfare

Science

Channels:

Keywords:

SEISE Tool Uses Semantic Gaps to Detect Website Promotional Attacks

promo-infection_3289.jpg

By detecting semantic inconsistencies in content, researchers have developed a new technique for identifying promotional infections of websites operated by government and educational organizations.

Life

Education

Channels:

Keywords:

NYIT Designated as National Center of Academic Excellence in Cyber Defense Education

Box_20160512_CybersecurityNews_Hero.jpg

The National Security Agency and the Department of Homeland Security have designated New York Institute of Technology as a National Center of Academic Excellence in Cyber Defense Education through academic year 2021. NYIT is the first university on Long Island to receive this designation.

Science

Channels:

Keywords:

Not So Safe: Security Software Can Put Computers at Risk

New research from Concordia University in Montreal shows security software might actually make online computing less safe.

Life

Social and Behavioral Sciences

Channels:

Keywords:

Army Grant Funds Research Into Extremist Flash Mobs

A University of Arkansas at Little Rock researcher is expanding his investigation of extremist cyber flash mobs — particularly those that lead to violent or damaging behavior.

Science

Business

Channels:

Phoney Protection for Passwords

Corporate data breaches seem to be on the rise, rarely a week passes without a company revealing that its database has been hacked and regrettably usernames, passwords, credit card details and its customers' personal information has been leaked on to the open internet. A new protection, nicknamed Phoney, is reported in the International Journal of Embedded Systems.

Medicine

Channels:

Keywords:

The Cost of Technology: Electronic Healthcare Records Frequently Targeted by Hackers

Ransoming of health care records not uncommon.

Science

Channels:

Researchers Receive Grant to Improve Security of Online Social Networks

XintaoWu.jpg

University of Arkansas computer science and engineering professor Xintao Wu has received $348,758 from the National Science Foundation to conduct research on detecting fraud and cyberattacks against online social networks.