S&T has established active partnerships with cybersecurity organizations in 13 countries—including the United Kingdom, Australia, Canada, Singapore and Israel—and an international body—the European Union.
To increase law enforcement capabilities to identify, collect and analyze evidentiary data from consumer and professional drones, DHS S&T has awarded a $928,541 research-and-development contract to VTO Inc. of Broomfield, Colorado.
DHS S&T has awarded Salt Lake City-based startup Evernym a $749,000 Small Business Innovation Program (SBIR) award to develop an easy-to-use, decentralized mechanism for managing public and private keys needed for the secure and scalable deployment of blockchain technologies.
A University of Arkansas at Little Rock researcher is creating a virtual lab to address issues related to cloud-based computing environments and to help students practice networking and cyber defense skills. The program's modules will be part of a cybersecurity curriculum that will be available to the public.
A $50,000 NSA grant allows Columbus State Univeristy and the local school system to create what may be the state's first course in cybersecurity education specifically designed for 7th and 8th grade middle school students. The curriculum will be available to be copied for any district interested.
“We do not think that a cybersecurity curriculum of this magnitude has been attempted at the middle school level in Georgia,”
New initiatives from the Cybersecurity Policy & Research Institute at the University of California, Irvine will help combat one of our greatest security challenges: vulnerabilities and attacks in cyberspace.
DHS S&T awarded $220,209 to the University of Tulsa to study data production and usage by cybersecurity researchers, information that will help quantify the value of data-sharing and improve sharing incentives to address the interdependency of cyber-risk environments.
DHS S&T today announced that a network flow analysis technology that will help strengthen cybersecurity has transitioned to the marketplace through its participation in S&T’s Transition to Practice (TTP) program.
DHS S&T will showcase dozens of cybersecurity technologies and projects at the 2017 Cyber Security R&D Showcase and Technical Workshop—the federal government’s largest cybersecurity R&D conference—July 11-13 at the Mayflower Hotel in Washington, D.C.
DHS S&T has awarded Carnegie Mellon University $206,062 to develop data and analysis platforms that cybersecurity researchers can use to understand and counter cyberattacks.
As network technologies reach deeper into our personal, professional, and even political lives, the threats posed by cybersecurity breaches grow in number and degree. This new study provides a unique, qualitative analysis for the detection of organizational vulnerabilities.
UAB cybersecurity expert Gary Warner says, as businesses work to better protect sensitive customer information, consumers must be proactive when making purchases.
When you and your family are zooming along the freeway, the last thing you’re worried about is the security of your car’s computer systems. That’s one reason Ohio State University Associate Professor Emre Koksal devotes most of his time to thinking about how to protect vehicles from cyberattacks.
Youth cyberbullying is dramatically more likely to occur between current or former friends and dating partners than between students who were never friends or in a romantic relationship.
A University of Arkansas at Little Rock professor has received more than $1.5 million to research ways to aid U.S. military forces in the fight against cyber propaganda campaigns. The Office of Naval Research awarded Dr. Nitin Agarwal, the UA Little Rock Jerry L. Maulden-Entergy endowed chair and a professor of information science, a $1,530,778 grant. This new grant enables Agarwal to continue his investigation into the practices, tactics, and motivations of organizers of web-based mass movements and their participants.
DHS S&T's Small Business Innovation Research (SBIR) program has awarded $1.3 million to 12 small businesses for 13 Phase I contract awards to develop technology solutions to Homeland Security challenges.
Residents and staff from five local senior living communities joined forces with Olin College students and professionals in aging services for the LeadingAge MA Hackfest at North Hi
Whenever we need to communicate in secret, a cryptographic key is needed. For this key to work, it must consist of numbers chosen at random without any structure – just the opposite of using the birthdate of our favourite pet. But, for a human, it is extremely difficult to choose without creating any bias, even by hitting the keyboard chaotically. To solve this problem, researchers from the University of Geneva (UNIGE), Switzerland, have developed a new random numbers generator based on the principles of quantum physics.
A University at Buffalo-led team of engineers is creating an app to stop voice hacking. The app uses existing smartphone components, including the magnetometer for the phone’s compass, to detect when someone's voice is being broadcast on a speaker.
University of Washington security researchers have developed a new system called SeaGlass to detect anomalies in the cellular landscape that can indicate where and when IMSI-catchers, cell site simulators, Stingrays and other cell phone surveillance devices are being used.
Join us for our live Facebook Tech Talk, on Thursday, May 25 at 1:30 p.m. EST., to discuss jamming and signal interference and its impact on first responders, their mission space and their standard operating procedures.
Working in the Texas A&M’s Cyberphysical Systems Laboratory, Dr. P.R.Kumar, University Distinguished Professor in the Department of Electrical and Computer Engineering, along with graduate students Bharadwaj Satchidanandan and Woo-Hyun Ko, have applied the theory of dynamic watermarking of sensors in autonomous vehicles to prevent malicious attacks.
A new vulnerability affecting Android mobile devices results not from a traditional bug, but from the malicious combination of two legitimate permissions that power desirable and commonly-used features in popular apps. The combination could result in a new class of attacks, which has been dubbed “Cloak and Dagger.”
By analyzing network traffic going to suspicious domains, security administrators could detect malware infections weeks or even months before they're able to capture a sample of the invading malware, a new study suggests. The findings point toward the need for new malware-independent detection strategies that will give network defenders the ability to identify network security breaches in a more timely manner.
DHS S&T and its counterparts in the Netherlands jointly announced today an opportunity to provide up to $2.6 million of funding for collaborative cybersecurity research projects conducted by joint U.S.-Dutch teams.
The 2017 TTP cohort is comprised of a diverse range of innovative cybersecurity technologies that will help strengthen the cyber defenses of critical networks in the public and private sectors.
This DHS S&T annual technology showcase event is expected to draw 1,000 government, industry and academia cybersecurity professionals from the U.S. and abroad over three days.
University of Washington researchers have conducted a new study that explores the attitudes and concerns of both parents and children who play with internet-connected toys. Through a series of in-depth interviews and observations, the researchers found that kids didn’t know their toys were recording their conversations, and parents generally worried about their children’s privacy when they played with the toys.