Breaking News:

Cybersecurity

Add to Favorites | Subscribe | Share

Filters:

  • (Press "esc" to clear)

Science

Channels:

voice impersonation, voice hacking, Hacking, APP, Software, Password, cyber attack, cyber breaches, Cybersecurity, computer science and engineering, siri , wechat, voice-based apps

App Uses Smartphone Compass to Stop Voice Hacking

A University at Buffalo-led team of engineers is creating an app to stop voice hacking. The app uses existing smartphone components, including the magnetometer for the phone’s compass, to detect when someone's voice is being broadcast on a speaker.

Science

Channels:

cell phone surveillance, IMSI-catchers, Cell site simulators, Privacy and Security

Catching the IMSI-Catchers: SeaGlass Brings Transparency to Cell Phone Surveillance

SeaGlassbaselinemodelinganimation.gif

University of Washington security researchers have developed a new system called SeaGlass to detect anomalies in the cellular landscape that can indicate where and when IMSI-catchers, cell site simulators, Stingrays and other cell phone surveillance devices are being used.

Business

Channels:

Cybersecurity, cyber warfare, OneLogin, Medill School of Journalism

OneLogin, 'Fort Knox' of Password Lockers, Attractive to Cyber-Thieves

paulie.jpg

Science

Business

Channels:

electronic jamming, Jamming, signal inteference, Responder, responder tech, First Responder, first responder technology, Law Enforcement, law enforcement technology, DHS, S&T, FRG, Facebook Live

Facebook Live Tech Talk: Join Us Discuss How to Stop Electronic Jamming!

TechTalk_StoppingSignalInterference_Facebook.jpg

Join us for our live Facebook Tech Talk, on Thursday, May 25 at 1:30 p.m. EST., to discuss jamming and signal interference and its impact on first responders, their mission space and their standard operating procedures.

Science

Channels:

Cybersecurity, Autonomous cars, connected vehicles

Dynamic Watermarking Could Help Solve Security Issues in Connected Vehicles

Working in the Texas A&M’s Cyberphysical Systems Laboratory, Dr. P.R.Kumar, University Distinguished Professor in the Department of Electrical and Computer Engineering, along with graduate students Bharadwaj Satchidanandan and Woo-Hyun Ko, have applied the theory of dynamic watermarking of sensors in autonomous vehicles to prevent malicious attacks.

Science

Channels:

Malware, android, Permissions

Combination of Features Produces New Android Vulnerability

A new vulnerability affecting Android mobile devices results not from a traditional bug, but from the malicious combination of two legitimate permissions that power desirable and commonly-used features in popular apps. The combination could result in a new class of attacks, which has been dubbed “Cloak and Dagger.”

Science

Channels:

Malware, malware detection, malware infection, network traffic

Network Traffic Provides Early Indication of Malware Infection

malware-sources5740.jpg

By analyzing network traffic going to suspicious domains, security administrators could detect malware infections weeks or even months before they're able to capture a sample of the invading malware, a new study suggests. The findings point toward the need for new malware-independent detection strategies that will give network defenders the ability to identify network security breaches in a more timely manner.

Science

Channels:

Malware, cloud security, Computer Security, Cybersecurity

Expert Available to Discuss Malware, Computer Security and Cloud Security

Life

Social and Behavioral Sciences

Channels:

Cybersecurity Expert Says Digital Hygiene Is Key to Preventing Future Ransomware Attacks

Life

Law and Public Policy

Channels:

airport safety, Airport Security, Laptop, TSA, Airlines, Homeland Security

Laptop Travel Ban Expert

robertson_cassandra.jpg







Chat now!