Breaking News:

Cybersecurity

Add to Favorites | Subscribe | Share

Filters:

  • (Press "esc" to clear)

Science

Channels:

Internet of Things, IoT, Privacy, Security, Cybersecurity, consumer technology, smarthomes

IU Researchers Receive $1.8 Million NSF Grant to Protect Security of 'Internet of Things' Technology

20151116_JeanCamp_ER_003_3x2_zoomed.jpg

Indiana University School of Informatics and Computing researchers have received $1.8 million from the National Science Foundation to ensure that door locks, lightbulbs, cameras and other common household items, which are increasingly connected to the internet, remain secure.

Science

Channels:

Computers, Computer Chip, CPU, NSF, National Science Foundation, Haswell, computer hacking, Computer Hackers, Hackers, Hacking, address space layout randomization, ASLR software, computer hardware, cyber attacks, Cyber Security, Computer Security, Binghamton University, SUNY Binghamton, State University of New York at Binghamton, Linux, Intel, Windows, Malware,

Researchers Find Weakness in Common Computer Chip

Researchers from Binghamton University—State University of New York and the University of California, Riverside have found a weakness in the Haswell central processing unit (CPU) components that makes common computer operating systems vulnerable to malicious attacks. Computer hackers could take control of individual, company and government computers if a weak point in address space layout randomization (ASLR) software is exploited by manipulating a CPU’s branch predictor, a piece of hardware designed to improve program performance.

Business

Channels:

Cyber, Cybersecurity, cyber research, Telematics, DHS, S&T, R&D, cyber physical systems, vehicle security, Bluetooth, secure vehicle updates, vehicle updates, vehicle technology, CPSSEC, CPS

Cybersecurity Needed for Autos, Too

vehicle_cyber_security_facebook.jpg

Most white-hat hackers believe hackers will exploit cyber vulnerabilities to remotely access connected vehicles. A DHS S&T's CSD objective is to identify key vehicle cybersecurity challenges and find solutions that will reduce the risk of cyber-attacks.

Business

Channels:

cyber attack, Cybersecurity, Information Assurance, Technology, Information Technology

Disruptive DYN attack motivations still sought, says Kennesaw State cybersecurity expert

KSU_AndyGreen_1.jpg

Science

Channels:

cyber attack, Twitter, Amazon, Netflix

Cyber Attack on Netflix, Amazon and Twitter - Expert Says It’s Only the Beginning

D_14SW1309.jpg

Science

Channels:

Cybersecurity, Ddos, denial of service attacks, Hacking, Computing, Computer Science

Cybersecurity expert available to discuss DDoS attack

Science

Channels:

cyber attack, cyber attacks, Cyber

Nationally Recognized Homeland and Cyber Security Expert Available to Speak About Hacker Attacks

Life

Education

Channels:

active authentication , Privacy, Security, behaviorial biometrics, Cybersecurity, user identity, Smartphone, National Science Foundation (NSF) , identity verification, smartphone battery life , energy-efficient authentication, smartphone energy consumption, PIN, Password, fingerprint scan

Verify User’s Identity While Saving Phone Battery Life: NYIT Researchers Receive National Science Foundation Grant

pgasti.jpg

Paolo Gasti, Ph.D., assistant professor of Computer Science at NYIT, and a team of researchers has been awarded nearly $300,000 from the National Science Foundation for the research project: “Towards Energy-Efficient Privacy-Preserving Active Authentication of Smartphone Users.”

Science

Channels:

cloud hosting, Malware, malicious content, bad repositories, malicious activity, Cybersecurity

Study Finds “Lurking Malice” in Cloud Hosting Services

bad-repositories.jpg

A study of 20 major cloud hosting services has found that as many as 10 percent of the repositories hosted by them had been compromised – with several hundred of the “buckets” actively providing malware. Such bad content could be challenging to find, however, because it can be rapidly assembled from stored components that individually may not appear to be malicious.

Science

Channels:

Skype, skyping, electronic eavesdropping

Typing While Skyping Could Compromise Privacy

cybercrime_tsudik_04.1.jpg

Irvine, Calif., Oct. 18, 2016 – If you type on your desktop or laptop computer’s keyboard while participating in a Skype call, you could be vulnerable to electronic eavesdropping, according to researchers at the University of California, Irvine and in Italy.

Life

Social and Behavioral Sciences

Channels:

cyber abuse, cyber dating abuse, Dating Violence, dating abuse, Adolescent, UTHealth , uthealth school of public health

UTHealth Study Finds That 15 Percent of Sixth-Grade Students Commit Cyber Abuse

MelissaPeskin.jpg

Fifteen percent of sixth-grade students reported they had perpetrated at least one form of abuse toward a dating partner through technology, according to a new study from The University of Texas Health Science Center at Houston (UTHealth) School of Public Health.

Life

Social and Behavioral Sciences

Channels:

Cyberbullying Expert Provides Important Tips to Stay Safe

Hinduja-FAU-2015.jpg

Although most children use their smartphones and social media apps in appropriate ways, about 25 percent will experience online bullying at some point.

Science

Channels:

Professor Shows Brain Waves Can Be Used to Detect Potentially Harmful Personal Information

Texas Tech researcher Abdul Serwadda is working to advance research to develop secure user authentication methods.

Science

Business

Channels:

Cyber, Cyber Security, Cybersecurity, cyber research, cyber activity, SBIR, Research, S&T, DHS, R&D, Science And Technology Directorate

Small Businesses Show Off Tech Solutions at Small Business Innovative Workshop

Government, private-sector integrators and investment firms were invited to see a variety of novel technologies available for operational use during the event.

Life

Education

Channels:

cyber breaches, Cybersecurity, cyber defense education , cyber attacks, cyber crimes, Higher Ed

NYIT Conference Discusses Digital Intrusions, Countermeasures, and the Cost of Cybercrime

cyber_200_2014.png

Planes, Trains, and Election Results: NYIT's Annual Cybersecurity Conference Discusses Digital Intrusions, Countermeasures, and the Cost of Cybercrime

Science

Channels:

Chemistry & Materials, Cyber, Chemistry, Hispanic, Diversity, stem, material sciences, Material Science, engineeering, Computer Science, Cybersecurity

Paving the Way: Sandia Researchers Earn Top Hispanic Science and Engineering Honors

Bernadette.jpg

The technical achievements of two Sandia National Laboratories innovators will be recognized with 2016 Hispanic Engineer National Achievement Awards Conference (HENAAC) Awards from Great Minds in STEM, an organization supporting careers in science, technology, engineering and math.

Science

Channels:

Cybersecurity, on-body transmissions , Computer Science

Secure Passwords Can Be Sent Through Your Body, Instead of Air

OnBodyphoneandsmartlocksystem.jpg

University of Washington engineers have devised a way to send secure passwords through the human body using smartphone fingerprint sensors and laptop touchpads -- rather than over the air where they're vulnerable to hacking.

Science

Business

Channels:

Research, Research & Development, Research & Technology , Technology, Health, Business, University, Innovation, Healthcare, Bioinformatics, Cybersecurity

Nova Southeastern University Opens New Center for Collaborative Research

CCRPhoto.jpg

Nova Southeastern University (NSU) officially opened its Center for Collaborative Research (CCR), one of the largest and most advanced research facilities in Florida. As part of the ceremony, which was held September 21, NSU announced a gift from AutoNation to name NSU’s AutoNation Institute for Breast and Solid Tumor Cancer Research, located within the CCR. The Institute is focused on developing and advancing improved methods of prevention and treatment to ultimately eradicate cancer. The gift to name NSU’s AutoNation Institute brings the company’s cumulative giving to NSU to more than $10 million.

Medicine

Channels:

Cybersecurity, American Univerity, Raytheon, NIST

AU’s Kogod Cybersecurity Governance Center Hosting U.S. Cybersecurity Commission’s September Hearing

The National Institute of Science and Technology (NIST) is holding a field hearing on cybersecurity at American University and hosted by AU's Kogod Cybersecurity Governance Center.

Science

Channels:

3-D printing, Smartphone, Intellectual Property, hack, Security, Electromagnetic, Acoustic, cyber attack, Aerospace, Medical Device, Cybersecurity

Smartphone Hacks 3-D Printer by Measuring ‘Leaked’ Energy and Acoustic Waves

smartphone-3Dprinter.png

University at Buffalo researchers illustrate how smartphones, due to their ubiquity and sophisticated gadgetry, can easily hack 3-D printers by measuring ‘leaked’ energy and acoustic waves that emanate from the printers. The work is eye-opening because it shows how anyone with a smartphone — from a disgruntled employee to an industrial spy — might steal intellectual property from an unsuspecting business.







Chat now!