Breaking News:

Cybersecurity

Add to Favorites | Subscribe | Share

Filters:

  • (Press "esc" to clear)

Science

Channels:

drive-by download, Spyware, Malicious Software, malicious websites, Antivirus, Countermeasures, Internet, Blade, Malware, Botnets, denial of service

BLADE Software Eliminates “Drive-By Downloads” from Malicious Websites

Researchers have developed a new tool that eliminates drive-by download threats. BLADE is browser-independent and when tested, it blocked all drive-by malware installation attempts from more than 1,900 malicious websites, produced no false positives and required minimal resources from the computer.

Science

Channels:

Cyber, Cybersecurity, cyber technology , Information Security, network security, Information Technology, Systems Engineering, cyber attack, DJC2 , Network-Centric Test and Training System, NETTS, command and control mission assurance, network vulnerability

GTRI Creates Cyber Technology and Information Security Laboratory

wrightrotoloni_R013_hires.jpg

The Georgia Tech Research Institute (GTRI) has created a new Cyber Technology and Information Security Laboratory (CTISL) to apply GTRI’s broad expertise and systems engineering experience in cyber-related research to a wide range of information security issues.

Business

Channels:

Expert Who Helped Track Zeus Botnet Case Is Available for Interviews

Gary Warner, Director of Research in Computer Forensics at UAB, is available to comment on the breaking story about the financial and cyber crimes related to the Zeus botnet.

Science

Channels:

Wikipedia, online information, wikis

Researchers Design Tool to Improve Wikipedia Accuracy

A team of University of Iowa researchers has developed a new tool that detects potential vandalism on Wikipedia and can help improve the accuracy of the online encyclopedia's entries.

Science

Channels:

Smart Grid, Security, Cybersecurity

NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines

NIST has issued its first Guidelines for Smart Grid Cyber Security, including high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for crafting strategies to protect the modernizing power grid from attacks, malicious code, cascading errors and other threats.

Science

Channels:

Internet, social networking data, privacy model

New Model to Help Organize, Keep Private 'Vast Ocean' of Social Network Data

Professors and a Ph.D. student from UALR --the University of Arkansas at Little Rock -- developed a new model to manage the "vast ocean" of data being generated by users of growing social websites. The model allows Internet sites to automatically adjust privacy needs of consumers or organizations to the context in which the data is accessed.

Business

Channels:

Computer Security, Policy, Internet Policy, Cybersecurity and Innovatoin, Innovation, Internet Innovation

Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation

The Commerce Department has published a Notice of Inquiry on 'Cybersecurity, Innovation, and Internet Policy.' The department seeks comments from all stakeholders, including the commercial, academic and civil society sectors, on measures to improve cyber security while sustaining innovation.

Science

Channels:

Data Mining, multidimensional scaling, Database, Computer Science, Algorithms, Google, Facebook, Amazon, Netflix, Privacy

Data Mining Made Faster: 'Squashing' Multidimensional Info

To many big companies, you aren’t just a customer, but are described by multiple “dimensions” of information within a computer database. Now, a University of Utah computer scientist has devised a new method for simpler, faster “data mining,” or extracting and analyzing massive amounts of such data.

Science

Channels:

Internet Security, Social Network, Twitter, Privacy, Youtube

Online Images Can Carry Location Data, Leave Users Vulnerable to “Cybercasing”

ICSI researchers show how information about where videos and photos were captured can be quickly extracted, leaving those who post images online vulnerable to attacks in the real world.

Business

Science

Channels:

Computer Security, Cyber Security, Security Assessment Plans, Security Control Assessment Procedures, FISMA, Federal Information Security Management Act

Updated Computer Security Publication Focuses on Security Assessment Plans

NIST has published an updated set of guidelines for developing security assessment plans and associated security control assessment procedures that are consistent with the Federal Information Security Management Act (FISMA).

Business

Channels:

Google.cn, Business Ethics, Telecommunication, Technology, China, Ethics, Hacking, Computer, Internet, Censorship

Searching for Answers: Ethical Considerations of Google's Presence in China

When Jim Caccamo, Ph.D., an expert in computing and telecommunications technology ethics, heard of Google’s recent struggles in China, he knew he’d need to update the curriculum for the Technology, Society and Christian Ethics course he teaches at Saint Joseph's University in Philadelphia, Pa. The Internet heavyweight recently rerouted all searches from its heavily censored mainland China search engine to its more open Hong Kong engine in the wake of a massive hack on its system in December, which some have attributed to the Chinese government. “Not a lot happens on the Web in China that the government isn’t aware of, and it’s hard to believe they didn’t know about the hacking that happened over the winter,” said Caccamo, who is an associate professor of theology.

Life

Law and Public Policy

Channels:

cyber attack, Cyber Security, Terrorism, Cyber Thieves

Cyber Security Expert Available to Discuss New Threat Warnings

Andrew Macpherson, research assistant professor of justice studies at the University of New Hampshire Justiceworks program and director of the Technical Analysis Group, is available to discuss new warnings about the increased threat of cyber attacks.

Science

Channels:

Cybersecurity, Computer Science, NSF, automated reasoning, Cryptography, Hackers, National Security, Cyberattack, Clarkson University, Christopher Lynch, Software Development, Mathematics

Software to Test Cybersecurity Systems for Flaws

A Clarkson University professor is developing software programs that will test cybersecurity systems for flaws before they become operational. The National Science Foundation is funding the $1.2 million project, which also involves four other research centers.

Business

Channels:

China, China Relations, Google, Cyber Security

Indiana University Expert Available to Discuss Ongoing Impact of Google/China Dispute

3492_h.jpg

International discussion and diplomacy continues in light of Google's announcement last week that it may pull out of China over concerns about censorship and security. Today (Jan. 21). a top Chinese official announced that the threat should not affect China's relations with the United States. Scott Kennedy, director of the Research Center on Chinese Politics and Business and an associate professor of political science and East Asian languages and cultures, is available for comment.

Science

Channels:

Creativity, inventive, Innovation

Cybersecurity Expert Stays Creative Baking Bread

KevinFubakingbread.jpg

Is there a recipe a scientist might follow to spur creativity and cook up new discoveries? Cyber security expert Kevin Fu says experimenting with flour, salt and yeast to bake artisanal bread helps him keep creative juices flowing and creates space in which to mull over thorny research problems.







Chat now!