Study on American Jihadi Women, Experts on ‘Low-Tech Terror’ and Hate Speech Versus Free Speech in the Terrorism News Source
NewswiseFor the latest research and experts on Terrorism go to the Terrorism News Source
For the latest research and experts on Terrorism go to the Terrorism News Source
DHS S&T will host an industry day to connect technology startups and investors to new opportunities for research and development of cybersecurity active defenses for the nation’s financial services sector critical infrastructure.
Randal Vaughn, Ph.D., professor of information systems in Baylor University’s Hankamer School of Business, said that while most online merchants he uses such as Jet.com and Amazon seem to have excellent consumer protections in place, he has a few tips to help consumers be smart online shoppers.
A University of Arkansas at Little Rock professor and two doctoral students recently got a chance to unveil their research on cyber defense at an international NATO conference. The talk, “Understanding Influence Operations of Novorossiya through Blogs and Twitter,” detailed the research team’s monitoring of social media responses to NATO exercises Operation Brilliant Jump and Anakonda over the summer. Specifically, they tracked how anti-NATO groups reacted to information released by NATO and media coverage of the exercises via social media.
Fighting computer viruses isn’t just for software anymore. Binghamton University researchers will use a grant from the National Science Foundation to study how hardware can help protect computers too.
The latest research and features on cybersecurity in the Cybersecurity News Source
A new report from the GW Center for Cyber and Homeland Security offers the most comprehensive assessment to date of the legal, policy and technological contexts that surround private sector cybersecurity and active defense measures to improve U.S. responses to evolving threats.
Indiana University School of Informatics and Computing researchers have received $1.8 million from the National Science Foundation to ensure that door locks, lightbulbs, cameras and other common household items, which are increasingly connected to the internet, remain secure.
Researchers from Binghamton University—State University of New York and the University of California, Riverside have found a weakness in the Haswell central processing unit (CPU) components that makes common computer operating systems vulnerable to malicious attacks. Computer hackers could take control of individual, company and government computers if a weak point in address space layout randomization (ASLR) software is exploited by manipulating a CPU’s branch predictor, a piece of hardware designed to improve program performance.
Most white-hat hackers believe hackers will exploit cyber vulnerabilities to remotely access connected vehicles. A DHS S&T's CSD objective is to identify key vehicle cybersecurity challenges and find solutions that will reduce the risk of cyber-attacks.
Paolo Gasti, Ph.D., assistant professor of Computer Science at NYIT, and a team of researchers has been awarded nearly $300,000 from the National Science Foundation for the research project: “Towards Energy-Efficient Privacy-Preserving Active Authentication of Smartphone Users.”
A study of 20 major cloud hosting services has found that as many as 10 percent of the repositories hosted by them had been compromised – with several hundred of the “buckets” actively providing malware. Such bad content could be challenging to find, however, because it can be rapidly assembled from stored components that individually may not appear to be malicious.
Irvine, Calif., Oct. 18, 2016 – If you type on your desktop or laptop computer’s keyboard while participating in a Skype call, you could be vulnerable to electronic eavesdropping, according to researchers at the University of California, Irvine and in Italy.
Fifteen percent of sixth-grade students reported they had perpetrated at least one form of abuse toward a dating partner through technology, according to a new study from The University of Texas Health Science Center at Houston (UTHealth) School of Public Health.
Although most children use their smartphones and social media apps in appropriate ways, about 25 percent will experience online bullying at some point.
Texas Tech researcher Abdul Serwadda is working to advance research to develop secure user authentication methods.
Government, private-sector integrators and investment firms were invited to see a variety of novel technologies available for operational use during the event.
Planes, Trains, and Election Results: NYIT's Annual Cybersecurity Conference Discusses Digital Intrusions, Countermeasures, and the Cost of Cybercrime
The technical achievements of two Sandia National Laboratories innovators will be recognized with 2016 Hispanic Engineer National Achievement Awards Conference (HENAAC) Awards from Great Minds in STEM, an organization supporting careers in science, technology, engineering and math.
University of Washington engineers have devised a way to send secure passwords through the human body using smartphone fingerprint sensors and laptop touchpads -- rather than over the air where they're vulnerable to hacking.
Nova Southeastern University (NSU) officially opened its Center for Collaborative Research (CCR), one of the largest and most advanced research facilities in Florida. As part of the ceremony, which was held September 21, NSU announced a gift from AutoNation to name NSU’s AutoNation Institute for Breast and Solid Tumor Cancer Research, located within the CCR. The Institute is focused on developing and advancing improved methods of prevention and treatment to ultimately eradicate cancer. The gift to name NSU’s AutoNation Institute brings the company’s cumulative giving to NSU to more than $10 million.
The National Institute of Science and Technology (NIST) is holding a field hearing on cybersecurity at American University and hosted by AU's Kogod Cybersecurity Governance Center.
University at Buffalo researchers illustrate how smartphones, due to their ubiquity and sophisticated gadgetry, can easily hack 3-D printers by measuring ‘leaked’ energy and acoustic waves that emanate from the printers. The work is eye-opening because it shows how anyone with a smartphone — from a disgruntled employee to an industrial spy — might steal intellectual property from an unsuspecting business.
The cybersecurity job market is wide open. "We're gong to need as many people as possible to 'hit the ground running' to meet the demand, says IT careers analyst.
Spotting a glitch on the factory floor in real time—and reconfiguring around it—are the goals of a new $4 million project led by University of Michigan engineering researchers.
Papers and panels will address human-centered issues in cyber operations, including situation awareness, vigilance, task-switching, and training.
A computer science professor from Missouri University of Science and Technology will join top government hackers, corporate risk managers and information technology professionals at the inaugural Governor’s Cybersecurity Summit this week in Jefferson City, Missouri.
Zachary King spent the summer researching how to keep cars safe from cyberattacks during an intensive eight-week cybersecurity summer research program at the University of Arkansas at Little Rock.
On Tuesday, August 23, 2016, the University of Minnesota Technological Leadership Institute (TLI) will host an open meeting of the U.S. Commission on Enhancing National Cybersecurity. The University of Minnesota is one of just five locations where the Commission is hosting meetings.
There are plenty of tech jobs in the Asia-Pacific, but the mismatch and shortage of engineering talent in much of the region has resulted in more companies creating programs aimed at upgrading the skills of engineers.
Scientists at Queen Mary University of London (QMUL) have revealed the network infrastructure used by Netflix for its content delivery, by mimicking the film request process from all over the world and analysing the responses.
At the USENIX Security Conference in Austin, Texas, a team of University of Washington researchers on Aug. 12 presented the first-ever comprehensive analysis of third-party web tracking across three decades and a new tool, TrackingExcavator, which they developed to extract and analyze tracking behaviors on a given web page. They saw a four-fold increase in third-party tracking on top sites from 1996 to 2016, and mapped the growing complexity of trackers stretching back decades.
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has awarded $1.3 million to 13 small businesses for the development of new cyber security technology.
DHS S&T today announced a $40M funding opportunity for an institution to lead a new DHS Center of Excellence (COE) for Homeland Security Quantitative Analysis.
With the help of a recently awarded National Science Foundation grant, University of Arkansas at Little Rock researchers plan to launch a program designed to fill a national gap in cybersecurity education and better prepare students to enter the workforce.
A $9.4 million grant from the Defense Advanced Research Projects Agency (DARPA) could lead to development of a new technique for wirelessly monitoring Internet of Things (IoT) devices for malicious software – without affecting the operation of the ubiquitous but low-power equipment.
If biochemists had access to a quantum computer, they could perfectly simulate the properties of new molecules to develop drugs in ways that would take today’s fastest computers decades. A new device takes us closer to providing such a computer.
The Department of Homeland Security Science and Technology Directorate is working to combat electronic jamming of first responders’ radio communications systems by enhancing jamming prevention, detection and mitigation technologies.
To develop advanced knowledge, test products and technologies and prove the utility of research in large-scale network environments, the R&D community requires real-world data. To meet this need, the Department of Homeland Security Science and Technology Directorate (S&T) Cyber Security Division (CSD) has created the Information Marketplace for Policy and Analysis of Cyber-risk & Trust (IMPACT), a publicly available electronic library to provide the industrial and academic research community access to infrastructure and event data.
DARPA DHS S&T Cyber Security Division are collaborating actively to make enterprise-grade mobile security solutions commercially available to government agencies with high assurance needs as well as the broader community.