Breaking News: Cybersecurity

Filters close
Released: 8-Jul-2016 8:05 AM EDT
Extortion Extinction
University of Florida

Ransomware – what hackers use to encrypt your computer files and demand money in exchange for freeing those contents – is an exploding global problem with few solutions, but a team of University of Florida researchers says it has developed a way to stop it dead in its tracks.

Released: 6-Jul-2016 11:05 AM EDT
Your Smartwatch Is Giving Away Your ATM PIN
Binghamton University, State University of New York

Wearable devices can give away your passwords, according to new research. In the paper “Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN” scientists from Binghamton University and the Stevens Institute of Technology combined data from embedded sensors in wearable technologies, such as smartwatches and fitness trackers, along with a computer algorithm to crack private PINs and passwords with 80-percent accuracy on the first try and more than 90-percent accuracy after three tries.

Released: 22-Jun-2016 10:05 AM EDT
UTEP Designated National Center of Academic Excellence (CAE) by NSA
University of Texas at El Paso

The University of Texas at El Paso recently earned recognition as a National Center of Academic Excellence (CAE) in Cyber Operations. The designation from the National Security Agency is for academic years 2016–21.

Released: 8-Jun-2016 10:05 AM EDT
Johns Hopkins Team Makes Hobby Drones Crash to Expose Design Flaws
 Johns Hopkins University

New research raises concerns about how easily hackers could take control of flying drones and land or, more drastically, crash them.

Released: 6-Jun-2016 4:05 PM EDT
DHS to Hold Mobile App Security Research and Development Industry Day
Homeland Security's Science And Technology Directorate

DHS S&T will hold an Industry Day to present information and answer questions regarding Broad Agency Announcement BAA call HSHQDC-16-R-B0006, which solicits proposals for mobile application security research and development.

Released: 6-Jun-2016 2:05 PM EDT
Reduce Cyberslacking and Increase Physical Activity with a Tap, a Click or a Kick
University of Waterloo

An innovative wearable technology for standing desks that creates a new way of interacting with your computer could reduce cyberslacking and increase healthy movement.

Released: 2-Jun-2016 4:05 PM EDT
De-Coding the Character of a Hacker
Frontiers

Malicious hacking online costs the private and corporate sectors up to $575 billion annually, according to internet security firm McAfee. While security agencies seek out "ethical" hackers to help combat such attacks, little is known about the personality traits that lead people to pursue and excel at hacking. A recent study published on Frontiers in Human Neuroscience now shows that a characteristic called systemizing provides insight into what makes and motivates a hacker.

   
Released: 18-May-2016 6:05 PM EDT
SEISE Tool Uses Semantic Gaps to Detect Website Promotional Attacks
Georgia Institute of Technology

By detecting semantic inconsistencies in content, researchers have developed a new technique for identifying promotional infections of websites operated by government and educational organizations.

Released: 16-May-2016 9:05 AM EDT
NYIT Designated as National Center of Academic Excellence in Cyber Defense Education
NYIT

The National Security Agency and the Department of Homeland Security have designated New York Institute of Technology as a National Center of Academic Excellence in Cyber Defense Education through academic year 2021. NYIT is the first university on Long Island to receive this designation.

Released: 4-May-2016 4:05 PM EDT
Not So Safe: Security Software Can Put Computers at Risk
Concordia University

New research from Concordia University in Montreal shows security software might actually make online computing less safe.

Released: 4-May-2016 4:05 PM EDT
Army Grant Funds Research Into Extremist Flash Mobs
University of Arkansas at Little Rock

A University of Arkansas at Little Rock researcher is expanding his investigation of extremist cyber flash mobs — particularly those that lead to violent or damaging behavior.

Released: 4-May-2016 1:05 PM EDT
Phoney Protection for Passwords
Inderscience Publishers

Corporate data breaches seem to be on the rise, rarely a week passes without a company revealing that its database has been hacked and regrettably usernames, passwords, credit card details and its customers' personal information has been leaked on to the open internet. A new protection, nicknamed Phoney, is reported in the International Journal of Embedded Systems.

   
Released: 27-Apr-2016 8:05 AM EDT
Researchers Receive Grant to Improve Security of Online Social Networks
University of Arkansas, Fayetteville

University of Arkansas computer science and engineering professor Xintao Wu has received $348,758 from the National Science Foundation to conduct research on detecting fraud and cyberattacks against online social networks.

Released: 26-Apr-2016 1:05 PM EDT
Magnifying Smartphone Screen Apps For Visually Impaired, Online Anti-Bullying Programs, A One Atom Engine and more in the Technology News Source
Newswise

Magnifying Smartphone Screen Apps For Visually Impaired, Online Anti-Bullying Programs, A One Atom Engine and more in the Technology News Source

   
Released: 20-Apr-2016 1:05 PM EDT
Cyber Defense Competition 2016
Argonne National Laboratory

Please join us for our inaugural Collegiate Cyber Defense Competition where teams of college students compete to design and defend a mock utility system (power plant) from attack.

Released: 13-Apr-2016 5:05 AM EDT
DHS, NASA Partner in Search of Innovation in Homeland Security
Homeland Security's Science And Technology Directorate

DHS announced today a partnership with the NASA Center of Excellence for Collaborative Innovation (CoECI) to develop new technology solutions through publicly crowdsourced prize competitions.

Released: 13-Apr-2016 5:05 AM EDT
DHS S&T Announces New Cybersecurity Risk Analysis Tool on the Commerical Market
Homeland Security's Science And Technology Directorate

DHS S&T announced a fifth cybersecurity technology has been licensed for commercialization as a part of the Cyber Security Division’s Transition to Practice program.

Released: 11-Apr-2016 2:05 PM EDT
Is Your Anti-Terrorism Technology SAFETY Act Certified? It Should Be!
Homeland Security's Science And Technology Directorate

The SAFETY Act provide critical incentives for the development and deployment of anti-terrorism technologies by providing liability protections for sellers of "qualified anti-terrorism technologies."

Released: 8-Apr-2016 2:05 PM EDT
UW-Led Research Team Wins $7.5M MURI Grant to Defend Against Advanced Cyberattacks
University of Washington

A University of Washington-led research team has won a $7.5 million, five-year Multidisciplinary University Research Initiative (MURI) grant from the Department of Defense to better model and mount defenses against stealthy, continuous computer hacking attacks known as "advanced persistent threats."

Released: 8-Apr-2016 7:05 AM EDT
DHS S&T’s Mobile Security Performer to Be First R&D Performer Added to GSA It Schedule 70
Homeland Security's Science And Technology Directorate

DHS S&T announced that their first cybersecurity R&D mobile security performer is now available to federal agencies through General Services Administration’s (GSA) IT Schedule 70.

7-Apr-2016 5:05 PM EDT
Panama Papers Show Billions of Dollars Stashed Away by the Wealthy Elite, Including Several World Leaders; Experts Needed
Newswise Trends

Experts needed to explain which countries provide tax havens and do not comply with international regulations. How did investigative journalists examine the millions of files from the Panama law firm Mossack Fonseca and trace them back to prominent world leaders?

   
Released: 1-Apr-2016 2:05 PM EDT
Breakthrough in Cybersecurity Is No Phish Story
University at Buffalo

Corporations, small businesses and public sector entities have tried unsuccessfully for years to educate consumers and employees on how to recognize phishing emails.

   
29-Mar-2016 2:05 PM EDT
Doctoral Student’s Research Enhances Cybersecurity via Rapid Address Change
University of Alabama Huntsville

Research enhancing cybersecurity by changing a networked device’s IP address repeatedly at a very fast pace has won recognition for a computer engineering doctoral student at The University of Alabama in Huntsville (UAH).

Released: 28-Mar-2016 10:05 AM EDT
College Cyber Defenders Get Set for “Operation Cyber Bailout” at Johns Hopkins APL
Johns Hopkins University Applied Physics Laboratory

2016 Mid-Atlantic Collegiate Cyber Defense Competition Features Eight Regional Schools Testing Their Skills against Professional Cybersecurity Experts

Released: 23-Mar-2016 3:05 PM EDT
Shuffling May Be Best Cybersecurity Defense
George Mason University School of Management

A team of George Mason researchers proposes a “moving-target” defense against distributed denial-of-service attacks. The defense works by repeatedly shuffling client-to-server assignments to identify and eventually quarantine malicious clients.

Released: 22-Mar-2016 2:05 PM EDT
Suicide Bomber Attacks in Brussels Kills Dozens. ISIS Claims Responsibility. Experts Needed For Media
Newswise

Suicide bomber attack in brussels kills dozens. ISS claims responsibility. Cities around the world ramp up security. Experts needed for media.

       
Released: 18-Mar-2016 1:05 PM EDT
Will Unlocking Apple’s iPhone Unlock a Pandora’s Box?
Boston University

CAS network security expert: move will weaken US cybersecurity.

Released: 17-Mar-2016 2:05 PM EDT
New Technique Wipes Out Unwanted Data
Lehigh University

Machine learning systems are everywhere. They predict the weather, forecast earthquakes, provide recommendations based on the books and movies we like, and even apply the brakes on our cars when we’re not paying attention.

   
Released: 16-Mar-2016 1:05 PM EDT
UMD-Led Team Ranks Nations on Vulnerability to Cyberattacks
University of Maryland, College Park

Damaging cyberattacks on a global scale continue to surface every day. Some nations are better prepared than others to deal with online threats from criminals, terrorists and rogue nations.

Released: 15-Mar-2016 9:00 AM EDT
Speeding Recovery From Cyber-Induced Blackouts, Teaching with 'Big Data', Security Breach in 3-D Printing Process, and more in the Cybersecurity News Source
Newswise

Speeding Recovery From Cyber-Induced Blackouts, Teaching with 'Big Data', Security Breach in 3-D Printing Process, and more in the Newswise Cybersecurity News Source.

Released: 4-Mar-2016 9:00 AM EST
How America’s Electric Utilities Can Speed Recovery From Cyber-Induced Blackouts
Johns Hopkins University Applied Physics Laboratory

A new study by Johns Hopkins APL/Dr. Paul Stockton, “Superstorm Sandy: Implications for Designing a Post-Cyber Attack Power Restoration System,” examines the novel challenges of a cyber attack, and explores how utilities can ramp up the progress they are already making against increasingly severe cyber threats.

Released: 2-Mar-2016 1:05 PM EST
Bad Vibrations: UCI Researchers Find Security Breach in 3-D Printing Process
University of California, Irvine

With findings that could have been taken from the pages of a spy novel, researchers at the University of California, Irvine have demonstrated that they can purloin intellectual property by recording and processing sounds emitted by a 3-D printer.

Released: 2-Mar-2016 8:00 AM EST
New Vulnerability Discovered in Common Online Security
University of Adelaide

One of the world's most common security software packages – used as the basis of protection for many web browsers – has been found to be vulnerable to a specific form of attack, according to research led by the University of Adelaide.

Released: 1-Mar-2016 10:05 AM EST
DHS S&T Awards Yale University $1.7M For Data Privacy Research
Homeland Security's Science And Technology Directorate

DHS S&T awarded $1.7 million to Yale University for the development of technology that can help protect the identity and location of individuals against malicious tracking and surveillance.

29-Feb-2016 9:05 AM EST
Dynamic Cyber Warning Software Looks Promising
University of Alabama Huntsville

University of Alabama in Huntsville researchers are seeing potential in a software application that could effectively warn users when they are about to give away sensitive personal information online.

Released: 25-Feb-2016 2:05 PM EST
BU Researchers Welcome Obama’s Final Budget Proposals
Boston University

Plan calls for more cancer, cybersecurity, sustainable energy funding in 2017.

24-Feb-2016 4:05 PM EST
Is Zero-Effort Computer Security a Dream? Breaking a New User Verification System
University of Alabama at Birmingham

Study shows that, although ZEBRA, a system intended to enable prompt and user-friendly deauthentication, works very well with honest people, opportunistic attackers can fool the system.



close
1.58298