Study shows that, although ZEBRA, a system intended to enable prompt and user-friendly deauthentication, works very well with honest people, opportunistic attackers can fool the system.
Cyber thieves who steal credit and debit card numbers are making millions of dollars in profits, fueling a global criminal enterprise marked by the high-profile data breaches of major companies such as Target and Home Depot.
DHS S&T Cyber Security R&D Showcase will provide technology investors, integrators and IT companies info on S&T-funded research and development on technologies, tools and techniques that can strengthen the nation's cyber security posture.
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) awarded $2.2 million to Adventium Enterprises of Minneapolis for the development of technology that can help defend medical devices from cyber-attacks.
The commercial licensing of a cyber security technology developed at the Department of Energy's Oak Ridge National Laboratory has been recognized by the Federal Laboratory Consortium for Technology Transfer (FLC) as a top example of moving technology to the marketplace.
DHS S&T showcased technologies to private industry cybersecurity investor, integrators and IT professionals and provided live in-depth demonstrations of the technologies.
Software that helps cybersecurity analysts prevent hacks and a microbial disinfecting system that kills with an activated salt spray are two of the latest innovations Pacific Northwest National Laboratory has successfully commercialized with the help of business partners. The Federal Laboratory Consortium has honored the two teams with 2016 Excellence in Technology Transfer awards.
The world remains perilously close to a nuclear disaster or catastrophic climate change that could devastate humanity, according to Stanford experts and California Governor Jerry Brown, who were on hand to unveil the latest update to the Bulletin of Atomic Scientists’ “doomsday clock” on Tuesday.
Iowa State engineers have built the "PowerCyber" testbed to help researchers, industry engineers and students learn to protect the cyber security of the power grid. The end goal is to help create a future electric power grid that is secure and resilient.
Privacy policies for websites, smartphone apps and, especially, components of the emerging Internet of Things are usually ineffective or ignored by users, but Carnegie Mellon University researchers say properly designed privacy notices — pushed out to users at appropriate times — could help remedy that problem.
DHS S&T’s Cyber Security Division held both online and in-person discussions around the country to engage a wide range of stakeholders to determine where the division should focus next in cyber security research and development.
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) today announced the award of five contracts totaling $7.8 million for research on technologies to help defend against attacks on cyber physical systems.
National security analysts often find that available data is growing much faster than analysts’ ability to observe and process it. Sometimes they can’t make key connections and often they are overwhelmed struggling to use data for predictions and forensics. Sandia National Laboratories’ Pattern Analytics to Support High-Performance Exploitation and Reasoning (PANTHER) team has developed solutions that will enable analysts to work smarter, faster and more effectively when looking at huge, complex amounts of data in real-time, stressful environments where the consequences might be life or death.
Technologies that impact cyber security, increase our ability to detect trace amounts of chemicals, convert sewage into fuel, view energy processes under real-world conditions and forecast future electric needs are among the newest R&D 100 award winners at Pacific Northwest National Laboratory.
The cumulative number of successful phishing cyberattacks has risen sharply over the last decade, and in 2014 that figure surged past the total U.S. population, according to a University at Buffalo expert in cyber deception.
A Colorado State University-led team is developing a service that can sniff out, ward off and protect against large-scale online attacks known as Distributed Denial of Service, or DDoS, attacks.
Hewlett-Packard (HP) recently licensed one-of-a-kind technology – called Symbiote – from Red Balloon Security, to protect its printers from cyber attacks.
Computer & Information Sciences researchers tested users’ abilities to detect malware and phishing attacks while measuring the neurophysiological behavior underlying these tasks.
The results from a recent study showed that multitasking when using mobile devices creates stress and increases the potential for choosing unsafe apps.
In first-of-its-kind study, UC Riverside engineers quantify amount of Android root exploits available in commercial software and show that they can be easily abused
Researchers at University of New Mexico and the Lawrence Berkeley National Laboratory say cybersecurity breeches are not happening more frequently than they did a decade ago. And these data breaches in general are not growing in size.
Three Virginia Tech computer scientists are unveiling a novel approach to discovering stealth attacks on computers at the annual ACM Conference on Computer and Communications Security.
University of Arkansas engineering researchers, focused on solid-state solutions to upgrade the U.S. power grid, will lead a new national center devoted to cybersecurity for electric power utilities. The center is made possible by a $12.2 million grant from the U.S. Department of Energy, augmented by $3.3 million in matching funds from the research partners.
Ames Laboratory's Chris Strasburg discovered an interest in research while working in systems support and cybersecurity. He’s now the U.S. Department of Energy's Ames Laboratory’s cybersecurity manager and working toward a Ph.D. in computer science at Iowa State University, studying artificial intelligence approaches, automation of computer languages, and network security.
Lock Data Solutions has licensed a technology from the Department of Energy’s Oak Ridge National Laboratory designed to protect a company’s data from internal and external threats.
With an ever increasing number of everyday objects from our homes, workplaces and even from our wardrobes, getting connected to the Internet, known as the ‘Internet of Things (IoT), researchers from the University of Southampton have identified easy-to-use techniques to configure IoT objects, to make them more secure and hence help protect them from online attacks.
The PathScan® technology, developed by Los Alamos National Laboratory is a network anomaly-detection tool that is being licensed to Ernst & Young LLP (EY).
Sixth NYIT cybersecurity conference at NYIT Auditorium on Broadway features academic, corporate, and governmental cyber experts, plus a mobile security workshop.
While most hackathons and programming contests encourage participants to develop usable software, a contest hosted by Binghamton University’s Scott Craver asks users to develop code that is “subtly evil.”
Researchers from the Georgia Institute of Technology College of Computing developed a new cyber security analysis method that discovered 11 previously unknown Internet browser security flaws.
A lightweight virtualization architecture that can be used to build cybersecurity into systems used in the so-called Internet of Things is being developed by a research team at The University of Alabama in Huntsville (UAH).
The second annual Senior Executive Cybersecurity Conference (Thursday, Sept. 10, at the Johns Hopkins University in Baltimore) will focus on the conflict between crime fighting and privacy. Early-bird discount registration prices are in effect through Aug. 15.
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) today announced a $2.9 million cybersecurity mobile app security (MAS) research and development (R&D) award that will help identify mobile app vulnerabilities.
Despite heightened awareness of surveillance tactics and privacy breaches, existing computer security tools aren't meeting the needs of journalists working with sensitive material, a new UW study finds.
Today, the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) announced that their mobile apps archiving technology has expanded the capability to track copyright infringement in mobile apps.
This is S&T’s third technology that has successfully gone through the Transition to Practice (TTP) program and into the commercial market. The Network Mapping System (NeMS), developed by Lawrence Livermore National Laboratory, is a software-based tool that tells users what is connected to their network so that they know what needs to be protected.
Twenty years in, the law is finally starting to get used to the Internet. Now it is imperative, says Ryan Calo, assistant professor in the UW School of Law, that the law figure out how to deal effectively with the rise of robotics and artificial intelligence.
A Georgia Institute of Technology researcher has created an easier email encryption method – one that sounds familiar to parents who try to outsmart their 8-year-old child. The new technique gets rid of the complicated, mathematically generated messages that are typical of encryption software. Instead, the method transforms specific emails into ones that are vague by leaving out key words.