Breaking News: Cybersecurity

Filters close
Released: 2-Jun-2015 4:05 PM EDT
S&T to Demonstrate Cutting-Edge Cybersecurity Technologies
Homeland Security's Science And Technology Directorate

On June 9, 2015, the Department of Homeland Security (DHS) Science and Technology (S&T) Directorate will showcase nine cutting-edge cybersecurity technologies at the Santa Clara Marriott in Santa Clara, Calif.

Released: 28-May-2015 9:05 AM EDT
Generate Patterns to be Consumed by a Quantum 3D Printer; Improve Software Security through Gameplay
GameDocs

A decoded message from a distant galaxy provided the plans for a Quantum Mechanical 3D printer in Left Brain Games’ puzzle shooter, Dynamakr. Players feed patterns into the machine to create designs for new devices never seen before on Earth—devices so advanced, they’re like magic. Game play allows non-experts to participate in improving software security in Phase 2 of DARPA’s Verigames project.

   
Released: 22-May-2015 8:05 AM EDT
Trending Stories Report for 22 May 2015
Newswise Trends

Trending news releases with the most views in a single day. Topics include: swelling magnets; using genetics to fight dengue fever; cybersecurity; Hubble finds 'Nasty' star; ventilation and patient survival; food security; gamification in business; and cancer research on implants to improve glioma treatment.

       
Released: 21-May-2015 4:05 PM EDT
Time to Move Beyond ‘Medieval’ Cyber Security Approach, Expert Says
Missouri University of Science and Technology

The nation’s approach to cyber security has much in common with medieval defense tactics, and that needs to change, says a cyber security expert at Missouri University of Science and Technology.

Released: 20-May-2015 9:00 AM EDT
Clash Between Personal Rights and National Security
University of Adelaide

A legal adviser to whistleblower Edward Snowden is among the many leading contributors to a new free online course being run by the University of Adelaide: Cyberwar, Surveillance and Security.

Released: 7-May-2015 2:05 PM EDT
UW Researchers Hack a Teleoperated Surgical Robot to Reveal Security Flaws
University of Washington

University of Washington researchers easily hacked a next generation teleoperated surgical robot to test how easily a malicious attack could hijack remotely-controlled operations in the future and to offer security solutions.

Released: 27-Apr-2015 7:05 PM EDT
Advancing Security and Trust in Reconfigurable Devices
Georgia Institute of Technology

A research team at the Georgia Tech Research Institute (GTRI) is studying a range of security challenges involving programmable logic devices – in particular, field programmable gate arrays (FPGAs).

Released: 22-Apr-2015 8:00 AM EDT
Iowa State Researchers Test Brain Activity to Identify Cybersecurity Threats
Iowa State University

In a first-of-its-kind study, Iowa State University researchers tested brain activity to better understand employees who pose a risk to cybersecurity.

Released: 13-Apr-2015 9:05 AM EDT
The Upworthy Don
Drexel University

Researchers from Drexel University’s Privacy, Security and Automation Lab are using social network analysis tools to better understand the activity of cybercrime forums. Their findings could guide the next generation of “Untouchables.”

Released: 26-Mar-2015 11:05 AM EDT
UAB Rolls Out New Technology to Help Users Combat Mobile Malware Attacks
University of Alabama at Birmingham

Researcher’s approach allows the phone’s weakest security component — the user — to become its strongest defender.

Released: 24-Feb-2015 2:00 PM EST
How Sensor-Packed Smartphones Can Read Your Mood, Guard Your Data — and Wreak Havoc in the Wrong Hands
University of Alabama at Birmingham

Smartphones have replaced nearly every conceivable gadget, but UAB computer scientists are teaching them some new tricks. The researchers are adapting accelerometers, GPS chips, gyroscopes and other sensors to make phones that can read a user's mood, eliminate passwords, protect financial transactions and more.

Released: 24-Feb-2015 8:00 AM EST
Cyberbystanders: Most Don’t Try to Stop Online Bullies
Ohio State University

In a new study, 221 college students participated in an online chat room in which they watched a fellow student get “bullied” right before their eyes. Only 10 percent of the students who noticed the abuse directly intervened, either by confronting the bully online or helping the victim.

Released: 16-Feb-2015 3:00 PM EST
Criminologist 'Hacks' the Hacker
Kansas State University

Hacking is a late-modern transgressive craft, according to the latest research from a Kansas State University criminologist.

Released: 4-Feb-2015 10:00 AM EST
Iowa State Cyber Security Experts Make Virtual Lab Available for Classrooms, Competitions
Iowa State University

Iowa State cyber security experts have developed ISERink (ice rink) as a playground for computer competition, training and research. Thanks to support from the National Science Foundation, the software is now available for free to other schools.

Released: 22-Jan-2015 11:00 AM EST
Profitable Phishing Schemes Slyly Tinker with Our Heads, Then Rip Us Off
University at Buffalo

University at Buffalo researchers have found evidence that the incredible spread of email phishing scams may be due to phishers’ increased use of “information-rich” emails that alter recipients’ cognitive processes in a way that facilitates their victimization.

Released: 21-Jan-2015 8:00 PM EST
Self-Powered Intelligent Keyboard Could Provide a New Layer of Security
Georgia Institute of Technology

By analyzing such parameters as the force applied by key presses and the time interval between them, a new self-powered non-mechanical intelligent keyboard could provide a stronger layer of security for computer users.

Released: 16-Jan-2015 4:25 PM EST
R&K Cyber Solutions Licenses ORNL Malware Detection Technology
Oak Ridge National Laboratory

Washington, D.C.-based R&K Cyber Solutions LLC (R&K) has licensed Hyperion, a cyber security technology from the Department of Energy's Oak Ridge National Laboratory that can quickly recognize malicious software even if the specific program has not been previously identified as a threat.

Released: 7-Jan-2015 7:00 PM EST
Researchers Work to Counter a New Class of Coffee Shop Hackers
Georgia Institute of Technology

If you’re sitting in a coffee shop, tapping away on your laptop, feeling safe from hackers because you didn’t connect to the shop’s wifi, think again. Hackers may be able to see what you’re doing just by analyzing the low-power electronic signals your laptop emits even when it’s not connected.

Released: 22-Dec-2014 8:00 AM EST
Throwing Money at Data Breach May Make It Worse
University of Arkansas, Fayetteville

Information systems researchers at the U of A studied the effect of two compensation strategies used by Target after a large-scale data breach and found that customers reacted favorably to a 10-percent discount on purchases.

Released: 18-Nov-2014 10:00 AM EST
Cybersecurity Innovation: Securing Your Future
Homeland Security's Science And Technology Directorate

At the 2014 Cyber Security Division (CSD) Research and Development (R&D) Showcase, planned for Dec. 16 at the Mayflower Hotel in Washington D.C., the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) will unveil more than 40 technologies, tools and techniques – developed in response to real world requirements – that will protect and secure our nation and drive the future of cybersecurity.

Released: 13-Nov-2014 12:00 PM EST
Self-Repairing Software Tackles Malware
University of Utah

University of Utah computer scientists have developed software that not only detects and eradicates never-before-seen viruses and other malware, but also automatically repairs damage caused by them. The software then prevents the invader from ever infecting the computer again.

Released: 29-Oct-2014 8:00 AM EDT
Georgia Tech Releases 2015 Emerging Cyber Threats Report
Georgia Institute of Technology

In its latest Emerging Cyber Threats Report, Georgia Tech warns about loss of privacy; abuse of trust between users and machines; attacks against the mobile ecosystem; rogue insiders; and the increasing involvement of cyberspace in nation-state conflicts.

Released: 21-Oct-2014 2:40 PM EDT
“Virtual Internet” Tests Software Solutions for Real World Problems
Homeland Security's Science And Technology Directorate

Developed by the Department of Homeland Security Science and Technology Directorate’s (S&T) Cyber Security Division (CSD), the DETER testbed, described as the “Internet in a box” or a “virtual Internet,” provides a safe and secure option to conduct critical cybersecurity experimentation and testing in the context of complex networks and cyber‐physical systems designed to protect the nation’s critical cyber infrastructure.

Released: 15-Oct-2014 2:00 PM EDT
Undue Influence: How Can We Be Effectively Warned Not to Give Away Our Information Online?
University of Alabama Huntsville

Two University of Alabama in Huntsville (UAH) professors are figuring out the most effective ways we’re influenced to give away personal information online and what warnings would be most effective to get us to stop.

   
Released: 30-Sep-2014 11:00 AM EDT
Johns Hopkins to Co-Host Cyber Security Conference for Top Business Executives
 Johns Hopkins University

Johns Hopkins information security experts have helped organize an upcoming conference to inform top executives about the growing risks of digital break-ins, how to reduce these risks, and how to manage the aftermath of a data breach.

Released: 23-Sep-2014 3:00 PM EDT
U.S. Army Looks to Daphne Yao to Provide a More Secure Cyber Space
Virginia Tech

Virginia Tech computer scientist Daphne Yao’s proposed solutions to prevent insider attacks in the cyber security world will provide a leap forward to stronger Army command and control of cyberspace capabilities on the battlefield as well as in day-to-day operations.

Released: 22-Sep-2014 11:00 AM EDT
Dynamic, Radical Solutions Needed: 2014 NYIT Cybersecurity Conference Highlights
NYIT

Pressing questions fueled lively discussion and much debate during NYIT’s annual cybersecurity conference, at which nearly 250 attendees gathered to gain insights from expert speakers and panelists representing industry, government, and academia.

Released: 10-Sep-2014 7:00 AM EDT
Sandia Cyber-Testing Contributes to DHS Transition to Practice
Sandia National Laboratories

Through the Department of Homeland Security’s Transition to Practice (TTP) program, cybersecurity technologies developed at Sandia National Laboratories — and at other federal labs — now stand a better chance of finding their way into the real world.

Released: 4-Sep-2014 11:00 AM EDT
WUSTL Helps Found Consortium to Advance Internet of the Future
Washington University in St. Louis

Washington University in St. Louis has helped to establish a new consortium of U.S. universities and leading technology companies designed to promote development and adoption of Named Data Networking.

Released: 2-Sep-2014 10:35 AM EDT
Can We Ever Truly Master Password Security? Computer Scientist Weighs In
Georgia State University

A Georgia State University computer scientist says having to remember dozens of account passwords makes password security tricky -- and some of the faults with password security fall upon the operators of websites.

Released: 28-Aug-2014 2:30 PM EDT
UK Information Communication Technology (ICT) Professors Explore Deception in Social Media
University of Kentucky

The explosion of the Internet and social media has literally put the world at our fingertips, revolutionizing the way people connect and share information. However, for all the positives social media provides, it can also open the door to deception, potentially wreaking havoc on people's lives both personally and professionally.

Released: 25-Aug-2014 3:00 PM EDT
New Research Presents an Improved Method to Let Computers Know You Are Human
University of Alabama at Birmingham

UAB researchers are investigating game-based verification that may improve computer security and reduce user frustration compared to typical “type-what-you-see” CAPTCHA tools that use static images.

Released: 19-Aug-2014 3:00 PM EDT
S&T Support of Cyber Competitions Embraces Technology and Cybersecurity
Homeland Security's Science And Technology Directorate

From February through April, the cyber equivalent of the NCAA’s March Madness played out – keystroke by keystroke – at 180 colleges around the nation. The regional champions gathered at the National Collegiate Cybersecurity Defense Competition (NCCDC) in San Antonio Texas. While only one team emerged with the winner’s trophy, everyone walked away with an increased appreciation and understanding of current cybersecurity needs and a preview of emerging technologies. This week, University of Central Florida, this year’s NCCDC winner, will tour the nation’s capital to learn how government agencies like the Department of Homeland Security (DHS) protect the nation from cyber threats.

   
Released: 18-Aug-2014 11:00 AM EDT
New Tool Makes Online Personal Data More Transparent
Columbia University School of Engineering and Applied Science

Roxana Geambasu and Augustin Chaintreau, assistant professors of computer science at Columbia Engineering, have developed XRay, a new tool that reveals which data in a web account, such as emails, searches, or viewed products, are being used to target which outputs, such as ads, recommended products, or prices. They are presenting the prototype, an open source system designed to make the online use of personal data more transparent, at USENIX Security on August 20.

Released: 6-Aug-2014 4:00 PM EDT
Florida State University Offers Faculty Expert on Cybersecurity Threats
Florida State University

Shuyuan Mary Ho, an assistant professor at Florida State University’s School of Information, is available for media questions and analysis on cybersecurity threats, including the recent breach by Russian criminals who stole more than 1.2 billion Internet usernames and passwords.

Released: 24-Jul-2014 3:00 PM EDT
The SWAMP: A Key Resource in Improving Software Assurance Activities
Homeland Security's Science And Technology Directorate

The Software Assurance Market Place, or SWAMP, is an online, open-source, collaborative research environment that allows software developers and researchers to test their software for security weaknesses, improve tools by testing against a wide range of software packages, and interact and exchange best practices to improve software assurance tools and techniques.

Released: 23-Jul-2014 4:00 PM EDT
Is Your Data Safe? Why You Should Care More About Spam
University of Texas at Austin (UT Austin)

Researchers are working to protect consumer data by using companies spam volume to evaluate its security vulnerability through the SpamRankings.net project.



close
1.52333