Data Security Expert Says Breaches Call for a Different Approach
Lewis University
On June 9, 2015, the Department of Homeland Security (DHS) Science and Technology (S&T) Directorate will showcase nine cutting-edge cybersecurity technologies at the Santa Clara Marriott in Santa Clara, Calif.
A decoded message from a distant galaxy provided the plans for a Quantum Mechanical 3D printer in Left Brain Games’ puzzle shooter, Dynamakr. Players feed patterns into the machine to create designs for new devices never seen before on Earth—devices so advanced, they’re like magic. Game play allows non-experts to participate in improving software security in Phase 2 of DARPA’s Verigames project.
Trending news releases with the most views in a single day. Topics include: swelling magnets; using genetics to fight dengue fever; cybersecurity; Hubble finds 'Nasty' star; ventilation and patient survival; food security; gamification in business; and cancer research on implants to improve glioma treatment.
The nation’s approach to cyber security has much in common with medieval defense tactics, and that needs to change, says a cyber security expert at Missouri University of Science and Technology.
A legal adviser to whistleblower Edward Snowden is among the many leading contributors to a new free online course being run by the University of Adelaide: Cyberwar, Surveillance and Security.
University of Washington researchers easily hacked a next generation teleoperated surgical robot to test how easily a malicious attack could hijack remotely-controlled operations in the future and to offer security solutions.
A research team at the Georgia Tech Research Institute (GTRI) is studying a range of security challenges involving programmable logic devices – in particular, field programmable gate arrays (FPGAs).
In a first-of-its-kind study, Iowa State University researchers tested brain activity to better understand employees who pose a risk to cybersecurity.
Researchers from Drexel University’s Privacy, Security and Automation Lab are using social network analysis tools to better understand the activity of cybercrime forums. Their findings could guide the next generation of “Untouchables.”
Researcher’s approach allows the phone’s weakest security component — the user — to become its strongest defender.
Smartphones have replaced nearly every conceivable gadget, but UAB computer scientists are teaching them some new tricks. The researchers are adapting accelerometers, GPS chips, gyroscopes and other sensors to make phones that can read a user's mood, eliminate passwords, protect financial transactions and more.
In a new study, 221 college students participated in an online chat room in which they watched a fellow student get “bullied” right before their eyes. Only 10 percent of the students who noticed the abuse directly intervened, either by confronting the bully online or helping the victim.
Hacking is a late-modern transgressive craft, according to the latest research from a Kansas State University criminologist.
Iowa State cyber security experts have developed ISERink (ice rink) as a playground for computer competition, training and research. Thanks to support from the National Science Foundation, the software is now available for free to other schools.
University at Buffalo researchers have found evidence that the incredible spread of email phishing scams may be due to phishers’ increased use of “information-rich” emails that alter recipients’ cognitive processes in a way that facilitates their victimization.
By analyzing such parameters as the force applied by key presses and the time interval between them, a new self-powered non-mechanical intelligent keyboard could provide a stronger layer of security for computer users.
Washington, D.C.-based R&K Cyber Solutions LLC (R&K) has licensed Hyperion, a cyber security technology from the Department of Energy's Oak Ridge National Laboratory that can quickly recognize malicious software even if the specific program has not been previously identified as a threat.
If you’re sitting in a coffee shop, tapping away on your laptop, feeling safe from hackers because you didn’t connect to the shop’s wifi, think again. Hackers may be able to see what you’re doing just by analyzing the low-power electronic signals your laptop emits even when it’s not connected.
Information systems researchers at the U of A studied the effect of two compensation strategies used by Target after a large-scale data breach and found that customers reacted favorably to a 10-percent discount on purchases.
At the 2014 Cyber Security Division (CSD) Research and Development (R&D) Showcase, planned for Dec. 16 at the Mayflower Hotel in Washington D.C., the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) will unveil more than 40 technologies, tools and techniques – developed in response to real world requirements – that will protect and secure our nation and drive the future of cybersecurity.
University of Utah computer scientists have developed software that not only detects and eradicates never-before-seen viruses and other malware, but also automatically repairs damage caused by them. The software then prevents the invader from ever infecting the computer again.
UAB researchers identify problems with secure voice communication over the Internet.
In its latest Emerging Cyber Threats Report, Georgia Tech warns about loss of privacy; abuse of trust between users and machines; attacks against the mobile ecosystem; rogue insiders; and the increasing involvement of cyberspace in nation-state conflicts.
Developed by the Department of Homeland Security Science and Technology Directorate’s (S&T) Cyber Security Division (CSD), the DETER testbed, described as the “Internet in a box” or a “virtual Internet,” provides a safe and secure option to conduct critical cybersecurity experimentation and testing in the context of complex networks and cyber‐physical systems designed to protect the nation’s critical cyber infrastructure.
Two University of Alabama in Huntsville (UAH) professors are figuring out the most effective ways we’re influenced to give away personal information online and what warnings would be most effective to get us to stop.
Johns Hopkins information security experts have helped organize an upcoming conference to inform top executives about the growing risks of digital break-ins, how to reduce these risks, and how to manage the aftermath of a data breach.
Virginia Tech computer scientist Daphne Yao’s proposed solutions to prevent insider attacks in the cyber security world will provide a leap forward to stronger Army command and control of cyberspace capabilities on the battlefield as well as in day-to-day operations.
Pressing questions fueled lively discussion and much debate during NYIT’s annual cybersecurity conference, at which nearly 250 attendees gathered to gain insights from expert speakers and panelists representing industry, government, and academia.
Through the Department of Homeland Security’s Transition to Practice (TTP) program, cybersecurity technologies developed at Sandia National Laboratories — and at other federal labs — now stand a better chance of finding their way into the real world.
Washington University in St. Louis has helped to establish a new consortium of U.S. universities and leading technology companies designed to promote development and adoption of Named Data Networking.
A Georgia State University computer scientist says having to remember dozens of account passwords makes password security tricky -- and some of the faults with password security fall upon the operators of websites.
The explosion of the Internet and social media has literally put the world at our fingertips, revolutionizing the way people connect and share information. However, for all the positives social media provides, it can also open the door to deception, potentially wreaking havoc on people's lives both personally and professionally.
UAB researchers are investigating game-based verification that may improve computer security and reduce user frustration compared to typical “type-what-you-see” CAPTCHA tools that use static images.
From February through April, the cyber equivalent of the NCAA’s March Madness played out – keystroke by keystroke – at 180 colleges around the nation. The regional champions gathered at the National Collegiate Cybersecurity Defense Competition (NCCDC) in San Antonio Texas. While only one team emerged with the winner’s trophy, everyone walked away with an increased appreciation and understanding of current cybersecurity needs and a preview of emerging technologies. This week, University of Central Florida, this year’s NCCDC winner, will tour the nation’s capital to learn how government agencies like the Department of Homeland Security (DHS) protect the nation from cyber threats.
Roxana Geambasu and Augustin Chaintreau, assistant professors of computer science at Columbia Engineering, have developed XRay, a new tool that reveals which data in a web account, such as emails, searches, or viewed products, are being used to target which outputs, such as ads, recommended products, or prices. They are presenting the prototype, an open source system designed to make the online use of personal data more transparent, at USENIX Security on August 20.
Shuyuan Mary Ho, an assistant professor at Florida State University’s School of Information, is available for media questions and analysis on cybersecurity threats, including the recent breach by Russian criminals who stole more than 1.2 billion Internet usernames and passwords.
The Software Assurance Market Place, or SWAMP, is an online, open-source, collaborative research environment that allows software developers and researchers to test their software for security weaknesses, improve tools by testing against a wide range of software packages, and interact and exchange best practices to improve software assurance tools and techniques.
Researchers are working to protect consumer data by using companies spam volume to evaluate its security vulnerability through the SpamRankings.net project.