Breaking News: Cybersecurity

Filters close
Released: 23-Aug-2013 3:00 PM EDT
Email Privacy a Hallmark of a Free Society
Washington University in St. Louis

As encrypted email services like Lavabit shut their doors, the importance of email privacy becomes even more clear writes Neil Richards, JD, privacy law expert and professor of law at Washington University in St. Louis, in a recent CNN opinion piece. “E-mail privacy matters because our intellectual privacy matters,” he says.

Released: 31-Jul-2013 8:25 AM EDT
Georgia Tech Uncovers iOS Security Weaknesses
Georgia Institute of Technology

Researchers from the Georgia Tech Information Security Center (GTISC) have discovered two security weaknesses that permit installation of malware onto Apple mobile devices using seemingly innocuous applications and peripherals, uncovering significant security threats to the iOS platform.

Released: 24-Jun-2013 5:00 PM EDT
Changing the Way Businesses Defend Against Cyber Attacks
Iowa State University

Hackers have attacked various corporations, but still most organizations do not prioritize cybersecurity as a strategic competency. A group of Iowa State University researchers says it is time for that philosophy to change.

Released: 20-May-2013 11:00 AM EDT
Research Finds New Channels to Trigger Mobile Malware
University of Alabama at Birmingham

Researchers at the University of Alabama at Birmingham (UAB) have uncovered new hard-to-detect methods that criminals may use to trigger mobile device malware that could eventually lead to targeted attacks launched by a large number of infected mobile devices in the same geographical area. Such attacks could be triggered by music, lighting or vibration.

Released: 10-May-2013 4:40 PM EDT
UAB Launches Company to ID Source and Nature of Cyber Threats
University of Alabama at Birmingham

In a private-public partnership, the University of Alabama at Birmingham has launched Malcovery, an intelligence company specializing in cyber threat detection, to help businesses protect themselves from cyberattacks. Malcovery uses patented forensic technology to identify the source and nature of immediate cyberattacks and analyze millions of cyberthreat angles to combat future crises.

Released: 7-May-2013 10:00 AM EDT
Internal Auditors Increasingly Battle Cybersecurity Threat
University of Texas at Dallas

Businesses have a growing need for internal auditors who can size up their data security policies and potential risks, said speakers at the recent UT Dallas Naveen Jindal School of Management’s 8th Annual Fraud Summit.

Released: 4-Apr-2013 1:30 PM EDT
College Students Defend E-Voting Systems Against Hackers In Cyber Competition
Johns Hopkins University Applied Physics Laboratory

College cyber defenders will spend two days protecting a fictitious nation’s electronic voting system against expert computer hackers at the 2013 National CyberWatch Center Mid-Atlantic Regional Collegiate Cyber Defense Competition (CCDC), to be held at the Johns Hopkins University Applied Physics Laboratory (APL).

Released: 14-Mar-2013 6:00 PM EDT
Sandia Cyber Research Lab Formally Opens in Stressful Times
Sandia National Laboratories

Activities at Sandia National Lab's cybercenter are expected to marry Sandia computing expertise with that of universities and businesses to develop unorthodox long-term solutions against the increasingly serious challenges posed by hackers and cybercriminals to individuals, business and government.

Released: 25-Feb-2013 3:45 PM EST
The Real Story of Stuxnet
IEEE Spectrum Magazine

A Moscow-based computer-security firm led the world in tracking down the malware that sabotaged Iran's nuclear-fuel enrichment and inaugurated state-to-state cyberwar.

Released: 15-Feb-2013 11:00 AM EST
Quantum Cryptography Put to Work for Electric Grid Security
Los Alamos National Laboratory

Recently a Los Alamos National Laboratory quantum cryptography (QC) team successfully completed the first-ever demonstration of securing control data for electric grids using quantum cryptography.

Released: 12-Feb-2013 4:25 PM EST
Sandia National Laboratories Researcher Looks for Bad Guys in Cyberspace
Sandia National Laboratories

Sandia National Laboratories computer science researcher Jeremy Wendt wants to figure out how to recognize potential targets of nefarious emails and put them on their guard. The idea is to reduce the number of visitors that cyberanalysts have to check as possible bad guys among the tens of thousands who search Sandia websites each day.

Released: 1-Feb-2013 10:15 AM EST
Computer Security Expert Available for Interviews on Hacker Attacks on The New York Times
 Johns Hopkins University

Johns Hopkins computer security expert Avi Rubin is available for interviews on reports from the New York Times and Wall Street Journal that their computer systems have been targeted by Chinese hackers.

Released: 8-Jan-2013 12:30 PM EST
Researchers Work to Counter Spear Phishing Attacks
Georgia Institute of Technology, Research Communications

Researchers at the Georgia Tech Research Institute (GTRI) are working to counter threats from spear phishing. The attacks use knowledge of computer users to gain their trust to break into corportate networks.

Released: 4-Jan-2013 2:50 PM EST
Computer Scientists Find Vulnerabilities in Cisco VoIP Phones
Columbia University School of Engineering and Applied Science

Columbia Engineering researchers have found vulnerabilities in Cisco VoIP telephones, recently demonstrating how they can insert malicious code into a Cisco VoIP phone (any of the 14 Cisco Unified IP Phone models) and start eavesdropping on private conversations—not just on the phone but also in the phone’s surroundings—from anywhere in the world.

Released: 5-Dec-2012 10:00 AM EST
Mobile Browsers Fail Georgia Tech Safety Test
Georgia Institute of Technology

How unsafe are mobile browsers? Unsafe enough that even cyber-security experts are unable to detect when their smartphone browsers have landed on potentially dangerous websites, according to a recent Georgia Tech study.

Released: 29-Nov-2012 4:40 PM EST
Mimicking Public Health Strategies Could Improve Cyber Security
RTI International

Mimicking public health strategies, such as maintaining good “cyber hygiene,” could improve cyber security, according to a new paper by a team of economists and public health researchers at RTI International.

Released: 20-Nov-2012 5:00 PM EST
Holiday Season and Cybermonday Fast Approaching! Think Before You Click
University of Virginia

Cybercriminals and ordinary hackers are preparing, like bears at a trout stream, to steal our data, money, and identities. Here are some tips from a computer security expert at the University of Virginia.

Released: 16-Nov-2012 11:10 AM EST
Expert: Petraeus Affair Shows Weak Data Privacy Is No Privacy at All
Cornell University

Owen Arden, a graduate researcher in Cornell University’s Department of Computer Science whose research focuses on Internet and mobile data security, comments on the lesson to be learned from the scandal that followed the FBI’s investigation into emails associated with former CIA Director David Petraeus.

Released: 14-Nov-2012 8:00 AM EST
Georgia Tech Releases Cyber Threats Forecast for 2013
Georgia Institute of Technology

The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, escalating battles over the control of online information and continuous threats to the U.S. supply chain from global sources. Those were the findings released by the Georgia Tech Emerging Cyber Threats Report for 2013.

Released: 8-Nov-2012 10:15 AM EST
MSU Security Expert Offers Tips for Avoiding 'Phishing' Scams
Mississippi State University

In every corner of the Internet, high-tech "phishers" are baiting their hooks as the holiday season begins, hoping to lure a prize catch--the account data and personal information of unsuspecting computer-users all across the country.

Released: 2-Nov-2012 2:35 PM EDT
Data Mining a Major Challenge to Personal Privacy
Cornell University

Dawn Woodard, a professor or Operations Research and Information Engineering who teaches courses on data mining, comments on privacy and data brokers in the wake of House and Senate investigations into data brokerage firms.

Released: 31-Oct-2012 8:00 AM EDT
Is Your Utility Meter Getting Personal?
University of South Carolina

As of 2010, more than a third of all utility meters in the United States used wireless automatic meter reading (AMR) technology – 47 million in all. They make it a lot easier for the utility company to gather data on electricity, natural gas and water usage. But as a University of South Carolina research team has shown, it’s possible for their unencrypted broadcasts to be intercepted, giving a sophisticated eavesdropper a window into household activities.

Released: 2-Oct-2012 8:00 AM EDT
Sandia Builds Android-Based Network to Study Cyber Disruptions
Sandia National Laboratories

As part of ongoing research to help prevent and mitigate disruptions to computer networks on the Internet, researchers at Sandia National Laboratories in California have turned their attention to smartphones and other hand-held computing devices.

Released: 20-Sep-2012 9:00 AM EDT
Computers Get a Better Way to Detect Threats
University of Texas at Dallas

UT Dallas computer scientists have developed a technique to automatically allow one computer in a virtual network to monitor another for intrusions, viruses or other kinds of threats.

Released: 14-Sep-2012 7:00 AM EDT
Social Media ‘Narbs’ May Have Predicted Violence in Libya
Wake Forest University

Social media expert Ananda Mitra coined the word "narbs" to describe the small pieces of information floating in the digital sphere. His research shows that using social media to spread hate messages is a trend, not a fad, and that narb patterns may have predicted the violence in Libya.

Released: 11-Sep-2012 5:30 PM EDT
UAB System Improves Mobile Payment Security, Protects Personal Info
University of Alabama at Birmingham

New security mechanism uses proximity-detection approach to prevent “mafia fraud” attacks, theft of financial information.

Released: 11-Sep-2012 2:25 PM EDT
Computer Scientist, Psychologist Look at Developing Visual System to Warn Internet Users of Safety Risks
Kansas State University

Two professors are researching how to help computer users who have little to no computer experience improve their Web browsing safety without security-specific education. The goal is to keep users from making mistakes that could compromise their online security and to inform them when a security failure has happened.

Released: 5-Sep-2012 9:40 AM EDT
Cybersecurity Experts Researching How to Keep Medical Devices Secure, Communicating on Hospital Networks
Kansas State University

Cybersecurity experts are working to keep medical devices — and the patients they help — safe from hackers.

Released: 27-Aug-2012 5:00 PM EDT
Frankenstein Programmers Test a Cybersecurity Monster
University of Texas at Dallas

To catch a thief, you have to think like one. UT Dallas computer scientists are trying to stay one step ahead of cyberattackers by creating their own monster. Their monster can cloak itself as it steals and reconfigures information in a computer program.

Released: 24-Aug-2012 9:00 AM EDT
Sandia Experts, Students Explore Cyber Issues During Weeklong Summer Institute
Sandia National Laboratories

Top graduate students pursuing careers in cybersecurity worked alongside Sandia and other prominent cybersecurity experts in a weeklong summer institute sponsored by Sandia National Laboratories at the Livermore Valley Open Campus. Cyber Security Technology, Policy, Law, and Planning for an Uncertain Future, which followed last year’s institute on energy technology and policy, focused on cyber law, policy, information sharing and other cyber-related issues. Three mentors led the students through a robust series of high-level talks, discussions and workshops from Aug. 5-10.

Released: 26-Jul-2012 2:00 PM EDT
Cell Phone Financial Identity Theft
Wake Forest University

While the cell phone is an amazingly useful device, using it for banking — and consumers are increasingly using mobile phones as banking tools — can lead to identity theft and other financial crimes, if reasonable precautions aren’t taken. “Anyone who has access to your cell phone has access to your identity in a few clicks,” says Elizabeth Baker, an assistant professor at Wake Forest University and an expert in information system security issues.

Released: 24-Jul-2012 3:00 PM EDT
'Control-Alt-Hack' Game Lets Players Try Their Hand at Computer Security
University of Washington

Do you have what it takes to be an ethical hacker? Now you can at least try, no matter what your background, with a new card game developed by University of Washington computer scientists.

Released: 6-Jun-2012 9:00 AM EDT
Cybersecurity Expert Dr. Rob D'Ovidio Available to Comment on National Internet Safety Month this June
Drexel University

During June, National Internet Safety Awareness Month, Drexel University’s Dr. Rob D’Ovidio, associate professor of criminal justice and director of the University’s program in computer crime and digital forensics, is available to comment on online safety, online privacy and a variety of cybercrime issues.

   
Released: 23-May-2012 6:20 PM EDT
Threat Intelligence System Helps Share Malware Data
Georgia Institute of Technology, Research Communications

As malware threats expand and increasingly focus on industrial espionage, Georgia Tech researchers are launching a new weapon to help battle the threats: a malware intelligence system that will help corporate and government security officials share information about the attacks they are fighting.

Released: 22-May-2012 12:50 PM EDT
Law Professor: ‘Devil Is in the Details’ of Cybersecurity Bill
University at Buffalo

The “devil is in the details” of the Cyber Intelligence Sharing and Protection Act (CISPA) pending in the U.S. Congress, says University at Buffalo Associate Professor Mark Bartholomew, an expert in intellectual property and cyber law.

Released: 10-May-2012 10:15 AM EDT
Cybersecurity Experts Begin Investigation on Self-Adapting Computer Network That Defends Itself Against Hackers
Kansas State University

Kansas State University cybersecurity experts are researching the feasibility of building a computer network that could protect itself against online attackers by automatically changing its setup and configuration.

Released: 1-Mar-2012 1:15 PM EST
Cybersecurity Technology, Policy, Law and Planning to Be Focus of Sandia Labs Summer Institute for Top Grad Students
Sandia National Laboratories

Graduate students pursuing careers related to cybersecurity, including specialties in computer science, engineering, law, public policy, economics and social sciences, are being encouraged to apply for Cyber Security Technology, Policy, Law and Planning for an Uncertain Future, a weeklong summer institute at Sandia National Laboratories in Livermore, Calif. The program will take place Aug. 5-10 and is open to U.S. citizens and foreign nationals.

Released: 29-Feb-2012 7:10 AM EST
Privacy Rules: Web Expert Explains New Google Policy
Cornell University

Lee Humphreys, Cornell assistant professor of communication, offers insight into the new privacy rules going into effect on Google websites on March 1, 2012



close
1.28914