UNC Charlotte professor Yuliang Zheng invented the revolutionary new technology and he continues his research in the College of Computing and Informatics. After nearly a three-year process, his research efforts have been formally recognized as an international standard by the International Organization of Standardization (ISO).
The Department of Homeland Security's Science and Technology Directorate (S&T) is working to restore trust in the system and make websites more secure and reliable by improving the Internet's Domain Name System(DNS).
Stephen B. Wicker, Cornell professor of Electrical and Computer Engineering at Cornell University, comments on revelations about secret embedded software on Android, Blackberry and Nokia smart phones that can detect and record keystrokes.
New research from North Carolina State University shows that some smartphones specifically designed to support the Android mobile platform have incorporated additional features that can be used by hackers to bypass Android’s security features, making them more vulnerable to attack.
With the continued growth of online shopping and this year's "Cyber Monday," a University of Virginia expert is available to help your audience or readers keep their computers, their identities and their credit cards safe.
Online shopping has become so popular that it now accounts for nearly half of all holiday shopping, but even savvy online shoppers should take a few extra moments to ensure their online safety, say Temple University cyber security expert.
Researchers at Georgia Tech are developing new approaches for identifying “insider threats” before an incident occurs. They are creating a suite of algorithms that can detect threats by analyzing massive amounts of computer data for unusual activity.
1) Computer hackers could lose a huge advantage because of a system being developed at ORNL. 2) Solar and wind energy could become more viable because of an innovation that produces a hydrogen stream of greater than 99 percent purity. 3) Something odd happens when you expose the element gadolinium to a strong magnetic field. 4) Carefully combining materials that shrink when heated with materials that expand creates a material unaffected by extreme temperature.
The difficulties of defending utilities, commerce and national security against cyberattack,s and what to do to change that situation, were major themes of a conference at Sandia National Labs.
Though most organizations have policies and guidelines to protect their information systems from unauthorized access, research has shown that employee compliance is often a problem.
A research team led by Patrick Traynor (Computer Science) has discovered how to program a smartphone to sense nearby keyboard vibrations and decipher complete sentences with up to 80 percent accuracy.
The Obama administration's consideration and rejection of cyberattacks against Libya underscore cyberspace's emergence as a military domain but also raise questions about domestic and international law, says an Indiana University cybersecurity expert.
The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, as well as escalating battles over the control of online information that threatens to compromise content and erode public trust and privacy. Those were the findings announced by the Georgia Tech Information Security Center (GTISC) and the Georgia Tech Research Institute (GTRI) in today's release of the Georgia Tech Emerging Cyber Threats Report for 2012.
October is National Cyber Security Awareness Month. Karen McDowell, an information security analyst at the University of Virginia, is available for interviews about cybersecurity in general and about "spear-phishing" in particular.
An Iowa State University communications professor who worked on President Obama's Broadband Technologies Opportunities Program also knows how users can better protect their privacy online.
Media reports on a suspected North Korean cyber attack on South Korean bank reveal confusion and controversy about what such incidents mean in policy and legal terms, an Indiana University expert says.
A radical new approach to thwarting Internet censorship would essentially turn the whole web into a proxy server, making it virtually impossible for a censoring government to block individual sites.
Three experts from the Indiana University Center for Applied Cybersecurity Research are available to comment on the Defense Department strategy for responding to cyber attacks, released this week.
We all rely on integrated circuits in our laptops, desktops and mobile devices to communicate, access information and store data. But what if the circuits in your computer had their own agenda? As Jia Di, associate professor of computer science and computer engineering, explained, hardware designers could easily insert malicious functionalities into their designs.
Recent news reports that Pentagon policy will view certain cyber-attacks as acts of war to which the U.S. may respond with conventional military force is unsurprising but avoids hard policy and legal questions, according to Indiana University cybersecurity experts.
For years, the relationship between Internet service provider and home user has been a simple, all-you-can-eat model. Now, as the nation’s largest providers prepare to implement usage-based pricing plans, a tool created by Georgia Tech researchers could empower consumers to ensure they are getting the service they are paying for.
A Virginia Tech team has developed an innovative network security and privacy tool for the new Internet Protocol version 6 (IPv6), an Internet address system that will replace the 20-year-old IPv4.
Since Osama Bin Laden's death, Univesity of Alabama at Birmingham's cybersleuth has been reviewing hacker chat rooms and looking for signs of particular threats or hostile response.
Stephen B. Wicker, Cornell professor of electrical and computer engineering, talks on recent revelations that files on iPads and iPhones exist that detail where users are geographically and what applications they use,
Research by a South Dakota State University scientist and his colleagues elsewhere could make it safer to transfer information over mobile devices such as cell phones while conserving battery power. Researcher Wei Wang said those would be among the benefits from using a proposed new selective encryption technique to protect the most important content in streaming video over wireless networks.
Nick Feamster, assistant professor at Georgia Tech's College of Computing and researcher at the Georgia Tech Information Security Center offers his expertise on the Epsilon data breach and what users and custodians can do to protect their data.
Communication researchers have found that if you receive a lot of email, habitually respond to a good portion of it, maintain a lot of online relationships and conduct a large number of transactions online, you are more susceptible to email phishing.
As the battle over “network neutrality” continues between supporters and Internet service providers (ISPs), a new study reveals compelling reasons to preserve a free and open world wide web. Economics Professor Benjamin Hermalin, University of California, Berkeley’s Haas School of Business, found that the purported benefits of tiered Internet service don’t materialize because over time, a tiered system slows down overall delivery speed.
Internet security researchers at Indiana University and Microsoft Research have exploited software flaws in leading online stores that use third-party payment services PayPal, Amazon Payments and Google Checkout to receive products for free or at prices far below the advertised purchase price.
Tracking and protecting information stored on an organization’s network could be more secure with a system developed by a team led by Justin Beaver of ORNL’s Computational Sciences and Engineering Division. Electricity generated by the ocean is gaining steam with a demonstration plant off the coast of Kona, Hawaii. Making the most of biomedical imaging data will be a huge focus for dozens of professionals participating in the 3rd Annual Biomedical Science and Engineering Conference March 15-17.
Highly effective anti-virus programs for computers are providing the inspiration for a system to protect people from deadly genetically engineered biological bugs. While the National Cyber Security Division’s US-CERT provides cyber security updates and tools to safeguard computers within federal agencies, industry, state and local governments and the public, no such program exists to protect the public from harmful biological threats. That could change, however, with BioSITES, the vision of Department of Energy Oak Ridge National Laboratory researchers Robert Cottingham and Tom Brettin.
A Facebook security vulnerability discovered by a pair of doctoral students that allowed malicious websites to uncover a visitor's real name, access private data and post bogus content on their behalf has been repaired, Facebook confirmed.
At a January 7 forum with Silicon Valley business and academic leaders at Stanford University, U.S. Commerce Secretary Gary Locke and White House Cybersecurity Coordinator Howard A. Schmidt announced plans to create a National Program Office to help foster an environment in which sensitive online transactions can be carried out with greater levels of trust.
As the day draws nearer for the world to run out of the unique addresses that allow us to use the Internet researchers at NIST have issued a guide for managers, network engineers, transition teams and others to help them deploy the next generation Internet Protocol (IPv6) securely.
Two new draft publications from NIST provide the groundwork for a three-tiered risk-management approach that encompasses computer security risk planning from the highest levels of management to the systems level. The draft documents have been released for public comment.
Out of the original 64, there now are five candidates left in the ongoing multi-year competition to create the next 'hash' algorithm to protect the integrity of electronic information.
The mob mentality behind the current wave of cyber attacks against various banking, credit and other service-industry websites is not one of frenzy or mass hysteria, according to cybercrime experts at the University of Alabama at Birmingham.
“The recent response of the White House’s Office of Management and Budget (OMB) to the WikiLeaks document dump gives us a peek at the sometimes surreal standards for dealing with classified information and at the fear-mongering in which some government officials are engaging,” says Kathleen Clark, JD, professor of law at Washington University in St. Louis School of Law. Clark teaches and writes about government ethics, national security law, legal ethics and whistleblowing.
At UMD’s Maryland Cybersecurity Center launch, U.S. Sen. Ben Cardin proposed major "cybersafety" legislation. Former U.S. Director of National Intelligence Mike McConnell warned of a "catastrophic" cyber event, likely aimed at the computer networks crucial to banking and commerce, power, utility and transportation grids. View it at http://tinyurl.com/2ejeauz.
Tipsheet: Shopping Online? With the continued growth of online shopping, and today's "Cyber Monday," Karen McDowell of the University of Virginia is available to help your audience or readers keep their computers, their identities and their credit cards safe.
Tipsheet: Expert can advise readers and audiences on keeping their credit cards, computers and identities safe while cyber-shopping this holiday season.
Online shoppers can protect their identities and financial account numbers by following five safety tips this holiday season, says Gary Warner, international cyber-crime consultant and director of research in computer forensics at the University of Alabama at Birmingham College of Arts and Sciences.
In an effort to increase the number of women and minorities in the field of cyber-security, Missouri University of Science and Technology is working with the University of Arkansas at Pine Bluff to develop a new program for undergraduate students.
One of the serious threats to a user’s computer is a software program that might cause unwanted keystroke sequences to occur in order to hack someone’s identity. An authentication framework called “Telling Human and Bot Apart” has been developed to combat such attacks.
In April 2007, the government of Estonia decided to move a statue honoring Russian soldiers who died in World War II out of the capital of Tallinn. Angry ethnic Russians throughout the world launched a cyberattack on the small Baltic nation, crippling its cyber infrastructure for four days. Why did such an attack happen? And can it happen again?