Breaking News: Cybersecurity

Filters close
Released: 17-Jan-2012 9:00 AM EST
Zappos Breach Goes Beyond Credit Cards: Consumers Face Identity Theft if Hackers Correlate Other Penetrated Databases, Says Cornell Expert
Cornell University

Stephen B. Wicker, Cornell professor of Electrical and Computer Engineering at Cornell University, comments on the Zappos web site breach by hackers.

Released: 6-Jan-2012 3:30 PM EST
Professor's Signcryption Technology Tightens Cyber Security
University of North Carolina at Charlotte

UNC Charlotte professor Yuliang Zheng invented the revolutionary new technology and he continues his research in the College of Computing and Informatics. After nearly a three-year process, his research efforts have been formally recognized as an international standard by the International Organization of Standardization (ISO).

Released: 6-Dec-2011 4:05 PM EST
What's In A Name? Homeland Security Develops Domain Name System Security Extensions (DNSSEC)
Homeland Security's Science And Technology Directorate

The Department of Homeland Security's Science and Technology Directorate (S&T) is working to restore trust in the system and make websites more secure and reliable by improving the Internet's Domain Name System(DNS).

Released: 1-Dec-2011 1:35 PM EST
Carrier IQ’s Software ‘Worst Nightmare,’ Says Cornell Smart Phone Security and Privacy Expert
Cornell University

Stephen B. Wicker, Cornell professor of Electrical and Computer Engineering at Cornell University, comments on revelations about secret embedded software on Android, Blackberry and Nokia smart phones that can detect and record keystrokes.

Released: 30-Nov-2011 8:00 AM EST
Some Smartphone Models More Vulnerable To Attack
North Carolina State University

New research from North Carolina State University shows that some smartphones specifically designed to support the Android mobile platform have incorporated additional features that can be used by hackers to bypass Android’s security features, making them more vulnerable to attack.

Released: 28-Nov-2011 8:00 AM EST
Timely Cyber-Monday Tips from Internet Security Analyst
University of Virginia

With the continued growth of online shopping and this year's "Cyber Monday," a University of Virginia expert is available to help your audience or readers keep their computers, their identities and their credit cards safe.

Released: 22-Nov-2011 12:10 PM EST
When Holiday Shopping Online, It’s Buyerbeware.com
Temple University

Online shopping has become so popular that it now accounts for nearly half of all holiday shopping, but even savvy online shoppers should take a few extra moments to ensure their online safety, say Temple University cyber security expert.

Released: 10-Nov-2011 4:40 PM EST
Software Helps FBI Crack International Cybercrime Case
University of Alabama at Birmingham

UAB Spam Data Mine links Internet scam to cybercriminals accused of hacking more than 400 million computers.

Released: 10-Nov-2011 7:00 AM EST
Georgia Tech Helps to Develop System That Will Detect Insider Threats from Massive Data Sets
Georgia Institute of Technology, Research Communications

Researchers at Georgia Tech are developing new approaches for identifying “insider threats” before an incident occurs. They are creating a suite of algorithms that can detect threats by analyzing massive amounts of computer data for unusual activity.

Released: 8-Nov-2011 5:00 PM EST
Story Tips from the Department of Energy’s Oak Ridge National Laboratory, November 2011
Oak Ridge National Laboratory

1) Computer hackers could lose a huge advantage because of a system being developed at ORNL. 2) Solar and wind energy could become more viable because of an innovation that produces a hydrogen stream of greater than 99 percent purity. 3) Something odd happens when you expose the element gadolinium to a strong magnetic field. 4) Carefully combining materials that shrink when heated with materials that expand creates a material unaffected by extreme temperature.

Released: 26-Oct-2011 1:20 PM EDT
Cyber Workshop at Sandia Labs Seeks Potential Responses to Cyberattacks
Sandia National Laboratories

The difficulties of defending utilities, commerce and national security against cyberattack,s and what to do to change that situation, were major themes of a conference at Sandia National Labs.

Released: 26-Oct-2011 11:50 AM EDT
User Resistance to Password Security Explored
Virginia Tech

Though most organizations have policies and guidelines to protect their information systems from unauthorized access, research has shown that employee compliance is often a problem.

Released: 18-Oct-2011 12:50 PM EDT
Georgia Tech Turns iPhone Into spiPhone
Georgia Institute of Technology

A research team led by Patrick Traynor (Computer Science) has discovered how to program a smartphone to sense nearby keyboard vibrations and decipher complete sentences with up to 80 percent accuracy.

Released: 18-Oct-2011 11:50 AM EDT
Deliberations on Cyberattacks Against Libya Raise Legal Questions
Indiana University

The Obama administration's consideration and rejection of cyberattacks against Libya underscore cyberspace's emergence as a military domain but also raise questions about domestic and international law, says an Indiana University cybersecurity expert.

Released: 12-Oct-2011 3:40 PM EDT
Software Keeps Sensitive Data Confined in Physical Space
Virginia Tech

A team of Virginia Tech researchers has created software to remotely put smart phones under lockdown.

Released: 11-Oct-2011 9:00 AM EDT
Georgia Tech Releases Cyber Threats Forecast for 2012
Georgia Institute of Technology

The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, as well as escalating battles over the control of online information that threatens to compromise content and erode public trust and privacy. Those were the findings announced by the Georgia Tech Information Security Center (GTISC) and the Georgia Tech Research Institute (GTRI) in today's release of the Georgia Tech Emerging Cyber Threats Report for 2012.

Released: 28-Sep-2011 4:50 PM EDT
U.Va. Expert Warns of 'Spear-Phishing'
University of Virginia

October is National Cyber Security Awareness Month. Karen McDowell, an information security analyst at the University of Virginia, is available for interviews about cybersecurity in general and about "spear-phishing" in particular.

Released: 14-Sep-2011 11:00 AM EDT
Communications Professor, Broadband Access Expert Provides Internet Privacy Tips
Iowa State University

An Iowa State University communications professor who worked on President Obama's Broadband Technologies Opportunities Program also knows how users can better protect their privacy online.

Released: 31-Aug-2011 12:40 PM EDT
Suspected Attack Highlights 'Mist and Haze' of Cyber War
Indiana University

Media reports on a suspected North Korean cyber attack on South Korean bank reveal confusion and controversy about what such incidents mean in policy and legal terms, an Indiana University expert says.

Released: 10-Aug-2011 12:10 PM EDT
New Anticensorship Scheme Could Make It Impossible to Block Individual Sites
University of Michigan

A radical new approach to thwarting Internet censorship would essentially turn the whole web into a proxy server, making it virtually impossible for a censoring government to block individual sites.

Released: 15-Jul-2011 10:25 AM EDT
Experts Respond to Defense Department Cyber Strategy
Indiana University

Three experts from the Indiana University Center for Applied Cybersecurity Research are available to comment on the Defense Department strategy for responding to cyber attacks, released this week.

Released: 13-Jun-2011 2:40 PM EDT
Engineering Professor Works to Improve Hardware Security
University of Arkansas, Fayetteville

We all rely on integrated circuits in our laptops, desktops and mobile devices to communicate, access information and store data. But what if the circuits in your computer had their own agenda? As Jia Di, associate professor of computer science and computer engineering, explained, hardware designers could easily insert malicious functionalities into their designs.

Released: 2-Jun-2011 12:10 PM EDT
'Act of War' Treatment of Cyber-attacks Fails to Answer Harder Questions
Indiana University

Recent news reports that Pentagon policy will view certain cyber-attacks as acts of war to which the U.S. may respond with conventional military force is unsurprising but avoids hard policy and legal questions, according to Indiana University cybersecurity experts.

Released: 10-May-2011 11:55 AM EDT
Kermit Helps Households Monitor and Manage Their Internet Speed
Georgia Institute of Technology

For years, the relationship between Internet service provider and home user has been a simple, all-you-can-eat model. Now, as the nation’s largest providers prepare to implement usage-based pricing plans, a tool created by Georgia Tech researchers could empower consumers to ensure they are getting the service they are paying for.

Released: 9-May-2011 12:05 PM EDT
National Security Group Recognizes Network Security Product
Virginia Tech

A Virginia Tech team has developed an innovative network security and privacy tool for the new Internet Protocol version 6 (IPv6), an Internet address system that will replace the 20-year-old IPv4.

Released: 5-May-2011 11:30 AM EDT
Cybersleuth Sniffs Out Possible Online Threats in Homage of Osama Bin Laden
University of Alabama at Birmingham

Since Osama Bin Laden's death, Univesity of Alabama at Birmingham's cybersleuth has been reviewing hacker chat rooms and looking for signs of particular threats or hostile response.

Released: 21-Apr-2011 1:15 PM EDT
On iPad and iPhone File Revelations: ‘Most People Don’t Understand That We’re Selling Our Privacy,’ Says Wireless Expert
Cornell University

Stephen B. Wicker, Cornell professor of electrical and computer engineering, talks on recent revelations that files on iPads and iPhones exist that detail where users are geographically and what applications they use,

Released: 20-Apr-2011 3:00 PM EDT
Research Focuses on Information Security
South Dakota State University

Research by a South Dakota State University scientist and his colleagues elsewhere could make it safer to transfer information over mobile devices such as cell phones while conserving battery power. Researcher Wei Wang said those would be among the benefits from using a proposed new selective encryption technique to protect the most important content in streaming video over wireless networks.

Released: 8-Apr-2011 8:00 AM EDT
Georgia Tech Expert Gives Tips on Safeguarding Against Data Theft
Georgia Institute of Technology

Nick Feamster, assistant professor at Georgia Tech's College of Computing and researcher at the Georgia Tech Information Security Center offers his expertise on the Epsilon data breach and what users and custodians can do to protect their data.

Released: 6-Apr-2011 2:45 PM EDT
Off the Hook! Who Gets Phished and Why
University at Buffalo

Communication researchers have found that if you receive a lot of email, habitually respond to a good portion of it, maintain a lot of online relationships and conduct a large number of transactions online, you are more susceptible to email phishing.

   
Released: 5-Apr-2011 6:00 AM EDT
A Case for Network Neutrality: Charging For Fast Content Only Slows It Down
University of California, Berkeley Haas School of Business

As the battle over “network neutrality” continues between supporters and Internet service providers (ISPs), a new study reveals compelling reasons to preserve a free and open world wide web. Economics Professor Benjamin Hermalin, University of California, Berkeley’s Haas School of Business, found that the purported benefits of tiered Internet service don’t materialize because over time, a tiered system slows down overall delivery speed.

Released: 31-Mar-2011 12:10 PM EDT
Amazon, Others Make Fixes After Informaticists Uncover Online Security Flaws, Receive Free Products
Indiana University

Internet security researchers at Indiana University and Microsoft Research have exploited software flaws in leading online stores that use third-party payment services PayPal, Amazon Payments and Google Checkout to receive products for free or at prices far below the advertised purchase price.

Released: 22-Mar-2011 9:00 AM EDT
Google Funds Georgia Tech Internet Transparency Research
Georgia Institute of Technology

Google awards Georgia Tech $1 million to conduct research on Internet transparency.

Released: 7-Mar-2011 3:50 PM EST
More Story Tips From the Department of Energy’s Oak Ridge National Laboratory March 2011
Oak Ridge National Laboratory

Tracking and protecting information stored on an organization’s network could be more secure with a system developed by a team led by Justin Beaver of ORNL’s Computational Sciences and Engineering Division. Electricity generated by the ocean is gaining steam with a demonstration plant off the coast of Kona, Hawaii. Making the most of biomedical imaging data will be a huge focus for dozens of professionals participating in the 3rd Annual Biomedical Science and Engineering Conference March 15-17.

Released: 8-Feb-2011 2:00 PM EST
Biology -- Database a Likely Lifesaver
Oak Ridge National Laboratory

Highly effective anti-virus programs for computers are providing the inspiration for a system to protect people from deadly genetically engineered biological bugs. While the National Cyber Security Division’s US-CERT provides cyber security updates and tools to safeguard computers within federal agencies, industry, state and local governments and the public, no such program exists to protect the public from harmful biological threats. That could change, however, with BioSITES, the vision of Department of Energy Oak Ridge National Laboratory researchers Robert Cottingham and Tom Brettin.

Released: 3-Feb-2011 1:30 PM EST
Doctoral Students Discover, Alert Facebook to Threat Allowing Access to Private Data, Phishing
Indiana University

A Facebook security vulnerability discovered by a pair of doctoral students that allowed malicious websites to uncover a visitor's real name, access private data and post bogus content on their behalf has been repaired, Facebook confirmed.

Released: 20-Jan-2011 9:00 AM EST
National Program Office Planned for Online Trusted Identity Strategy
National Institute of Standards and Technology (NIST)

At a January 7 forum with Silicon Valley business and academic leaders at Stanford University, U.S. Commerce Secretary Gary Locke and White House Cybersecurity Coordinator Howard A. Schmidt announced plans to create a National Program Office to help foster an environment in which sensitive online transactions can be carried out with greater levels of trust.

Released: 6-Jan-2011 9:00 AM EST
IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol
National Institute of Standards and Technology (NIST)

As the day draws nearer for the world to run out of the unique addresses that allow us to use the Internet researchers at NIST have issued a guide for managers, network engineers, transition teams and others to help them deploy the next generation Internet Protocol (IPv6) securely.

Released: 6-Jan-2011 9:00 AM EST
Two Publications Recommend Organization-Wide IT Security Risk Management
National Institute of Standards and Technology (NIST)

Two new draft publications from NIST provide the groundwork for a three-tiered risk-management approach that encompasses computer security risk planning from the highest levels of management to the systems level. The draft documents have been released for public comment.

Released: 6-Jan-2011 8:00 AM EST
And Then There Were Five: Finalists Advance in NIST's SHA-3 Cryptography Competition
National Institute of Standards and Technology (NIST)

Out of the original 64, there now are five candidates left in the ongoing multi-year competition to create the next 'hash' algorithm to protect the integrity of electronic information.

Released: 15-Dec-2010 10:20 AM EST
Wikileaks-Related Attackers Are Not Unruly Mob but Impassioned Actors, Say UAB Experts
University of Alabama at Birmingham

The mob mentality behind the current wave of cyber attacks against various banking, credit and other service-industry websites is not one of frenzy or mass hysteria, according to cybercrime experts at the University of Alabama at Birmingham.

Released: 13-Dec-2010 4:25 PM EST
Expert: Wikileaks Scandal Leads to Fear-Mongering Over Information Security
Washington University in St. Louis

“The recent response of the White House’s Office of Management and Budget (OMB) to the WikiLeaks document dump gives us a peek at the sometimes surreal standards for dealing with classified information and at the fear-mongering in which some government officials are engaging,” says Kathleen Clark, JD, professor of law at Washington University in St. Louis School of Law. Clark teaches and writes about government ethics, national security law, legal ethics and whistleblowing.

Released: 13-Dec-2010 9:00 AM EST
Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS
National Institute of Standards and Technology (NIST)

NIST has joined in a new public-private partnership to spur cybersecurity innovation in the financial services sector.

Released: 10-Dec-2010 4:25 PM EST
Proposed U.S. Legislation and WikiLeaks Attacks Make Case for UMD's Approach to Cybersecurity
University of Maryland, College Park

At UMD’s Maryland Cybersecurity Center launch, U.S. Sen. Ben Cardin proposed major "cybersafety" legislation. Former U.S. Director of National Intelligence Mike McConnell warned of a "catastrophic" cyber event, likely aimed at the computer networks crucial to banking and commerce, power, utility and transportation grids. View it at http://tinyurl.com/2ejeauz.

   
Released: 29-Nov-2010 2:15 PM EST
Shopping Online? U.Va. Expert Has Advice on Internet and Computer Security
University of Virginia

Tipsheet: Shopping Online? With the continued growth of online shopping, and today's "Cyber Monday," Karen McDowell of the University of Virginia is available to help your audience or readers keep their computers, their identities and their credit cards safe.

Released: 29-Nov-2010 1:35 PM EST
Shopping Online? U.Va. Expert Has Cybersecurity Tips
University of Virginia

Tipsheet: Expert can advise readers and audiences on keeping their credit cards, computers and identities safe while cyber-shopping this holiday season.

Released: 23-Nov-2010 3:20 PM EST
5 Must-follow Tips Will Let You Shop Safely Online, UAB Expert Says
University of Alabama at Birmingham

Online shoppers can protect their identities and financial account numbers by following five safety tips this holiday season, says Gary Warner, international cyber-crime consultant and director of research in computer forensics at the University of Alabama at Birmingham College of Arts and Sciences.

Released: 18-Nov-2010 12:40 PM EST
Effort Seeks to Diversify Cyber-Security Field
Missouri University of Science and Technology

In an effort to increase the number of women and minorities in the field of cyber-security, Missouri University of Science and Technology is working with the University of Arkansas at Pine Bluff to develop a new program for undergraduate students.

Released: 29-Oct-2010 7:00 AM EDT
Software to Combat Hacking Technique Wins Award
Virginia Tech

One of the serious threats to a user’s computer is a software program that might cause unwanted keystroke sequences to occur in order to hack someone’s identity. An authentication framework called “Telling Human and Bot Apart” has been developed to combat such attacks.

Released: 22-Oct-2010 1:20 PM EDT
Psychologist Explores Motivations Behind 2007 Cyberattack on Estonia
University of Alabama

In April 2007, the government of Estonia decided to move a statue honoring Russian soldiers who died in World War II out of the capital of Tallinn. Angry ethnic Russians throughout the world launched a cyberattack on the small Baltic nation, crippling its cyber infrastructure for four days. Why did such an attack happen? And can it happen again?



close
1.21231