Breaking News:

Cybersecurity

Add to Favorites | Subscribe | Share

Filters:

  • (Press "esc" to clear)

Life

Social and Behavioral Sciences

Channels:

Cyberbullying Expert Provides Important Tips to Stay Safe

Hinduja-FAU-2015.jpg

Although most children use their smartphones and social media apps in appropriate ways, about 25 percent will experience online bullying at some point.

Science

Channels:

Professor Shows Brain Waves Can Be Used to Detect Potentially Harmful Personal Information

Texas Tech researcher Abdul Serwadda is working to advance research to develop secure user authentication methods.

Science

Business

Channels:

Cyber, Cyber Security, Cybersecurity, cyber research, cyber activity, SBIR, Research, S&T, DHS, R&D, Science And Technology Directorate

Small Businesses Show Off Tech Solutions at Small Business Innovative Workshop

Government, private-sector integrators and investment firms were invited to see a variety of novel technologies available for operational use during the event.

Life

Education

Channels:

cyber breaches, Cybersecurity, cyber defense education , cyber attacks, cyber crimes, Higher Ed

NYIT Conference Discusses Digital Intrusions, Countermeasures, and the Cost of Cybercrime

cyber_200_2014.png

Planes, Trains, and Election Results: NYIT's Annual Cybersecurity Conference Discusses Digital Intrusions, Countermeasures, and the Cost of Cybercrime

Science

Channels:

Chemistry & Materials, Cyber, Chemistry, Hispanic, Diversity, stem, material sciences, Material Science, engineeering, Computer Science, Cybersecurity

Paving the Way: Sandia Researchers Earn Top Hispanic Science and Engineering Honors

Bernadette.jpg

The technical achievements of two Sandia National Laboratories innovators will be recognized with 2016 Hispanic Engineer National Achievement Awards Conference (HENAAC) Awards from Great Minds in STEM, an organization supporting careers in science, technology, engineering and math.

Science

Channels:

Cybersecurity, on-body transmissions , Computer Science

Secure Passwords Can Be Sent Through Your Body, Instead of Air

OnBodyphoneandsmartlocksystem.jpg

University of Washington engineers have devised a way to send secure passwords through the human body using smartphone fingerprint sensors and laptop touchpads -- rather than over the air where they're vulnerable to hacking.

Science

Business

Channels:

Research, Research & Development, Research & Technology , Technology, Health, Business, University, Innovation, Healthcare, Bioinformatics, Cybersecurity

Nova Southeastern University Opens New Center for Collaborative Research

CCRPhoto.jpg

Nova Southeastern University (NSU) officially opened its Center for Collaborative Research (CCR), one of the largest and most advanced research facilities in Florida. As part of the ceremony, which was held September 21, NSU announced a gift from AutoNation to name NSU’s AutoNation Institute for Breast and Solid Tumor Cancer Research, located within the CCR. The Institute is focused on developing and advancing improved methods of prevention and treatment to ultimately eradicate cancer. The gift to name NSU’s AutoNation Institute brings the company’s cumulative giving to NSU to more than $10 million.

Medicine

Channels:

Cybersecurity, American Univerity, Raytheon, NIST

AU’s Kogod Cybersecurity Governance Center Hosting U.S. Cybersecurity Commission’s September Hearing

The National Institute of Science and Technology (NIST) is holding a field hearing on cybersecurity at American University and hosted by AU's Kogod Cybersecurity Governance Center.

Science

Channels:

3-D printing, Smartphone, Intellectual Property, hack, Security, Electromagnetic, Acoustic, cyber attack, Aerospace, Medical Device, Cybersecurity

Smartphone Hacks 3-D Printer by Measuring ‘Leaked’ Energy and Acoustic Waves

smartphone-3Dprinter.png

University at Buffalo researchers illustrate how smartphones, due to their ubiquity and sophisticated gadgetry, can easily hack 3-D printers by measuring ‘leaked’ energy and acoustic waves that emanate from the printers. The work is eye-opening because it shows how anyone with a smartphone — from a disgruntled employee to an industrial spy — might steal intellectual property from an unsuspecting business.

Business

Channels:

Cybersecurity, Cybersecurity Job Market, Hiring Outlook, job opportunities , Cybersecurity Job Opportunities, Job Economy, Technology Job Market, Engineering Job Market

Cyber Skills in High Demand Well Into the Future

The cybersecurity job market is wide open. "We're gong to need as many people as possible to 'hit the ground running' to meet the demand, says IT careers analyst.

Science

Channels:

Advanced Manufacturing, Cybersecurity, Robotics

Detecting and Correcting Factory Faults, Cyberattacks in Real Time

Spotting a glitch on the factory floor in real time—and reconfiguring around it—are the goals of a new $4 million project led by University of Michigan engineering researchers.

Science

Channels:

HFES Annual Meeting Presentations to Focus on Human Factors in Cyber Security

Papers and panels will address human-centered issues in cyber operations, including situation awareness, vigilance, task-switching, and training.

Science

Life

Social and Behavioral Sciences

Channels:

Cyber Security, Cyber Threats, election 2016, Technology, voter registration

Voter Confidence Will Dwindle if Russian Cyber Threats Continue

Life

Social and Behavioral Sciences

Channels:

G20, China, World Economy, Climate Change, Turkey, South China Sea, Cyber Crime, Russia, UKRAINIAN CRISIS, Chinese Business

University of Michigan experts can discuss various topics related to the G20 Hangzhou Summit, including the world economy, climate change, cyber crime

.

Science

Channels:

Cybersecurity, Internet Security, cyber attacks, cyber breaches, Computer Science, computer science education, homeland security challenges

Missouri S&T Expert to Present at Governor’s Cybersecurity Summit

A computer science professor from Missouri University of Science and Technology will join top government hackers, corporate risk managers and information technology professionals at the inaugural Governor’s Cybersecurity Summit this week in Jefferson City, Missouri.

Science

Channels:

Higher Education, Cybersecurity, cyber attack, cyber breaches, Hacking, Cybersecurity and Innovatoin, Cybersecurity Awareness, National Science Foundation, Cybersecurity Education, Smart Cars

Cybersecurity Student Researches How to Keep Cars Safe From Hacking

UALRCyberSAFEparticipants.JPG

Zachary King spent the summer researching how to keep cars safe from cyberattacks during an intensive eight-week cybersecurity summer research program at the University of Arkansas at Little Rock.

Life

Law and Public Policy

Channels:

Cyber Security

University of Minnesota Technological Leadership Institute to Host the Commission on Enhancing National Cybersecurity

DoC-and-TLI-Page-Headers480.jpg

On Tuesday, August 23, 2016, the University of Minnesota Technological Leadership Institute (TLI) will host an open meeting of the U.S. Commission on Enhancing National Cybersecurity. The University of Minnesota is one of just five locations where the Commission is hosting meetings.

Business

Channels:

Hiring Outlook, Asia-Pacific Hiring Outlook, Asia-Pacific Job Outlook, APAC Job Outlook, job outlook, APAC Hiring Outlook

Developers, Skill Upgrade Programs, Boost Asia Pacific Tech Jobs Outlook

There are plenty of tech jobs in the Asia-Pacific, but the mismatch and shortage of engineering talent in much of the region has resulted in more companies creating programs aimed at upgrading the skills of engineers.

Science

Channels:

computer science and engineering, Electrical Engineering/Electronics, Internet, Research & Development, Software Engineering, technology and engineering, Telecommunication

Researchers Map Netflix's Content Delivery Network for the First Time

Scientists at Queen Mary University of London (QMUL) have revealed the network infrastructure used by Netflix for its content delivery, by mimicking the film request process from all over the world and analysing the responses.

Science

Channels:

Web, Internet, web tracking, Web Security, Internet Security, Internet privacy, Computer Science, History

Unearthing trackers of the past: UW computer scientists reveal the history of third-party web tracking

At the USENIX Security Conference in Austin, Texas, a team of University of Washington researchers on Aug. 12 presented the first-ever comprehensive analysis of third-party web tracking across three decades and a new tool, TrackingExcavator, which they developed to extract and analyze tracking behaviors on a given web page. They saw a four-fold increase in third-party tracking on top sites from 1996 to 2016, and mapped the growing complexity of trackers stretching back decades.







Chat now!