Breaking News: Cybersecurity

Filters close
Released: 23-Nov-2010 3:20 PM EST
5 Must-follow Tips Will Let You Shop Safely Online, UAB Expert Says
University of Alabama at Birmingham

Online shoppers can protect their identities and financial account numbers by following five safety tips this holiday season, says Gary Warner, international cyber-crime consultant and director of research in computer forensics at the University of Alabama at Birmingham College of Arts and Sciences.

Released: 18-Nov-2010 12:40 PM EST
Effort Seeks to Diversify Cyber-Security Field
Missouri University of Science and Technology

In an effort to increase the number of women and minorities in the field of cyber-security, Missouri University of Science and Technology is working with the University of Arkansas at Pine Bluff to develop a new program for undergraduate students.

Released: 29-Oct-2010 7:00 AM EDT
Software to Combat Hacking Technique Wins Award
Virginia Tech

One of the serious threats to a user’s computer is a software program that might cause unwanted keystroke sequences to occur in order to hack someone’s identity. An authentication framework called “Telling Human and Bot Apart” has been developed to combat such attacks.

Released: 22-Oct-2010 1:20 PM EDT
Psychologist Explores Motivations Behind 2007 Cyberattack on Estonia
University of Alabama

In April 2007, the government of Estonia decided to move a statue honoring Russian soldiers who died in World War II out of the capital of Tallinn. Angry ethnic Russians throughout the world launched a cyberattack on the small Baltic nation, crippling its cyber infrastructure for four days. Why did such an attack happen? And can it happen again?

Released: 19-Oct-2010 2:25 PM EDT
New UMD Cybersecurity Center Stresses ‘More-than-Tech’ Solutions for Government/ Private Sectors
University of Maryland, College Park

The University of Maryland is launching a new cybersecurity initiative to stimulate public-private partnerships and address national vulnerabilities, including those facing industry. Its new Maryland Cybersecurity Center will stress “more-than-tech” solutions and help connect the dots in the national capital region’s burgeoning cyber sector.

Released: 14-Oct-2010 3:00 PM EDT
Tech Solutions Start With Pattern Recognition
University at Buffalo

Buy something online, enter your credit card number and mailing address. Simple. Then you come to the box with the captcha. You dutifully copy down the warped, watery-looking letters. Incorrect. Another captcha appears. You try again. Also incorrect.

   
Released: 14-Oct-2010 10:35 AM EDT
Cyberwars Already Underway with No Geneva Conventions
University at Buffalo

Cyber attacks of various sorts have been around for decades. University at Buffalo military ethicist Randall R. Dipert says we have good reason to worry, because cyber attacks are almost entirely unaddressed by traditional morality and laws of war.

6-Oct-2010 8:00 AM EDT
Georgia Tech Releases Cyber Threats Forecast for 2011
Georgia Institute of Technology

The Georgia Tech Information Security Center (GTISC) today announced the release of the GTISC Emerging Cyber Threats Report for 2011, outlining the top three areas of security risk and concern for consumer and business Internet and computer users.

Released: 6-Oct-2010 7:00 AM EDT
BLADE Software Eliminates “Drive-By Downloads” from Malicious Websites
Georgia Institute of Technology, Research Communications

Researchers have developed a new tool that eliminates drive-by download threats. BLADE is browser-independent and when tested, it blocked all drive-by malware installation attempts from more than 1,900 malicious websites, produced no false positives and required minimal resources from the computer.

Released: 4-Oct-2010 11:40 AM EDT
GTRI Creates Cyber Technology and Information Security Laboratory
Georgia Institute of Technology, Research Communications

The Georgia Tech Research Institute (GTRI) has created a new Cyber Technology and Information Security Laboratory (CTISL) to apply GTRI’s broad expertise and systems engineering experience in cyber-related research to a wide range of information security issues.

Released: 4-Oct-2010 8:00 AM EDT
Expert Who Helped Track Zeus Botnet Case Is Available for Interviews
University of Alabama at Birmingham

Gary Warner, Director of Research in Computer Forensics at UAB, is available to comment on the breaking story about the financial and cyber crimes related to the Zeus botnet.

Released: 23-Sep-2010 3:25 PM EDT
Researchers Design Tool to Improve Wikipedia Accuracy
University of Iowa

A team of University of Iowa researchers has developed a new tool that detects potential vandalism on Wikipedia and can help improve the accuracy of the online encyclopedia's entries.

Released: 16-Sep-2010 9:00 AM EDT
NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines
National Institute of Standards and Technology (NIST)

NIST has issued its first Guidelines for Smart Grid Cyber Security, including high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for crafting strategies to protect the modernizing power grid from attacks, malicious code, cascading errors and other threats.

Released: 23-Aug-2010 5:00 PM EDT
New Model to Help Organize, Keep Private 'Vast Ocean' of Social Network Data
University of Arkansas at Little Rock

Professors and a Ph.D. student from UALR --the University of Arkansas at Little Rock -- developed a new model to manage the "vast ocean" of data being generated by users of growing social websites. The model allows Internet sites to automatically adjust privacy needs of consumers or organizations to the context in which the data is accessed.

Released: 4-Aug-2010 9:00 AM EDT
Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation
National Institute of Standards and Technology (NIST)

The Commerce Department has published a Notice of Inquiry on 'Cybersecurity, Innovation, and Internet Policy.' The department seeks comments from all stakeholders, including the commercial, academic and civil society sectors, on measures to improve cyber security while sustaining innovation.

Released: 21-Jul-2010 11:00 PM EDT
Data Mining Made Faster: 'Squashing' Multidimensional Info
University of Utah

To many big companies, you aren’t just a customer, but are described by multiple “dimensions” of information within a computer database. Now, a University of Utah computer scientist has devised a new method for simpler, faster “data mining,” or extracting and analyzing massive amounts of such data.

Released: 19-Jul-2010 1:35 PM EDT
Online Images Can Carry Location Data, Leave Users Vulnerable to “Cybercasing”
International Computer Science Institute

ICSI researchers show how information about where videos and photos were captured can be quickly extracted, leaving those who post images online vulnerable to attacks in the real world.

Released: 7-Jul-2010 8:00 AM EDT
Updated Computer Security Publication Focuses on Security Assessment Plans
National Institute of Standards and Technology (NIST)

NIST has published an updated set of guidelines for developing security assessment plans and associated security control assessment procedures that are consistent with the Federal Information Security Management Act (FISMA).

   
Released: 2-Apr-2010 1:05 PM EDT
Searching for Answers: Ethical Considerations of Google's Presence in China
Saint Joseph's University

When Jim Caccamo, Ph.D., an expert in computing and telecommunications technology ethics, heard of Google’s recent struggles in China, he knew he’d need to update the curriculum for the Technology, Society and Christian Ethics course he teaches at Saint Joseph's University in Philadelphia, Pa. The Internet heavyweight recently rerouted all searches from its heavily censored mainland China search engine to its more open Hong Kong engine in the wake of a massive hack on its system in December, which some have attributed to the Chinese government. “Not a lot happens on the Web in China that the government isn’t aware of, and it’s hard to believe they didn’t know about the hacking that happened over the winter,” said Caccamo, who is an associate professor of theology.

Released: 3-Feb-2010 10:30 AM EST
Cyber Security Expert Available to Discuss New Threat Warnings
University of New Hampshire

Andrew Macpherson, research assistant professor of justice studies at the University of New Hampshire Justiceworks program and director of the Technical Analysis Group, is available to discuss new warnings about the increased threat of cyber attacks.

Released: 25-Jan-2010 11:00 AM EST
Software to Test Cybersecurity Systems for Flaws
Clarkson University

A Clarkson University professor is developing software programs that will test cybersecurity systems for flaws before they become operational. The National Science Foundation is funding the $1.2 million project, which also involves four other research centers.

Released: 21-Jan-2010 11:55 AM EST
Indiana University Expert Available to Discuss Ongoing Impact of Google/China Dispute
Indiana University

International discussion and diplomacy continues in light of Google's announcement last week that it may pull out of China over concerns about censorship and security. Today (Jan. 21). a top Chinese official announced that the threat should not affect China's relations with the United States. Scott Kennedy, director of the Research Center on Chinese Politics and Business and an associate professor of political science and East Asian languages and cultures, is available for comment.

Released: 20-Jan-2010 11:00 AM EST
Cybersecurity Expert Stays Creative Baking Bread
University of Massachusetts Amherst

Is there a recipe a scientist might follow to spur creativity and cook up new discoveries? Cyber security expert Kevin Fu says experimenting with flour, salt and yeast to bake artisanal bread helps him keep creative juices flowing and creates space in which to mull over thorny research problems.



close
1.20227