Breaking News:

Cybersecurity

Add to Favorites | Subscribe | Share

Filters:

  • (Press "esc" to clear)

Science

Channels:

tech innovations, data, Signcryption, Security

Professor's Signcryption Technology Tightens Cyber Security

UNC Charlotte professor Yuliang Zheng invented the revolutionary new technology and he continues his research in the College of Computing and Informatics. After nearly a three-year process, his research efforts have been formally recognized as an international standard by the International Organization of Standardization (ISO).

Science

Channels:

Science And Technology Directorate, Cyber, cyber attacks, Cyber Security, Domain Names, Inter, Cyberspace

What's In A Name? Homeland Security Develops Domain Name System Security Extensions (DNSSEC)

image001.jpg

The Department of Homeland Security's Science and Technology Directorate (S&T) is working to restore trust in the system and make websites more secure and reliable by improving the Internet's Domain Name System(DNS).

Science

Channels:

Carrier IQ’s Software ‘Worst Nightmare,’ Says Cornell Smart Phone Security and Privacy Expert

Stephen B. Wicker, Cornell professor of Electrical and Computer Engineering at Cornell University, comments on revelations about secret embedded software on Android, Blackberry and Nokia smart phones that can detect and record keystrokes.

Science

Channels:

Android Mobile Platform, Smartphones, Security, Hackers

Some Smartphone Models More Vulnerable To Attack

New research from North Carolina State University shows that some smartphones specifically designed to support the Android mobile platform have incorporated additional features that can be used by hackers to bypass Android’s security features, making them more vulnerable to attack.

Business

Channels:

Cyber Monday, Internet Security, Hacking, Phishing, spear phishing, U.Va., University Of Virginia, Computer Virus

Timely Cyber-Monday Tips from Internet Security Analyst

With the continued growth of online shopping and this year's "Cyber Monday," a University of Virginia expert is available to help your audience or readers keep their computers, their identities and their credit cards safe.

Life

Pop Culture

Channels:

Internet, Online Shopping, Security, Cyber Security, Holidays, Black Friday, Cyber Monday

When Holiday Shopping Online, It’s Buyerbeware.com

Online shopping has become so popular that it now accounts for nearly half of all holiday shopping, but even savvy online shoppers should take a few extra moments to ensure their online safety, say Temple University cyber security expert.

Life

Social and Behavioral Sciences

Channels:

Cyber Crime, Cyber Defense, Spam, Spam Detection, FBI, NASA, Operation Ghost Click

Software Helps FBI Crack International Cybercrime Case

skjellum_warner_sloan.jpg

UAB Spam Data Mine links Internet scam to cybercriminals accused of hacking more than 400 million computers.

Science

Channels:

insider threat, massive data, Anomalies, Algorithms, Anomaly Detection at Multiple Scales, Adams, Darpa, counter-intelligence, Computer, computer activity, high-performance computing , Email, Instant Messaging, file transfer, computer login, cyber activity, Cyber

Georgia Tech Helps to Develop System That Will Detect Insider Threats from Massive Data Sets

adams_R041_hires.jpg

Researchers at Georgia Tech are developing new approaches for identifying “insider threats” before an incident occurs. They are creating a suite of algorithms that can detect threats by analyzing massive amounts of computer data for unusual activity.

Science

Channels:

Cybersecurity, renewable hydrogen, thermal expansion, emmissions control, Ferroelectrics, Biofuels

Story Tips from the Department of Energy’s Oak Ridge National Laboratory, November 2011

1) Computer hackers could lose a huge advantage because of a system being developed at ORNL. 2) Solar and wind energy could become more viable because of an innovation that produces a hydrogen stream of greater than 99 percent purity. 3) Something odd happens when you expose the element gadolinium to a strong magnetic field. 4) Carefully combining materials that shrink when heated with materials that expand creates a material unaffected by extreme temperature.

Science

Channels:

Cyber Workshop at Sandia Labs Seeks Potential Responses to Cyberattacks

The difficulties of defending utilities, commerce and national security against cyberattack,s and what to do to change that situation, were major themes of a conference at Sandia National Labs.







Chat now!