Breaking News:

Cybersecurity

Add to Favorites | Subscribe | Share

Filters:

  • (Press "esc" to clear)

Science

Channels:

ORNL, Oak Ridge National Laboratory, Software, hive, Host Information Value Engine , Electricity, Rankine, Biomedical, Imaging

More Story Tips From the Department of Energy’s Oak Ridge National Laboratory March 2011

Tracking and protecting information stored on an organization’s network could be more secure with a system developed by a team led by Justin Beaver of ORNL’s Computational Sciences and Engineering Division. Electricity generated by the ocean is gaining steam with a demonstration plant off the coast of Kona, Hawaii. Making the most of biomedical imaging data will be a huge focus for dozens of professionals participating in the 3rd Annual Biomedical Science and Engineering Conference March 15-17.

Science

Channels:

ORNL, Oak Ridge National Laboratory, Cyber Security

Biology -- Database a Likely Lifesaver

Highly effective anti-virus programs for computers are providing the inspiration for a system to protect people from deadly genetically engineered biological bugs. While the National Cyber Security Division’s US-CERT provides cyber security updates and tools to safeguard computers within federal agencies, industry, state and local governments and the public, no such program exists to protect the public from harmful biological threats. That could change, however, with BioSITES, the vision of Department of Energy Oak Ridge National Laboratory researchers Robert Cottingham and Tom Brettin.

Science

Channels:

Facebook, Informatics, Computing, malicious websites, Indiana University, School of Informatics and Computing, Rui Wang, Zhou Li, malware vulnerability, Disclosure

Doctoral Students Discover, Alert Facebook to Threat Allowing Access to Private Data, Phishing

WangandLi.jpg

A Facebook security vulnerability discovered by a pair of doctoral students that allowed malicious websites to uncover a visitor's real name, access private data and post bogus content on their behalf has been repaired, Facebook confirmed.

Business

Channels:

It Security, Identity Theft

National Program Office Planned for Online Trusted Identity Strategy

At a January 7 forum with Silicon Valley business and academic leaders at Stanford University, U.S. Commerce Secretary Gary Locke and White House Cybersecurity Coordinator Howard A. Schmidt announced plans to create a National Program Office to help foster an environment in which sensitive online transactions can be carried out with greater levels of trust.

Science

Channels:

IPv6, Computer Security, Internet, Internet Protocol, SP800

IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol

As the day draws nearer for the world to run out of the unique addresses that allow us to use the Internet researchers at NIST have issued a guide for managers, network engineers, transition teams and others to help them deploy the next generation Internet Protocol (IPv6) securely.

Science

Channels:

Risk Management, Risk Management Framework, Computer Security, Cyber Security

Two Publications Recommend Organization-Wide IT Security Risk Management

Two new draft publications from NIST provide the groundwork for a three-tiered risk-management approach that encompasses computer security risk planning from the highest levels of management to the systems level. The draft documents have been released for public comment.

Life

Law and Public Policy

Channels:

Computer Security, hash, Algorithm, SHA-3

And Then There Were Five: Finalists Advance in NIST's SHA-3 Cryptography Competition

Out of the original 64, there now are five candidates left in the ongoing multi-year competition to create the next 'hash' algorithm to protect the integrity of electronic information.

Life

Social and Behavioral Sciences

Channels:

WikiLeaks, Ddos, cyber attacks

Wikileaks-Related Attackers Are Not Unruly Mob but Impassioned Actors, Say UAB Experts

warner_gary-01.jpg

The mob mentality behind the current wave of cyber attacks against various banking, credit and other service-industry websites is not one of frenzy or mass hysteria, according to cybercrime experts at the University of Alabama at Birmingham.

Life

Law and Public Policy

Channels:

WikiLeaks, Information Security, Sensitive Information, Classified Information

Expert: Wikileaks Scandal Leads to Fear-Mongering Over Information Security

“The recent response of the White House’s Office of Management and Budget (OMB) to the WikiLeaks document dump gives us a peek at the sometimes surreal standards for dealing with classified information and at the fear-mongering in which some government officials are engaging,” says Kathleen Clark, JD, professor of law at Washington University in St. Louis School of Law. Clark teaches and writes about government ethics, national security law, legal ethics and whistleblowing.

Business

Channels:

Cybersecurity, Financial services, International Commerce, Health Care, Smart Grid, Computer Security, Electronic Infrastructure, Banking, Banking System, Finance Sector, Identity Management, Critical Infrastructure, cyber infrastructure

Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS

NIST has joined in a new public-private partnership to spur cybersecurity innovation in the financial services sector.







Chat now!