Breaking News:

Cybersecurity

Add to Favorites | Subscribe | Share

Filters:

  • (Press "esc" to clear)

Science

Channels:

Cybersecurity, Cyber War, cyber attacks, Hacking, network security, National Security, Homeland Security, CyberMaryland, Maryland technology, University Of Maryland

New UMD Cybersecurity Center Stresses ‘More-than-Tech’ Solutions for Government/ Private Sectors

The University of Maryland is launching a new cybersecurity initiative to stimulate public-private partnerships and address national vulnerabilities, including those facing industry. Its new Maryland Cybersecurity Center will stress “more-than-tech” solutions and help connect the dots in the national capital region’s burgeoning cyber sector.

Science

Business

Channels:

Captchas, Pattern Recognition, Cybercrime, Handwriting, machine reading, Computer Science, smart room technologies, Technology, Biometrics, gesture recognition, Computer Security

Tech Solutions Start With Pattern Recognition

Buy something online, enter your credit card number and mailing address. Simple. Then you come to the box with the captcha. You dutifully copy down the warped, watery-looking letters. Incorrect. Another captcha appears. You try again. Also incorrect.

Life

Law and Public Policy

Channels:

cyber attack, Cyberwar, Cyberwarfare, Technology, laws of war, Geneva Conventions, Morality, Databases, Communication Systems, Power Grid, computing infrastructure, International Law, Ethics, Military Operations, Emerging Technologies, cyber infrastructure, rules of warfare

Cyberwars Already Underway with No Geneva Conventions

Cyber attacks of various sorts have been around for decades. University at Buffalo military ethicist Randall R. Dipert says we have good reason to worry, because cyber attacks are almost entirely unaddressed by traditional morality and laws of war.

Science

Channels:

Cyber Security, cyber attack, Information Security, Georgia Tech, Gtisc

Georgia Tech Releases Cyber Threats Forecast for 2011

The Georgia Tech Information Security Center (GTISC) today announced the release of the GTISC Emerging Cyber Threats Report for 2011, outlining the top three areas of security risk and concern for consumer and business Internet and computer users.

Science

Channels:

drive-by download, Spyware, Malicious Software, malicious websites, Antivirus, Countermeasures, Internet, Blade, Malware, Botnets, denial of service

BLADE Software Eliminates “Drive-By Downloads” from Malicious Websites

Researchers have developed a new tool that eliminates drive-by download threats. BLADE is browser-independent and when tested, it blocked all drive-by malware installation attempts from more than 1,900 malicious websites, produced no false positives and required minimal resources from the computer.

Science

Channels:

Cyber, Cybersecurity, cyber technology , Information Security, network security, Information Technology, Systems Engineering, cyber attack, DJC2 , Network-Centric Test and Training System, NETTS, command and control mission assurance, network vulnerability

GTRI Creates Cyber Technology and Information Security Laboratory

wrightrotoloni_R013_hires.jpg

The Georgia Tech Research Institute (GTRI) has created a new Cyber Technology and Information Security Laboratory (CTISL) to apply GTRI’s broad expertise and systems engineering experience in cyber-related research to a wide range of information security issues.

Business

Channels:

Expert Who Helped Track Zeus Botnet Case Is Available for Interviews

Gary Warner, Director of Research in Computer Forensics at UAB, is available to comment on the breaking story about the financial and cyber crimes related to the Zeus botnet.

Science

Channels:

Wikipedia, online information, wikis

Researchers Design Tool to Improve Wikipedia Accuracy

A team of University of Iowa researchers has developed a new tool that detects potential vandalism on Wikipedia and can help improve the accuracy of the online encyclopedia's entries.

Science

Channels:

Smart Grid, Security, Cybersecurity

NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines

NIST has issued its first Guidelines for Smart Grid Cyber Security, including high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for crafting strategies to protect the modernizing power grid from attacks, malicious code, cascading errors and other threats.

Science

Channels:

Internet, social networking data, privacy model

New Model to Help Organize, Keep Private 'Vast Ocean' of Social Network Data

Professors and a Ph.D. student from UALR --the University of Arkansas at Little Rock -- developed a new model to manage the "vast ocean" of data being generated by users of growing social websites. The model allows Internet sites to automatically adjust privacy needs of consumers or organizations to the context in which the data is accessed.







Chat now!