Breaking News:

Cybersecurity

Add to Favorites | Subscribe | Share

Filters:

  • (Press "esc" to clear)

Science

Channels:

Drone, Cybersecurity, Computer Science, Hacking, Unmanned Aerial Vehicles, Information Security

Johns Hopkins Team Makes Hobby Drones Crash to Expose Design Flaws

New research raises concerns about how easily hackers could take control of flying drones and land or, more drastically, crash them.

Business

Channels:

Cybersecurity, Innovation, BAA, Technology, R&D

DHS to Hold Mobile App Security Research and Development Industry Day

DHS S&T will hold an Industry Day to present information and answer questions regarding Broad Agency Announcement BAA call HSHQDC-16-R-B0006, which solicits proposals for mobile application security research and development.

Science

Channels:

Reduce Cyberslacking and Increase Physical Activity with a Tap, a Click or a Kick

An innovative wearable technology for standing desks that creates a new way of interacting with your computer could reduce cyberslacking and increase healthy movement.

Science

Life

Social and Behavioral Sciences

Channels:

De-Coding the Character of a Hacker

116684_web.jpg

Malicious hacking online costs the private and corporate sectors up to $575 billion annually, according to internet security firm McAfee. While security agencies seek out "ethical" hackers to help combat such attacks, little is known about the personality traits that lead people to pursue and excel at hacking. A recent study published on Frontiers in Human Neuroscience now shows that a characteristic called systemizing provides insight into what makes and motivates a hacker.

Life

Law and Public Policy

Channels:

NATO, cyber attack, War, Warfare, Military, Militarization

Changing Technology Prompts NATO’s Shift on Cyber Warfare

Science

Channels:

semantic gap, promotional infection, semantic inconsistencies, Websites, malicious code, Malware

SEISE Tool Uses Semantic Gaps to Detect Website Promotional Attacks

promo-infection_3289.jpg

By detecting semantic inconsistencies in content, researchers have developed a new technique for identifying promotional infections of websites operated by government and educational organizations.

Life

Education

Channels:

Cybersecurity, Cyber Crime, Cyber Defense, Computer Science, Information Technology, Computer Security Education, NSA, DHS, cyber defense education

NYIT Designated as National Center of Academic Excellence in Cyber Defense Education

Box_20160512_CybersecurityNews_Hero.jpg

The National Security Agency and the Department of Homeland Security have designated New York Institute of Technology as a National Center of Academic Excellence in Cyber Defense Education through academic year 2021. NYIT is the first university on Long Island to receive this designation.

Science

Channels:

Computer, Security, Software, Antivirus, Parental Control, Safety, Online, Internet, Hacking, data safety

Not So Safe: Security Software Can Put Computers at Risk

New research from Concordia University in Montreal shows security software might actually make online computing less safe.

Life

Social and Behavioral Sciences

Channels:

Flash Mobs, Cyber, cyber activity, Army, Air Force, Research, Extremists, Extremism, Online, Arkansas, University of Arkansas at Little Rock

Army Grant Funds Research Into Extremist Flash Mobs

A University of Arkansas at Little Rock researcher is expanding his investigation of extremist cyber flash mobs — particularly those that lead to violent or damaging behavior.

Science

Business

Channels:

Phoney Protection for Passwords

Corporate data breaches seem to be on the rise, rarely a week passes without a company revealing that its database has been hacked and regrettably usernames, passwords, credit card details and its customers' personal information has been leaked on to the open internet. A new protection, nicknamed Phoney, is reported in the International Journal of Embedded Systems.

Medicine

Channels:

Health Care, data, Security, Health care records, ransomware

The Cost of Technology: Electronic Healthcare Records Frequently Targeted by Hackers

Ransoming of health care records not uncommon.

Science

Channels:

Researchers Receive Grant to Improve Security of Online Social Networks

XintaoWu.jpg

University of Arkansas computer science and engineering professor Xintao Wu has received $348,758 from the National Science Foundation to conduct research on detecting fraud and cyberattacks against online social networks.

Science

Business

Channels:

Magnifying Smartphone Screen Apps For Visually Impaired, Online Anti-Bullying Programs, A One Atom Engine and more in the Technology News Source

Magnifying Smartphone Screen Apps For Visually Impaired, Online Anti-Bullying Programs, A One Atom Engine and more in the Technology News Source

Science

Channels:

Cybersecurity, Competition, Argonne National Laboratory

Cyber Defense Competition 2016

Please join us for our inaugural Collegiate Cyber Defense Competition where teams of college students compete to design and defend a mock utility system (power plant) from attack.

Business

Channels:

Prize Competition, prize challenge, DHS, S&T, R&D, NASA, Citizen Science, Crowdsourcing

DHS, NASA Partner in Search of Innovation in Homeland Security

DHS announced today a partnership with the NASA Center of Excellence for Collaborative Innovation (CoECI) to develop new technology solutions through publicly crowdsourced prize competitions.

Business

Channels:

DHS, S&T, R&T, Cyber Security, Risk Analysis, Cybersecurity, cybersecurity technology

DHS S&T Announces New Cybersecurity Risk Analysis Tool on the Commerical Market

RotBand_TTP_5thTransition_PACRAT_April2016.jpg

DHS S&T announced a fifth cybersecurity technology has been licensed for commercialization as a part of the Cyber Security Division’s Transition to Practice program.

Business

Channels:

anti-terrorism, Technology, Certification, SAFETY Act, facebook town hall, DHS, S&T, Innovation, Security, R&D

Is Your Anti-Terrorism Technology SAFETY Act Certified? It Should Be!

The SAFETY Act provide critical incentives for the development and deployment of anti-terrorism technologies by providing liability protections for sellers of "qualified anti-terrorism technologies."

Science

Channels:

advanced persistent threats, Electrical Engineering, Cybersecurity, computer science and engineering

UW-Led Research Team Wins $7.5M MURI Grant to Defend Against Advanced Cyberattacks

A University of Washington-led research team has won a $7.5 million, five-year Multidisciplinary University Research Initiative (MURI) grant from the Department of Defense to better model and mount defenses against stealthy, continuous computer hacking attacks known as "advanced persistent threats."

Business

Channels:

GSA, GSA Schedule 70, GSA schedule, S&T, DHS, mobile performer, mobile app, Cybersecurity

DHS S&T’s Mobile Security Performer to Be First R&D Performer Added to GSA It Schedule 70

Facebook_Mobile_GSAFastLaneProgramPressRelease_April2016.jpg

DHS S&T announced that their first cybersecurity R&D mobile security performer is now available to federal agencies through General Services Administration’s (GSA) IT Schedule 70.

Life

Business

Law and Public Policy

Channels:

Panama Papers, Tax havens

Panama Papers Show Billions of Dollars Stashed Away by the Wealthy Elite, Including Several World Leaders; Experts Needed

Experts needed to explain which countries provide tax havens and do not comply with international regulations. How did investigative journalists examine the millions of files from the Panama law firm Mossack Fonseca and trace them back to prominent world leaders?







Chat now!