Breaking News:

Cybersecurity

Add to Favorites | Subscribe | Share

Filters:

  • (Press "esc" to clear)

Science

Channels:

Speeding Recovery From Cyber-Induced Blackouts, Teaching with 'Big Data', Security Breach in 3-D Printing Process, and more in the Cybersecurity News Source

Speeding Recovery From Cyber-Induced Blackouts, Teaching with 'Big Data', Security Breach in 3-D Printing Process, and more in the Newswise Cybersecurity News Source.

Science

Channels:

Energy, Power Grid, Electrical utilities, Superstorm Sandy, Paul Stockton, Johns Hopkins APL, cyber attack, Hacking

How America’s Electric Utilities Can Speed Recovery From Cyber-Induced Blackouts

A new study by Johns Hopkins APL/Dr. Paul Stockton, “Superstorm Sandy: Implications for Designing a Post-Cyber Attack Power Restoration System,” examines the novel challenges of a cyber attack, and explores how utilities can ramp up the progress they are already making against increasingly severe cyber threats.

Science

Channels:

Microorganisms, Cybersecurity, Computational Biology, Machine Learning, Epidemiology, Biostatistics, Geology, Oceanography, Pharmacy, Enginering, Business

University Invests in Faculty and High Performance Computing to Boost Research, Teaching with 'Big Data'

University makes big investment in big data.

Science

Channels:

3-D printing, Mohammad Al Faruque, Cyber Crime, Cyber Security, cyber attack

Bad Vibrations: UCI Researchers Find Security Breach in 3-D Printing Process

With findings that could have been taken from the pages of a spy novel, researchers at the University of California, Irvine have demonstrated that they can purloin intellectual property by recording and processing sounds emitted by a 3-D printer.

Science

Channels:

Computer, Computer Science, Computer Security, IT, It Security, Hacking, Security, Web Browsing, Internet, Online Security, Intel, OpenSSL, Cloud Computing, cloud security, Google, Google Chrome, Firefox, Computer Hackers, computer hacking

New Vulnerability Discovered in Common Online Security

One of the world's most common security software packages – used as the basis of protection for many web browsers – has been found to be vulnerable to a specific form of attack, according to research led by the University of Adelaide.

Life

Law and Public Policy

Channels:

Automated Combat Weapons, Technology, Risks, Cybersecurity

Automated Combat Weapons Carry Cybersecurity Risks

Business

Channels:

Cybersecurity, cyber research, cyber R&D, cyber technology , Malware, malware development

DHS S&T Awards Yale University $1.7M For Data Privacy Research

DHS S&T awarded $1.7 million to Yale University for the development of technology that can help protect the identity and location of individuals against malicious tracking and surveillance.

Science

Channels:

eye recognition, Software, Application, Computer Science, Personal Information, Online, Eye Tracker, eye tracking, Internet, warning system, Warning, Behavioral Change, Psychology

Dynamic Cyber Warning Software Looks Promising

6K7A7704-1.jpg

University of Alabama in Huntsville researchers are seeing potential in a software application that could effectively warn users when they are about to give away sensitive personal information online.

Life

Law and Public Policy

Channels:

Encrypt, Decrypt, Privacy, Iphone, Apple, FBI, San Bernardino, Shooter

Encryption/Decryption Expert on FBI-Apple iPhone Battle

Life

Law and Public Policy

Channels:

Homeland Security, FBI, Apple, Terrorist, San Bernardino

UNH Homeland Security Expert Available to Talk About Apple vs. the FBI

Life

Law and Public Policy

Channels:

BU Researchers Welcome Obama’s Final Budget Proposals

h_butoday_20717897039_dc00c15932_b.jpg

Plan calls for more cancer, cybersecurity, sustainable energy funding in 2017.

Science

Channels:

Computer Security, Authentication, Password, password management , Password Security, Online Security

Is Zero-Effort Computer Security a Dream? Breaking a New User Verification System

unlocking-computer-hands.jpg

Study shows that, although ZEBRA, a system intended to enable prompt and user-friendly deauthentication, works very well with honest people, opportunistic attackers can fool the system.

Life

Law and Public Policy

Channels:

Apple, Iphone, Cybersecurity, San Bernardino, Constitutional Rights, cybersecurity law

Cybersecurity Law Expert Available to Speak on Constitutional Rights Issues Surrounding iPhone Encryption Case

_DSC0009AndrewWoods.jpg

Life

Law and Public Policy

Channels:

Privacy, Security, San Bernardino, Iphone, Apple, Government Regulation, Law Enforcement, product design

Government Powers to Regulate Product Designs Become Complicated When It Comes to the iPhone, Expert Says

8-17-15-TimLyttonheadshot-300x300.png

Life

Law and Public Policy

Channels:

Homeland Security, Danny Davis, Andrew Ross, Ron Sievert, Cyber Security, Terrorism

Texas A&M Cyber Security Experts Available to Comment on Apple-FBI Encryption Battle

Life

Law and Public Policy

Channels:

ransomware, Cyber Security, Cyber Safety, Cybersecurity, maleware, Nova Southeastern University, College of Engineering and Computing, Hollywood Presbyterian Hospital

Ransomware: The New Cyber Threat - Nova Southeastern University Home to Subject Matter Expert

Cannady.JPG

Life

Law and Public Policy

Channels:

Apple, Tim Cook, FBI, Government, Justice Department

When It Comes to Apple vs. FBI, Congress Likely to Step in and Lay Down the Law, UB Cyberlaw Expert Says

Life

Social and Behavioral Sciences

Channels:

Bitcoin, Cyberattack, cyber activity, Cyber Security, Hollywood

Hollywood Hospital Cyberattack Shows Bitcoin Ransoms Are Modern-Day Heists

Life

Business

Social and Behavioral Sciences

Channels:

Cyber Thieves Making Millions in Profits

109071_web.jpg

Cyber thieves who steal credit and debit card numbers are making millions of dollars in profits, fueling a global criminal enterprise marked by the high-profile data breaches of major companies such as Target and Home Depot.

Business

Channels:

Cyber, cyber research, cyber tech, cyber technology , S&T, DHS, Ddos, Software Assurance, cyber solution, mobile solutions, cybersecurity forensics

DHS S&T Hosts Cyber Security Research & Development Showcase

DHS S&T Cyber Security R&D Showcase will provide technology investors, integrators and IT companies info on S&T-funded research and development on technologies, tools and techniques that can strengthen the nation's cyber security posture.







Chat now!