Breaking News:

Cybersecurity

Add to Favorites | Subscribe | Share

Filters:

  • (Press "esc" to clear)

Life

Law and Public Policy

Channels:

BU Researchers Welcome Obama’s Final Budget Proposals

h_butoday_20717897039_dc00c15932_b.jpg

Plan calls for more cancer, cybersecurity, sustainable energy funding in 2017.

Science

Channels:

Computer Security, Authentication, Password, password management , Password Security, Online Security

Is Zero-Effort Computer Security a Dream? Breaking a New User Verification System

unlocking-computer-hands.jpg

Study shows that, although ZEBRA, a system intended to enable prompt and user-friendly deauthentication, works very well with honest people, opportunistic attackers can fool the system.

Life

Law and Public Policy

Channels:

Apple, Iphone, Cybersecurity, San Bernardino, Constitutional Rights, cybersecurity law

Cybersecurity Law Expert Available to Speak on Constitutional Rights Issues Surrounding iPhone Encryption Case

_DSC0009AndrewWoods.jpg

Life

Law and Public Policy

Channels:

Privacy, Security, San Bernardino, Iphone, Apple, Government Regulation, Law Enforcement, product design

Government Powers to Regulate Product Designs Become Complicated When It Comes to the iPhone, Expert Says

8-17-15-TimLyttonheadshot-300x300.png

Life

Law and Public Policy

Channels:

Homeland Security, Danny Davis, Andrew Ross, Ron Sievert, Cyber Security, Terrorism

Texas A&M Cyber Security Experts Available to Comment on Apple-FBI Encryption Battle

Life

Law and Public Policy

Channels:

ransomware, Cyber Security, Cyber Safety, Cybersecurity, maleware, Nova Southeastern University, College of Engineering and Computing, Hollywood Presbyterian Hospital

Ransomware: The New Cyber Threat - Nova Southeastern University Home to Subject Matter Expert

Cannady.JPG

Life

Law and Public Policy

Channels:

Apple, Tim Cook, FBI, Government, Justice Department

When It Comes to Apple vs. FBI, Congress Likely to Step in and Lay Down the Law, UB Cyberlaw Expert Says

Life

Social and Behavioral Sciences

Channels:

Bitcoin, Cyberattack, cyber activity, Cyber Security, Hollywood

Hollywood Hospital Cyberattack Shows Bitcoin Ransoms Are Modern-Day Heists

Life

Business

Social and Behavioral Sciences

Channels:

Cyber Thieves Making Millions in Profits

109071_web.jpg

Cyber thieves who steal credit and debit card numbers are making millions of dollars in profits, fueling a global criminal enterprise marked by the high-profile data breaches of major companies such as Target and Home Depot.

Business

Channels:

Cyber, cyber research, cyber tech, cyber technology , S&T, DHS, Ddos, Software Assurance, cyber solution, mobile solutions, cybersecurity forensics

DHS S&T Hosts Cyber Security Research & Development Showcase

DHS S&T Cyber Security R&D Showcase will provide technology investors, integrators and IT companies info on S&T-funded research and development on technologies, tools and techniques that can strengthen the nation's cyber security posture.

Business

Channels:

Cyber, Cybersecurity, R&D, Broad Agency Announcement, Innovation, Medical Device, medical device security, Internet of Things, Internet of Everything, networked systems, S&T, DHS

DHS S&T Awards Minneapolis Company $2.2M for Medical Device Cyber Security Research

The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) awarded $2.2 million to Adventium Enterprises of Minneapolis for the development of technology that can help defend medical devices from cyber-attacks.

Business

Channels:

Cyber Security, Software, computational sciences

Hyperion Cyber Security Tech Receives Commercialization Award

HyperionFLC.jpg

The commercial licensing of a cyber security technology developed at the Department of Energy's Oak Ridge National Laboratory has been recognized by the Federal Laboratory Consortium for Technology Transfer (FLC) as a top example of moving technology to the marketplace.

Business

Channels:

DHS Science and Technology Directorate, DHS, Cyber, Cybersecurity, Research & Development, cyber technology , cyber solution, Innovation, Tech Transfer, Cyber Security

Solutions for Cybersecurity Gaps and Challenges -- S&T Has Tech for That!

DHS S&T showcased technologies to private industry cybersecurity investor, integrators and IT professionals and provided live in-depth demonstrations of the technologies.

Business

Channels:

Cybersecurity, Software, Analyst, Disinfectant

PNNL Moves Cybersecurity Software and a Novel Disinfecting System Beyond the Lab

MicroaerosolProductWatertechPHOTOSHOPPEDWhiteBackground.jpg

Software that helps cybersecurity analysts prevent hacks and a microbial disinfecting system that kills with an activated salt spray are two of the latest innovations Pacific Northwest National Laboratory has successfully commercialized with the help of business partners. The Federal Laboratory Consortium has honored the two teams with 2016 Excellence in Technology Transfer awards.

Science

Channels:

Stanford Experts Reveal Latest “Doomsday Clock” Estimate

l1000159.jpg

The world remains perilously close to a nuclear disaster or catastrophic climate change that could devastate humanity, according to Stanford experts and California Governor Jerry Brown, who were on hand to unveil the latest update to the Bulletin of Atomic Scientists’ “doomsday clock” on Tuesday.

Science

Channels:

Cyber Security, power grid security, Computer Engineering

Iowa State Engineers Build Cyber Security Testbed to Help Protect the Power Grid

Govindarasu_Jacobson1000.jpg

Iowa State engineers have built the "PowerCyber" testbed to help researchers, industry engineers and students learn to protect the cyber security of the power grid. The end goal is to help create a future electric power grid that is secure and resilient.

Science

Channels:

Defending Your Computer From Cyber-Attacks, Sun Tzu Style

We want our computers to perform the way we expect. But what if the key to defeating malware is introducing a bit of chaos?

Science

Life

Law and Public Policy

Channels:

Privacy Issues

Better Design Improves Understanding of Online Privacy Notices

privacy-notice_400x225.jpg-min.jpg

Privacy policies for websites, smartphone apps and, especially, components of the emerging Internet of Things are usually ineffective or ignored by users, but Carnegie Mellon University researchers say properly designed privacy notices — pushed out to users at appropriate times — could help remedy that problem.

Science

Channels:

Michigan Tech, Cybersecurity, Ukraine, Power Grid

Cybersecurity Expert on Hacking and Power Grids

ShiyanHu02262015001.jpg

Business

Channels:

Cybersecurity, cyber research, S&T, R&D, Innovation

What Does a Trusted Cyber Future Look Like?

DHS S&T’s Cyber Security Division held both online and in-person discussions around the country to engage a wide range of stakeholders to determine where the division should focus next in cyber security research and development.







Chat now!