Breaking News: Cybersecurity

Filters close
Released: 3-Apr-2017 1:05 PM EDT
Google's AI Tool for Video Searches Can Be Easily Deceived
University of Washington

University of Washington security researchers have shown that Google’s new tool that uses machine learning to automatically analyze and label video content can be deceived by inserting a photograph periodically into videos. After they inserted an image of a car into a video about animals, for instance, the system thought the video was about an Audi.

Released: 3-Apr-2017 12:05 PM EDT
Risk of Data Breaches at Hospitals Is Greater at Larger Facilities and Those with Major Teaching Mission
Johns Hopkins University Carey Business School

The risk of data breaches at U.S. hospitals is associated with larger facilities and hospitals that have a major teaching mission, according to a study published online today by JAMA Internal Medicine.

28-Mar-2017 4:15 PM EDT
Android Apps Can Conspire to Mine Information From Your Smartphone
Virginia Tech

Virginia Tech researchers have recently discovered that the same apps we use on our phones to organize lunch dates, make online purchases, and communicate the most intimate details of our existence have secretly been colluding to mine our information.

     
Released: 29-Mar-2017 10:05 AM EDT
Making America’s Power Grid Much, Much Smarter
Vanderbilt University

A new, open-source software platform has been designed to support applications required to create a smart power grid and protect it from dangers ranging from terrorists to falling tree limbs.

Released: 21-Mar-2017 11:05 AM EDT
New Brain-Inspired Cybersecurity System Detects ‘Bad Apples’ 100 Times Faster
Sandia National Laboratories

The Neuromorphic Cyber Microscope can look for the complex patterns that indicate specific “bad apples,” all while using less electricity than a standard 60-watt light bulb, due to its brain-inspired design.

Released: 17-Mar-2017 2:05 PM EDT
Arkansas Professor and Student to Lead NATO Training Course on Social Media Analysis
University of Arkansas at Little Rock

Dr. Nitin Agarwal, Jerry L. Maulden-Entergy chair and professor of information science at the University of Arkansas at Little Rock, and his doctoral student, Nihal Hussain, will conduct a four-day social media analysis training course for NATO Strategic Communications Center of Excellence (STRATCOM COE) at the Latvian Defense Academy March 21-24.

Released: 14-Mar-2017 11:05 AM EDT
Research Examines Susceptibility to Cyberattacks Through Brain Activity, Eye Gaze
University of Alabama at Birmingham

UAB doctoral student Ajaya Neupane awarded highly competitive $50,000 fellowship to continue research using neuroimaging devices to examine internet users’ susceptibility to cyberattacks.

Released: 8-Mar-2017 6:05 PM EST
Experts to Discuss Trolls, Bots, and Fake News at South Big Data Hub Roundtable
University of Arkansas at Little Rock

Four experts will participate in a roundtable discussion that will be broadcast as a free webcast on March 9 and explore how trolls, bots, and fake news are shaping conversations and shifting public discourse in an online environment.

Released: 8-Mar-2017 11:05 AM EST
Using Game Theory to Predict Cyberattacks on Elections and Voting Machines
Vanderbilt University

America’s president isn’t the only one considering the possibility of rigged elections. Vanderbilt University’s Yevgeniy Vorobeychik, assistant professor of computer science and computer engineering, spent much of last year researching how and why someone would want to tamper with an election and then developing an algorithm to protect against those efforts.

Released: 7-Mar-2017 4:05 AM EST
Cyberbullying Rarely Occurs in Isolation, Research Finds
University of Warwick

Cyberbullying is mostly an extension of playground bullying – and doesn’t create large numbers of new victims - according to research from the University of Warwick.

Released: 2-Mar-2017 9:05 AM EST
Story Tips From the Department of Energy’s Oak Ridge National Laboratory, March 2017
Oak Ridge National Laboratory

Rapid prototyping aids small manufacturer; accelerated method could separate CO2 from flue gases; EBM technique controls microstructure, locates properties in 3-D printed parts; open-source, user-friendly software monitors, controls energy use; drones to aid electric utilities to enhance safety, system reliability; ORNL cyberspace conf.

Released: 28-Feb-2017 4:05 PM EST
DHS S&T Welcomes First Canadian Exchange Officer
Homeland Security's Science And Technology Directorate

DHS S&T welcomed its first Canadian Exchange Officer today as part of a partnership with Defence Research and Development Canada’s Centre for Security Science.

Released: 28-Feb-2017 12:05 PM EST
UW Security Researchers Show That Google’s AI Platform for Defeating Internet Trolls Can Be Easily Deceived
University of Washington

University of Washington researchers have shown that Google’s new machine learning-based system to identify toxic comments in online discussion forums can be bypassed by simply misspelling or adding unnecessary punctuation to abusive words, such as “idiot” or “moron.”



close
2.10202