Breaking News: Cybersecurity

Filters close
Released: 14-Jan-2016 12:05 PM EST
What Does a Trusted Cyber Future Look Like?
Homeland Security's Science And Technology Directorate

DHS S&T’s Cyber Security Division held both online and in-person discussions around the country to engage a wide range of stakeholders to determine where the division should focus next in cyber security research and development.

Released: 9-Dec-2015 12:05 PM EST
DHS S&T Awards $7.8 Million for Cyber Physical System Security Research
Homeland Security's Science And Technology Directorate

The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) today announced the award of five contracts totaling $7.8 million for research on technologies to help defend against attacks on cyber physical systems.

Released: 17-Nov-2015 10:05 AM EST
Managing the Data Deluge for National Security Analysts
Sandia National Laboratories

National security analysts often find that available data is growing much faster than analysts’ ability to observe and process it. Sometimes they can’t make key connections and often they are overwhelmed struggling to use data for predictions and forensics. Sandia National Laboratories’ Pattern Analytics to Support High-Performance Exploitation and Reasoning (PANTHER) team has developed solutions that will enable analysts to work smarter, faster and more effectively when looking at huge, complex amounts of data in real-time, stressful environments where the consequences might be life or death.

Released: 16-Nov-2015 5:05 PM EST
Pacific Northwest National Laboratory Scientists Win Five R&D 100 Awards
Pacific Northwest National Laboratory

Technologies that impact cyber security, increase our ability to detect trace amounts of chemicals, convert sewage into fuel, view energy processes under real-world conditions and forecast future electric needs are among the newest R&D 100 award winners at Pacific Northwest National Laboratory.

Released: 11-Nov-2015 11:05 AM EST
Focusing on User Habits Key to Preventing Email Phishing, According to UB Research
University at Buffalo

The cumulative number of successful phishing cyberattacks has risen sharply over the last decade, and in 2014 that figure surged past the total U.S. population, according to a University at Buffalo expert in cyber deception.

Released: 5-Nov-2015 10:05 AM EST
Shields Up: Colorado State Researchers Are Making the Internet More Secure
Colorado State University

A Colorado State University-led team is developing a service that can sniff out, ward off and protect against large-scale online attacks known as Distributed Denial of Service, or DDoS, attacks.

Released: 5-Nov-2015 9:05 AM EST
Your Printer Just Got a Little More Secure
Homeland Security's Science And Technology Directorate

Hewlett-Packard (HP) recently licensed one-of-a-kind technology – called Symbiote – from Red Balloon Security, to protect its printers from cyber attacks.

Released: 23-Oct-2015 12:05 PM EDT
UAB Research Studies Cyberattacks Through the Lens of EEG and Eye Tracking
University of Alabama at Birmingham

Computer & Information Sciences researchers tested users’ abilities to detect malware and phishing attacks while measuring the neurophysiological behavior underlying these tasks.

Released: 16-Oct-2015 6:05 PM EDT
Think Again Before Tapping the Install Button for That App
Human Factors and Ergonomics Society

The results from a recent study showed that multitasking when using mobile devices creates stress and increases the potential for choosing unsafe apps.

Released: 15-Oct-2015 2:05 PM EDT
Think Twice About Android Root
University of California, Riverside

In first-of-its-kind study, UC Riverside engineers quantify amount of Android root exploits available in commercial software and show that they can be easily abused

Released: 13-Oct-2015 6:05 AM EDT
Is Your Digital Information More at Risk Today Than It Was Ten Years Ago?
Lawrence Berkeley National Laboratory

Researchers at University of New Mexico and the Lawrence Berkeley National Laboratory say cybersecurity breeches are not happening more frequently than they did a decade ago. And these data breaches in general are not growing in size.

9-Oct-2015 3:05 PM EDT
New Research Method Identifies Stealth Attacks on Complicated Computer Systems
Virginia Tech

Three Virginia Tech computer scientists are unveiling a novel approach to discovering stealth attacks on computers at the annual ACM Conference on Computer and Communications Security.

Released: 9-Oct-2015 6:05 PM EDT
New Research Center Will Focus on Cybersecurity of Nation’s Power Grid
University of Arkansas, Fayetteville

University of Arkansas engineering researchers, focused on solid-state solutions to upgrade the U.S. power grid, will lead a new national center devoted to cybersecurity for electric power utilities. The center is made possible by a $12.2 million grant from the U.S. Department of Energy, augmented by $3.3 million in matching funds from the research partners.

Released: 1-Oct-2015 5:05 PM EDT
Three Questions With: Ames Laboratory Cybersecurity Manager and Researcher Chris Strasburg
Ames National Laboratory

Ames Laboratory's Chris Strasburg discovered an interest in research while working in systems support and cybersecurity. He’s now the U.S. Department of Energy's Ames Laboratory’s cybersecurity manager and working toward a Ph.D. in computer science at Iowa State University, studying artificial intelligence approaches, automation of computer languages, and network security.

Released: 29-Sep-2015 4:05 PM EDT
New York Cybersecurity Company Licenses ORNL’s Data Diode
Oak Ridge National Laboratory

Lock Data Solutions has licensed a technology from the Department of Energy’s Oak Ridge National Laboratory designed to protect a company’s data from internal and external threats.

Released: 9-Sep-2015 3:05 AM EDT
Making IoT Configuration More Secure and Easy-to-Use
University of Southampton

With an ever increasing number of everyday objects from our homes, workplaces and even from our wardrobes, getting connected to the Internet, known as the ‘Internet of Things (IoT), researchers from the University of Southampton have identified easy-to-use techniques to configure IoT objects, to make them more secure and hence help protect them from online attacks.



close
2.05892