Press "esc" to clear
Go to Advanced Search

Showing results

110 of 740
WiFiSecuritytinfoilbox_clothes_setup23.jpg

Article ID: 698920

Common WiFi Can Detect Weapons, Bombs and Chemicals in Bags

Rutgers University-New Brunswick

Ordinary WiFi can easily detect weapons, bombs and explosive chemicals in bags at museums, stadiums, theme parks, schools and other public venues, according to a Rutgers University–New Brunswick-led study. The researchers’ suspicious object detection system is easy to set up, reduces security screening costs and avoids invading privacy such as when screeners open and inspect bags, backpacks and luggage. Traditional screening typically requires high staffing levels and costly specialized equipment.

Released:
15-Aug-2018 12:00 AM EDT
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Article ID: 699007

Discovery Casts Dark Shadow on Computer Security

University of Adelaide

Two international teams of security researchers have uncovered Foreshadow, a new variant of the hardware vulnerability Meltdown announced earlier in the year, that can be exploited to bypass Intel Processors’ secure regions to access memory and data.

Released:
14-Aug-2018 7:05 PM EDT
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment
Unknown.jpeg

Article ID: 699003

How are tech companies tracking you - and is it legal? CU Boulder technology law and ethics expert available to discuss

University of Colorado Boulder

Released:
14-Aug-2018 4:05 PM EDT
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Social and Behavioral Sciences

Article ID: 698957

Researchers Break Through Intel SGX, Intel's Security Wall

American Technion Society

An international team of researchers has broken through Intel’s innovative security wall, Intel Software Guard Extension (SGX). The attack, dubbed Foreshadow, exploits certain weaknesses in the existing mechanisms of Intel CPUs, allowing an attacker to expose private application data and forge computations secured by SGX.

Released:
14-Aug-2018 1:05 PM EDT
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment
jscholl-200x-1.jpg

Article ID: 698924

University of Washington's Hans Scholl on promises, cautions of 'digital government'

University of Washington

The internet has made government more efficient and public records more accessible — but as digital technology evolves it could also bring challenges to long-held constitutional safeguards, says Hans Jochen Scholl, a professor in the University of Washington Information School.

Released:
13-Aug-2018 5:05 PM EDT
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Law and Public Policy

2011-0209-hendler.jpg

Article ID: 698767

#RPI Cybersecurity Expert James Hendler Available to Discuss Cybersecurity and Elections

Rensselaer Polytechnic Institute (RPI)

Released:
9-Aug-2018 10:05 AM EDT
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Law and Public Policy

encryption-010.jpg

Article ID: 698764

Researchers Help Close Security Hole in Popular Encryption Software

Georgia Institute of Technology

Cybersecurity researchers at the Georgia Institute of Technology have helped close a security vulnerability that could have allowed hackers to steal encryption keys from a popular security package by briefly listening in on unintended “side channel” signals from smartphones.

Released:
9-Aug-2018 10:05 AM EDT
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment
18_0807_RoboCup_DexterityTask.JPG

Article ID: 698667

RoboCup 2018: S&T Test Methods Used to Evaluate Rescue Robots

Homeland Security's Science & Technology Directorate

Since 1997, several continents have played host to an international soccer tournament. No, not the World Cup -- the RoboCup. Robots of all shapes and sizes test their “metal” in the world’s favorite sport. Engineers and fans from across the globe have gathered to watch hunks of autonomous steel try to nudge a ball into a miniature net.

Released:
7-Aug-2018 2:05 PM EDT
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Article ID: 698664

Smartphones act as digital security blankets in stressful social situations

University of California, Irvine

Not only can your smartphone serve as your wallet, watch and map, it can also be your digital security blanket. In a new study led by the University of California, Irvine, researchers found that when people are in awkward social situations, having their phones with them offers comfort and helps relieve feelings of isolation.

Released:
7-Aug-2018 1:05 PM EDT
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Social and Behavioral Sciences

sjshacke-lrg.jpg

Article ID: 698547

Facebook's Transparency Is a Good Start, but Its Market Power Could Make It a Major Advocate for Privacy and Cybersecurity Worldwide

Indiana University

In the last week, Facebook disclosed a campaign by foreign interests – likely from Russia -- to disrupt the 2018 midterm elections and announced dramatic spending increases on improvements to data privacy and security. Cybersecurity expert Scott Shackelford shares what the company should do next

Released:
3-Aug-2018 12:00 PM EDT
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Law and Public Policy


Showing results

110 of 740





Chat now!