Cybersecurity Firm Trains Sycamores for High-Tech Heroics
Indiana State UniversityIndiana State University Professor Bill Mackey aims to combine users' behavioral causes of cybercrime with criminological research to prevent cyber attacks.
Indiana State University Professor Bill Mackey aims to combine users' behavioral causes of cybercrime with criminological research to prevent cyber attacks.
Experts have long known the risks associated with charging a smartphone using a USB cord that can also transfer data, but new research shows that even without data wires, hackers using a "side channel" can quickly find out what websites a user has visited while charging a device.
Anderson Cooper visited CSU Dominguez Hills for story about the effects of habit-forming smartphone applications.
Despite the internet-dependent nature of our world, a thorough understanding of the internet’s physical makeup has only recently emerged, thanks to painstaking work by University of Wisconsin-Madison researchers and their collaborators.
Virginia-based Lenvio Inc. has exclusively licensed a cyber security technology from the Department of Energy’s Oak Ridge National Laboratory that can quickly detect malicious behavior in software not previously identified as a threat.
Building on its robust cyber security research and education programs, Mississippi State University is launching a master’s program in cyber security and operations.
As Americans become more dependent on modern technology, the demand to protect the nation's digital infrastructure will continue to grow. In an effort to produce career-ready cybersecurity professionals and to combat cybercrime nationwide, the California State University is creating unique educational opportunities for students and faculty members.
15-year-old Jocelyn Murray and her classmates solved a series of college-level cyber puzzles. This weekend they had a front row seat to watch college-level competitors who are older and more experienced defend their networks from constant attack.
University of Washington security researchers have shown that Google’s new tool that uses machine learning to automatically analyze and label video content can be deceived by inserting a photograph periodically into videos. After they inserted an image of a car into a video about animals, for instance, the system thought the video was about an Audi.
The risk of data breaches at U.S. hospitals is associated with larger facilities and hospitals that have a major teaching mission, according to a study published online today by JAMA Internal Medicine.
Virginia Tech researchers have recently discovered that the same apps we use on our phones to organize lunch dates, make online purchases, and communicate the most intimate details of our existence have secretly been colluding to mine our information.
A new, open-source software platform has been designed to support applications required to create a smart power grid and protect it from dangers ranging from terrorists to falling tree limbs.
The Neuromorphic Cyber Microscope can look for the complex patterns that indicate specific “bad apples,” all while using less electricity than a standard 60-watt light bulb, due to its brain-inspired design.
Dr. Nitin Agarwal, Jerry L. Maulden-Entergy chair and professor of information science at the University of Arkansas at Little Rock, and his doctoral student, Nihal Hussain, will conduct a four-day social media analysis training course for NATO Strategic Communications Center of Excellence (STRATCOM COE) at the Latvian Defense Academy March 21-24.
UAB doctoral student Ajaya Neupane awarded highly competitive $50,000 fellowship to continue research using neuroimaging devices to examine internet users’ susceptibility to cyberattacks.
Four experts will participate in a roundtable discussion that will be broadcast as a free webcast on March 9 and explore how trolls, bots, and fake news are shaping conversations and shifting public discourse in an online environment.
America’s president isn’t the only one considering the possibility of rigged elections. Vanderbilt University’s Yevgeniy Vorobeychik, assistant professor of computer science and computer engineering, spent much of last year researching how and why someone would want to tamper with an election and then developing an algorithm to protect against those efforts.
Cyberbullying is mostly an extension of playground bullying – and doesn’t create large numbers of new victims - according to research from the University of Warwick.
Rapid prototyping aids small manufacturer; accelerated method could separate CO2 from flue gases; EBM technique controls microstructure, locates properties in 3-D printed parts; open-source, user-friendly software monitors, controls energy use; drones to aid electric utilities to enhance safety, system reliability; ORNL cyberspace conf.
DHS S&T welcomed its first Canadian Exchange Officer today as part of a partnership with Defence Research and Development Canada’s Centre for Security Science.
University of Washington researchers have shown that Google’s new machine learning-based system to identify toxic comments in online discussion forums can be bypassed by simply misspelling or adding unnecessary punctuation to abusive words, such as “idiot” or “moron.”
AWS will join the Commonwealth of Virginia and Virginia Tech to support scalable cloud infrastructure and collaborate on cybersecurity educational efforts, enabling the Cyber Range with both content and a closed network for hands-on exercises, competitions, and other simulations.
In one of the latest and most ambitious studies on bullying and cyberbullying in middle and high school students, researchers found that 1 in 5 students said that they had been threatened with a weapon at school, 73 percent of students reported that they had been bullied at school at some point in their lifetime, and 70 percent of the students said that someone spread rumors about them online.
Team Wingin' It, a five-member team of UNLV students and alumni, won the $10K grand prize at the Consumer Electronics Show life-hack competition for their clever approach to tracking City of Las Vegas streetlight outages. The city is now looking to implement their invention.
To counter DDoS attacks, the S&T Homeland Security Advanced Research Projects Agency’s Cyber Security Division (CSD) is funding several research projects that will help defenders turn away attacks.
Cybersecurity researchers at the Georgia Institute of Technology have developed a new form of ransomware that can take over control of a simulated water treatment plant. After gaining access, they were able to command programmable logic controllers (PLCs) to shut valves, increase the amount of chlorine added to water, and display false readings.
Most of us take turning the lights on for granted. In reality, the energy we draw from the electrical grid to brighten homes, freeze food and watch TV is part of a complicated and widespread system. Understanding that system's vulnerabilities and reliability is a crucial step towards improving its security.
DHS S&T will host the EMERGE 2016: Wearable Technology Showcase to present the results of the 10 startup companies that were part of this year’s cohort class.
Researchers have developed a Bitcoin-compatible system that could make it significantly more difficult for observers to identify or track the parties involved in any given Bitcoin transaction.
SAVER reports help first responders see the pros and cons, easily review the specs, and make a better purchasing decisions.
If these research projects bear fruit, S&T will begin developing ways to implement blockchain technology to better safeguard the American people, our homeland and our values.
DHS S&T will exhibit and demonstrate 12 mature cyber security technology solutions ready for pilot deployment and commercialization at RSA 2017 cybersecurity conference, February 14-16, in San Francisco.
Johns Hopkins cybersecurity expert Avi Rubin warns that our increasing reliance on Internet-connected add-ons to our home appliances and vehicles could yield unwelcome consequences.
Researchers at Binghamton University, State University of New York have devised a new way to protect personal electronic health records using a patient’s own heartbeat.
Overconfident e-mail recipients are helping phishing succeed
Leaders in digital technology, education, business, and city governance gathered in El Segundo Dec. 14 for Los Angeles County Economic Development Corporation’s (LAEDC) Future Forums: Cyber Security to address society’s increasing vulnerability to cyber threats.
New research from Martin J. Whitman School of Management at Syracuse University finds that when companies experience operational IT failures, such as a data breach, they make changes to their boards of directors in order to improve oversight and monitoring of IT resource utilization. The study also observes that the board-changes are proportional to the magnitude of drop in stock prices that companies often experience upon suffering an IT failure.
In an Institute of Electrical and Electronics Engineers (IEEE) keynote paper, computer engineers lay out a framework to improve research on cyber-physical systems. They encourage combining model-based design with data-based learning: in other words, merge two existing paradigms into one practice.
USC Annenberg’s CDF has released the seventh edition of the 2016 World Internet Project International Report, which compiles data on the behavior and views of Internet users and non-users worldwide.
Computer Science researchers from Stony Brook University in New York have concluded the largest study of technical support scams to date, spanning 8 months, and following are the top 9 findings:
DHS S&T has announced the eighth cybersecurity technology transitioning to commercialization as a part of its Cyber Security Division’s Transition to Practice program.