Researchers are working to protect consumer data by using companies spam volume to evaluate its security vulnerability through the SpamRankings.net project.
Secure Decisions, a leading provider of assessment tools to enhance software security, is partnering with the Software Assurance Marketplace (SWAMP) to build a powerful and publicly accessible resource to improve the software that drives everyday life.
Georgia Tech researchers have created a tool to monitor the accessibility of Web pages around the world that can be installed by adding a single line of code to a web page. The tool, Encore, runs when a user visits a website where the code is installed and then discreetly collects data from potentially censored sites.
Georgia Tech researchers have identified a weakness in one of Android’s security features. The research, titled Abusing Performance Optimization Weaknesses to Bypass ASLR, identifies an Android performance feature that weakens a software protection called Address Space Layout Randomization (ASLR), leaving software components vulnerable to attacks that bypass the protection.
Columbia Engineering researchers have discovered a crucial security problem in Google Play, the official Android app store. The study is the first to make a large-scale measurement of the huge marketplace, using PlayDrone, a tool they developed to circumvent Google security to successfully download Google Play apps and recover their sources.
The tightly integrated computing and networking systems required to turn the nation’s freeways in “smart transportation systems” are currently under development. The efforts of the Smart Roads Cyber-Physical Systems project to identify cyber attacks against these systems and to develop software to protect them is dramatized by the video scenario “Mitigating Carmageddon” featured at the SmartAmerica Expo in Washington DC.
Computer scientists at Virginia Tech have developed a unique anomaly protection security approach for the detection of malicious activities on networked computers. The work was performed using a National Science Foundation CAREER award and is being presented at an international conference in Tokyo, Japan.
Industrial systems that control heating and cooling, water treatment plants, etc. are a low priority. That’s why they are so vulnerable to hackers, says Dr. Ray Vaughn, vice president for research at The University of Alabama in Huntsville.
The Internet bug "Heartbleed" was a stark reminder of how vulnerable our information is on the web, but also a sign that future job growth is rooted in securing that information. Higher education plays a significant role in helping fill these jobs.
As companies scrambled in recent days to address the latest cybersecurity bug known as Heartbleed, researchers at The University of Texas at Dallas had a solution that fixes the vulnerability, and also detects and entraps hackers who might be using it to steal sensitive data
The recently-discovered “Heartbleed” bug affecting as much as two-thirds of the Internet is causing people to hurriedly change passwords and further secure online personal information. Merrill Warkentin of Mississippi State University said Friday [April 11] that choosing strong passwords is among the best proactive steps for minimizing vulnerability to identity theft.
Georgia Tech researchers have developed a new security system that continuously monitors how a user taps and swipes a mobile device. If the movements don’t match the owner’s tendencies, the system recognizes the differences and can be programmed to lock the device.
NYIT held its first Global Cybersecurity Conference in Abu Dhabi today, which was inaugurated the U.A.E. Minister of Culture, Youth and Community Development.
NYIT’s conference welcomed cyber defense professionals, information technologists, banking and finance executives, and others across these fields from the U.S., China, the United Arab Emirates and beyond. NYIT has a history of hosting cybersecurity events at its New York City campus. Today’s event was its first cybersecurity conference with a truly worldwide reach.
Iowa State's Suraj Kothari is leading researchers from Iowa State University and Ames, Iowa-based EnSoft Corp. who are developing ways to secure smartphone software for the Defense Department.
Researchers used a novel methodology to gain new neurological insights into how users face security questions and how their personalities might affect their performance.
The paper proposes and tests four two-factor schemes that require servers to store a randomized hash of the passwords and a second device, such as the user’s security token or smartphone, to store a corresponding secret code.
Researchers at Georgia Tech have created a prototype software, Gyrus, that takes extra steps to prevent malware from sending spam emails and instant messages, and blocking unauthorized commands such as money transfers.
The San Diego Supercomputer Center (SDSC) at the University of California, San Diego, is collaborating with Leidos (formerly Science Applications International Corporation) to develop a reference system architecture aimed at increasing security levels of microgrid control and IT systems used to manage electrical microgrids worldwide.
Today’s cyber attacks aren’t just a threat to computer networks. Those with malicious intent can disrupt important infrastructure systems such as utilities. To counter this threat, the Department of Energy has awarded $1.7 million to help detect cyber attacks on our nation’s utility companies.
With full-fledged cyberwar becoming an increasingly likely possibility in the 21st century, one cybersecurity scholar calls on nations to extend the rules of war to cyberconflicts.
Researchers at Iowa State University are working to add some accountability to online anonymity. They've developed a technology that offers anonymity for honest users and accountability for dishonest users.
Experts in anthropology and cybersecurity are examining the unspoken knowledge shared by cybersecurity analysts as a way to develop new automated tools that help analysts strengthen their cyber defenses.
As more businesses find their way into the cloud, few engage in security measures beyond those provided by the associated cloud storage firm, a new report from Georgia Tech notes. Even fewer seek heightened data protection because of concerns that usability and access to remote data would be significantly reduced.
Stephen B. Wicker, electronic surveillance and privacy expert, professor of Electrical and Computer Engineering at Cornell University and author of “Cellular Convergence and the Death of Privacy,” discusses how technology, social trends and government policy have opened the floodgates for surveillance and eroded privacy worldwide.
During the month of October, Nova Southeastern University’s Graduate School of Computer and Information Sciences (GSCIS) is hosting a series of events in observance of National Cyber Security Awareness Month.
As the need to protect individuals and organizations against threats of cyber attacks continues to increase, New York Institute of Technology’s annual cyber security conference is bringing together experts from the security industry, government, and academia to foster dialogue and developments around increasingly complex challenges they face today.