Breaking News:

Cybersecurity

Add to Favorites | Subscribe | Share

Filters:

  • (Press "esc" to clear)

Business

Channels:

Study Shows How Phishing Scams Thrive on Overconfidence

Overconfident e-mail recipients are helping phishing succeed

Science

Channels:

Cyber Security, Los Angeles, CSU Dominguez Hills, LAEDC, Russia Hackers

CSU Dominguez Hills Presents LAEDC’s ‘Future Forums: Cyber Security’

FutureForumCyberSecuritypanel2.jpg

Leaders in digital technology, education, business, and city governance gathered in El Segundo Dec. 14 for Los Angeles County Economic Development Corporation’s (LAEDC) Future Forums: Cyber Security to address society’s increasing vulnerability to cyber threats.

Business

Channels:

cyber attack, cyber breaches, IT governance, Governance, operational IT, Research, Risk Management

Novel Research Demonstrates Improvements in Board-Level IT Governance in Firms That Experience Cyber Attacks

ITSecurity-702x336.png

New research from Martin J. Whitman School of Management at Syracuse University finds that when companies experience operational IT failures, such as a data breach, they make changes to their boards of directors in order to improve oversight and monitoring of IT resource utilization. The study also observes that the board-changes are proportional to the magnitude of drop in stock prices that companies often experience upon suffering an IT failure.

Science

Channels:

Michigan Tech, Shiyan Hu, Cyber-physical systems, cybersecurity and innovation, Cybersecurity, Smart Grid, self-driving cars

Streamlining the Internet of Things and Other Cyber-Physical Systems

ShiyanHu02262015001.jpg

In an Institute of Electrical and Electronics Engineers (IEEE) keynote paper, computer engineers lay out a framework to improve research on cyber-physical systems. They encourage combining model-based design with data-based learning: in other words, merge two existing paradigms into one practice.

Science

Channels:

Technology, Internet, Online Security

Center for the Digital Future Publishes Findings on Global Impact of Digital Technology

USC Annenberg’s CDF has released the seventh edition of the 2016 World Internet Project International Report, which compiles data on the behavior and views of Internet users and non-users worldwide.

Science

Channels:

Scams, Technology, Computer Science, support scams, technical support scams, Fraud, fraud phone, Call Center

Top 9 Results From The Largest Study of Technical Support Scams

NickNikiforakis.jpg

​Computer Science researchers from Stony Brook University in New York have concluded the largest study of technical support scams to date, spanning 8 months, and following are the top 9 findings:

Science

Business

Channels:

Cybersecurity, Security, Cyber, Transition, cyber technology , Detection, Analytics, Startup, DHS, S&T, DHS S&T

DHS S&T Transition to Practice Program Transitions Eighth Cybersecurity Technology for Commercialization

DHS S&T has announced the eighth cybersecurity technology transitioning to commercialization as a part of its Cyber Security Division’s Transition to Practice program.

Life

Law and Public Policy

Channels:

Russian Hacking, 2016 presidential election, Cybersecurity, Department Of Homeland Security, President Obama

Former High-Level Homeland Security Staffer, Cybersecurity Expert Available to Comment On "Full Review" of Russian Hacking

Rosenzweig-Paul-mug-shot-Sept-2012-750x1125.jpg

Life

Law and Public Policy

Channels:

Trump, Clinton

WVU Expert: Trump Campaign Ties to Russian Interests Harken Back to Cold War-Era Politics

ErikHerron.jpg

Life

Law and Public Policy

Channels:

Cybersecurity, Yair Levy, Nova Southeastern University, College of Engineering and Computing, Subject Matter Expert, Russian Hacking, Elections 2016

With President Barack Obama Ordering A "Full Review" of Russian Hacking During the Presidential Election in November, NSU Is Home to Cybersecurity Expert for Media Working Related Stories.

YairLevyPhD-HighRes.jpg

Life

Business

Law and Public Policy

Channels:

APCO, CSD, Cybersecurity, cyber research, DHS, S&T, mobile applications, mobile security, R&D, Research And Development

Snapshot:S&T and APCO Partnerto Improve Interoperability and Security of Public Safety Mobile Apps

The Department of Homeland Security Science and Technology Directorate (S&T) and the Association of Public-Safety Communications Officials (APCO) International recently announced a partnership to ensure security and interoperability of mobile applications used by the public safety community.

Life

Law and Public Policy

Channels:

Study on American Jihadi Women, Experts on ‘Low-Tech Terror’ and Hate Speech Versus Free Speech in the Terrorism News Source

For the latest research and experts on Terrorism go to the Terrorism News Source

Business

Channels:

Cybersecurity, Cyber, R&D, S&T, DHS, industry day, Tech, Technology, Startups, financial sector, cyber security protections

DHS S&T to Hold Industry Day with New R&D Opportunities for Financial Services Sector Cybersecurity Protections

DHS S&T will host an industry day to connect technology startups and investors to new opportunities for research and development of cybersecurity active defenses for the nation’s financial services sector critical infrastructure.

Business

Channels:

#cybermonday, Cyber Monday, Online Shopping, Business, Hacking, Baylor University, Hankamer School of Business, Credit Cards, debit cards, Online Safety

As the Holiday Shopping Season Begins, Online Security Expert Offers Tips for #CyberMonday and Beyond

iStockOnlineShopping.jpg

Randal Vaughn, Ph.D., professor of information systems in Baylor University’s Hankamer School of Business, said that while most online merchants he uses such as Jet.com and Amazon seem to have excellent consumer protections in place, he has a few tips to help consumers be smart online shoppers.

Life

Social and Behavioral Sciences

Channels:

UALR, NATO, Cyber Defense, Cybersecurity, Nitin Agarwal, cybersecurity and innovation, social network analysis, Social Network, cyber forensics

Arkansas Researchers Present Cyber Defense Findings at NATO Conference

NitinAgarwal3.jpg

A University of Arkansas at Little Rock professor and two doctoral students recently got a chance to unveil their research on cyber defense at an international NATO conference. The talk, “Understanding Influence Operations of Novorossiya through Blogs and Twitter,” detailed the research team’s monitoring of social media responses to NATO exercises Operation Brilliant Jump and Anakonda over the summer. Specifically, they tracked how anti-NATO groups reacted to information released by NATO and media coverage of the exercises via social media.

Medicine

Channels:

NSF, National Science Foundation, Hardware, Software, computer hardware, Computer Software, Computers, Computer Science, Computer Virus, Hackers, Malware, Spyware, digital extortion, Cybercrime, Cyber, cyber attacks, Computer Security, Cyber Security, CPU, central processing unit, SUNY Binghamton, State University of New York at Binghamton, Binghamton Universit

Researchers Want to Use Hardware to Fight Computer Viruses

20110412_ponomarev_jwc2.jpg

Fighting computer viruses isn’t just for software anymore. Binghamton University researchers will use a grant from the National Science Foundation to study how hardware can help protect computers too.

Science

Channels:

A New Report on private sector cybersecurity, Grant to Protect Internet Of Things Tech, Weakness in Common Computer Chip, All in the Cybersecurity News Source

The latest research and features on cybersecurity in the Cybersecurity News Source

Life

Law and Public Policy

Channels:

active defense, Cybersecurity, cybersecurity policy, Private Sector, Public Sector, Cyber Security, Hacking

Into the Gray Zone: New Report Analyzes Potential of Active Defense as a Response to Sophisticated Cyber Threats in the Private Sector

A new report from the GW Center for Cyber and Homeland Security offers the most comprehensive assessment to date of the legal, policy and technological contexts that surround private sector cybersecurity and active defense measures to improve U.S. responses to evolving threats.

Science

Channels:

Internet of Things, IoT, Privacy, Security, Cybersecurity, consumer technology, smarthomes

IU Researchers Receive $1.8 Million NSF Grant to Protect Security of 'Internet of Things' Technology

20151116_JeanCamp_ER_003_3x2_zoomed.jpg

Indiana University School of Informatics and Computing researchers have received $1.8 million from the National Science Foundation to ensure that door locks, lightbulbs, cameras and other common household items, which are increasingly connected to the internet, remain secure.

Science

Channels:

Computers, Computer Chip, CPU, NSF, National Science Foundation, Haswell, computer hacking, Computer Hackers, Hackers, Hacking, address space layout randomization, ASLR software, computer hardware, cyber attacks, Cyber Security, Computer Security, Binghamton University, SUNY Binghamton, State University of New York at Binghamton, Linux, Intel, Windows, Malware,

Researchers Find Weakness in Common Computer Chip

Researchers from Binghamton University—State University of New York and the University of California, Riverside have found a weakness in the Haswell central processing unit (CPU) components that makes common computer operating systems vulnerable to malicious attacks. Computer hackers could take control of individual, company and government computers if a weak point in address space layout randomization (ASLR) software is exploited by manipulating a CPU’s branch predictor, a piece of hardware designed to improve program performance.







Chat now!