Breaking News Channels

Cybersecurity

Filters:

  • (Press "esc" to clear)

Life

Law and Public Policy

Channels:

Keywords:

DHS Funding, Clinton's Emails at State Dept, ACA at SCOTUS, Netanyahu to Congress; Experts Needed

View | Comment

Science

Channels:

Keywords:

How Sensor-Packed Smartphones Can Read Your Mood, Guard Your Data — and Wreak Havoc in the Wrong Hands

View | Comment

Smartphones have replaced nearly every conceivable gadget, but UAB computer scientists are teaching them some new tricks. The researchers are adapting accelerometers, GPS chips, gyroscopes and other sensors to make phones that can read a user's mood, eliminate passwords, protect financial transactions and more.

Life

Social and Behavioral Sciences

Channels:

Keywords:

Cyberbystanders: Most Don’t Try to Stop Online Bullies

View | Comment

In a new study, 221 college students participated in an online chat room in which they watched a fellow student get “bullied” right before their eyes. Only 10 percent of the students who noticed the abuse directly intervened, either by confronting the bully online or helping the victim.

Life

Social and Behavioral Sciences

Channels:

Keywords:

Criminologist 'Hacks' the Hacker

View | Comment

hacker.jpg

Hacking is a late-modern transgressive craft, according to the latest research from a Kansas State University criminologist.

Science

Channels:

Keywords:

Snooping Smart TVs an “Orwellian” Invasion

View

Science

Channels:

Keywords:

Iowa State Cyber Security Experts Make Virtual Lab Available for Classrooms, Competitions

View | Comment

CDCISERinkWeb.jpg

Iowa State cyber security experts have developed ISERink (ice rink) as a playground for computer competition, training and research. Thanks to support from the National Science Foundation, the software is now available for free to other schools.

Science

Channels:

Keywords:

Lizard Squad Hack Attack is a Warning for Us All Says Lewis University Info Security Expert

View | Comment

D_11ER220.jpg

Business

Channels:

Keywords:

Profitable Phishing Schemes Slyly Tinker with Our Heads, Then Rip Us Off

View | Comment

arun-vishwanath.jpg

University at Buffalo researchers have found evidence that the incredible spread of email phishing scams may be due to phishers’ increased use of “information-rich” emails that alter recipients’ cognitive processes in a way that facilitates their victimization.

Science

Channels:

Keywords:

Self-Powered Intelligent Keyboard Could Provide a New Layer of Security

View | Comment

intelligent-keyboard5.jpg

By analyzing such parameters as the force applied by key presses and the time interval between them, a new self-powered non-mechanical intelligent keyboard could provide a stronger layer of security for computer users.

Business

Channels:

Keywords:

R&K Cyber Solutions Licenses ORNL Malware Detection Technology

View | Comment

hyperion_highres.jpg

Washington, D.C.-based R&K Cyber Solutions LLC (R&K) has licensed Hyperion, a cyber security technology from the Department of Energy's Oak Ridge National Laboratory that can quickly recognize malicious software even if the specific program has not been previously identified as a threat.