Johns Hopkins University information security expert Anton Dahbura is available to discuss the Biden administration's newly released national cybersecurity strategy.
A cybersecurity technique that shuffles network addresses like a blackjack dealer shuffles playing cards could effectively befuddle hackers gambling for control of a military jet, commercial airliner or spacecraft, according to new research.
James Barr von Oehsen has been selected as the director of the Pittsburgh Supercomputing Center (PSC), a joint research center of Carnegie Mellon University and the University of Pittsburgh. Von Oehsen is a leader in the fields of cyberinfrastructure, research computing, advanced networking, data science and information technology.
Scientists have taken a step toward harnessing a form of artificial intelligence known as deep reinforcement learning, or DRL, to protect computer networks. DRL’s effectiveness at stopping adversaries from reaching their goals offers promise for a role for autonomous AI in proactive cyber defense.
An innovative engineering master’s program unveiled today by Digital Learning at NYU Tandon gives students flexibility to tailor their degree to their unique professional interests and aspirations. Students will have the opportunity to enroll in one of nine interdisciplinary concentrations – including in-demand fields like robotics, cybersecurity, and data science – all offered fully online.
U2opia Technology, a consortium of technology and administrative executives with extensive experience in both industry and defense, has exclusively licensed two technologies from the Department of Energy’s Oak Ridge National Laboratory that offer a new method for advanced cybersecurity monitoring in real time.
Fear of what could go wrong is the greatest motivator when it comes to getting remote workers to protect their employer’s information technology security, according to a recent study in Computers & Security.
More than 250 MITRE employees were awarded over 100 patents in the past five years. These patent holders come from multiple disciplines and underrepresented populations, including 13.4% women.
The Center for Research toward Advancing Financial Technologies (CRAFT), a collaboration between Rensselaer Polytechnic Institute and Stevens Institute of Technology, is dedicated to advancing blockchain technology so that scams along the lines of FTX’s can be avoided. CRAFT researchers from Rensselaer recently presented their findings on blockchain interoperability and cryptocurrency scam detection at the 2022 IEEE International Conference on Big Data.
UTEP received a $5 million grant from NSF to provide financial support and professional development experiences to talented students in the field of computer science. The initiative will provide partial scholarships to 26 students at UTEP and to 15 students who start their college education at EPCC.
A slew of emerging technologies that rely on computers and integrated networks are vulnerable to cyberattack. Argonne National Laboratory tested a groundbreaking autonomous software tool to make them more secure at NATO’s flagship cyberdefense event.
“Robust” amendments to insurance law and international environmental law are needed to allow carbon capture, utilisation and storage to take place legally so the technology can be used in the fight against global warming, a new study says.
Feeling proud of your background is key to one’s mental health when dealing with online racism, a new study in the Journal of Applied Communication Research suggests.
Two years ago, several browsers that prioritize user privacy --- including Safari, Firefox, and Brave --- began to block third-party cookies for all users by default. Advertisers have responded by pioneering a new method for tracking users across the Web, known as user ID (or UID) smuggling, which does not require third-party cookies. But no one knew exactly how often this method was used to track people on the Internet.
To help prepare students for jobs in the multi-billion-dollar, microelectronics security market, MITRE is running an Embedded Capture the Flag (eCTF) competition from January to April in 2023. Beyond gaining valuable hands-on experience, student teams are eligible to win cash prizes. New this year, the eCTF is inviting sponsors to allow more students to participate and help close critical workforce talent gaps.
Researchers have joined forces to create a universal radio adapter that will enable seamless and secure operations through non-cooperative indigenous 5G networks for U.S. military, government and critical infrastructure systems.
The University of Utah College of Engineering and the United States Air Force are proud to announce a new education partnership that will create valuable learning opportunities for students and research projects that can advance technologies from wireless communications and cybersecurity to robotics and composite materials.
Although blockchain is best known for securing digital currency payments, researchers at the Department of Energy’s Oak Ridge National Laboratory are using it to track a different kind of exchange: It’s the first time blockchain has ever been used to validate communication among devices on the electric grid.
Irvine, Calif., Nov. 17, 2022 – Researchers at the University of California, Irvine have discovered that the safe operation of a negative pressure room – a space in a hospital or biological research laboratory designed to protect outside areas from exposure to deadly pathogens – can be disrupted by an attacker armed with little more than a smartphone.
University of Washington researchers examined 44 3D tours in 44 states across the U.S. to look for potential security issues when personal details were included in the tour.
With electric vehicles becoming more and more common, the risks and hazards of a cyber attack on electric vehicle charging equipment and systems also increases. Jay Johnson, an electrical engineer at Sandia National Laboratories, has been studying the varied vulnerabilities of electric vehicle charging infrastructure for the past four years.
More than 140 U.S. college teams competed to test their cyber defense skills and protect a fictional electric vehicle manufacturer’s solar installation from simulated cyberattacks.
U.S. schools and school districts have shared an estimated 4.9 million posts that include identifiable images of students on public Facebook pages, unintentionally putting student privacy at risk, according to a new study.
Cybersecurity professionals are in high demand. The Department of Energy tasks Argonne National Laboratory with challenging and inspiring college-age students to compete against one another to outsmart cyberattackers in a simulated threat scenario.
The University of Arkansas at Little Rock, a leader in cybersecurity education, has received a nearly $800,000 grant from the National Security Agency (NSA) to expand a national cybersecurity education program for teachers, as well as develop a standardized curriculum to build pathways for cybersecurity education between high schools and colleges.
The University of Arkansas at Little Rock has received a nearly $150,000 grant from the National Security Agency to hold a year’s worth of free cybersecurity educational events for junior high and high school students in Arkansas. UA Little Rock will partner with Philander Smith College to host the 2nd Arkansas GenCyber Strength Training camp in Arkansas, which will support the state’s long-term investment in secondary school cybersecurity education.
ASU business professor says cyber adversaries will look to midterm elections to stir the pot with voters, with most of the hyperbolic chatter coming from malicious bots spreading racism and hate on social media and in the comments section on news sites.
Elder financial and high-tech fraud costs seniors over $3 billion each year. Salisbury University hopes a $2.6 million federal grant to expand its law enforcement partnership will curb that number while helping students enter the forensic accounting profession and saving costs.
Experts at the San Diego Supercomputer Center at UC San Diego, San Diego State University and California State University, San Bernardino will apply NSF support to train and mentor a cohort of cyberinfrastructure professionals who will work closely with scientists to meet their computational needs.
According to research by a Cornell University SC Johnson College of Business professor and colleagues, it’s highly likely that a survey participant’s identity and other sensitive information can be traced back to the individual.
As a national leader in cybersecurity education, the California State University is helping close this workforce gap by accelerating its graduates into a broad range of cyber careers.
On September 13, 2022, the Council on Undergraduate Research’s (CUR) Executive Board moved to approve the submitted name rephrasing to the formerly known Mathematics and Computer Sciences Division effective immediately. The approval comes with a Divisional name change: the Mathematical, Computing, and Statistical Sciences Division (MCS).
Vivian Guetler’s research has taken her to some dark places. Specifically, the dark web, where she has spent considerable time analyzing communications on several forums commonly used by terrorist groups.
To help meet the growing demand for cybersecurity experts, the National Science Foundation’s CyberCorps Scholarship for Service program has awarded Florida State University a $4.2 million grant to support students pursuing careers in cybersecurity. This is the second round of funding the Department of Computer Science has received to operate this program.
Researchers at Cornell University have developed a mechanism for preserving anonymity in encrypted messaging – which conceals message content but might not cloak the sender’s identity – while simultaneously blocking unwanted or abusive messages.
Training a machine-learning model to effectively perform a task, such as image classification, involves showing the model thousands, millions, or even billions of example images.