Breaking News:

Cybersecurity

Add to Favorites | Subscribe | Share

Filters:

  • (Press "esc" to clear)

Life

Education

Channels:

cell phones, finances, banking, , Cell Phones, Banking, Finances, Secure Communications, mobile banking, financial advice, Identity Theft, Hackers

Cell Phone Financial Identity Theft

ElizabethBaker.jpg

While the cell phone is an amazingly useful device, using it for banking — and consumers are increasingly using mobile phones as banking tools — can lead to identity theft and other financial crimes, if reasonable precautions aren’t taken. “Anyone who has access to your cell phone has access to your identity in a few clicks,” says Elizabeth Baker, an assistant professor at Wake Forest University and an expert in information system security issues.

Science

Channels:

Computer Science, computer science education, Computer Security, Computer Security Education

'Control-Alt-Hack' Game Lets Players Try Their Hand at Computer Security

Do you have what it takes to be an ethical hacker? Now you can at least try, no matter what your background, with a new card game developed by University of Washington computer scientists.

Science

Life

Social and Behavioral Sciences

Channels:

Internet, Safety, Security, Cybersecurity, June, Awareness, Identity Theft, Technology, Online, Cyberfraud, Computer crime

Cybersecurity Expert Dr. Rob D'Ovidio Available to Comment on National Internet Safety Month this June

PhotoCredittoKatieClark.jpg

During June, National Internet Safety Awareness Month, Drexel University’s Dr. Rob D’Ovidio, associate professor of criminal justice and director of the University’s program in computer crime and digital forensics, is available to comment on online safety, online privacy and a variety of cybercrime issues.

Science

Channels:

Malware, threat intelligence, industrial espionage, Security, Virus

Threat Intelligence System Helps Share Malware Data

titan133.jpg

As malware threats expand and increasingly focus on industrial espionage, Georgia Tech researchers are launching a new weapon to help battle the threats: a malware intelligence system that will help corporate and government security officials share information about the attacks they are fighting.

Life

Law and Public Policy

Channels:

CISPA, SOPA, Internet, Privacy, Cybersecurity, Cyber Law

Law Professor: ‘Devil Is in the Details’ of Cybersecurity Bill

The “devil is in the details” of the Cyber Intelligence Sharing and Protection Act (CISPA) pending in the U.S. Congress, says University at Buffalo Associate Professor Mark Bartholomew, an expert in intellectual property and cyber law.

Science

Channels:

moving-target defense, Cybersecurity, Computer, Network, Hacker, scott deloach, K-State, Kansas State University, Cloud

Cybersecurity Experts Begin Investigation on Self-Adapting Computer Network That Defends Itself Against Hackers

Kansas State University cybersecurity experts are researching the feasibility of building a computer network that could protect itself against online attackers by automatically changing its setup and configuration.

Life

Education

Channels:

Cybersecurity Technology, Policy, Law and Planning to Be Focus of Sandia Labs Summer Institute for Top Grad Students

Graduate students pursuing careers related to cybersecurity, including specialties in computer science, engineering, law, public policy, economics and social sciences, are being encouraged to apply for Cyber Security Technology, Policy, Law and Planning for an Uncertain Future, a weeklong summer institute at Sandia National Laboratories in Livermore, Calif. The program will take place Aug. 5-10 and is open to U.S. citizens and foreign nationals.

Life

Pop Culture

Channels:

Privacy Rules: Web Expert Explains New Google Policy

Lee Humphreys, Cornell assistant professor of communication, offers insight into the new privacy rules going into effect on Google websites on March 1, 2012

Science

Channels:

Computer, Security, Cyber Security, cyber attack, cyber threat, Science, Technology, Genetics, Evolution, computer network, Wake Forest, Wake Forest University, Errin Fulp, Michael Crouse, Natural Selection

Genetics Inspired Research Prevents Cyber Attacks

FulpandCrouse.jpg

Leveraging the concept of “survival of the fittest,” Wake Forest University researchers are fighting the continual evolution of computer viruses, worms and malware with evolution by developing the first-ever automated computer configurations that adjust as quickly as the threats.

Business

Channels:

Business & University Partnerships, Start Ups, Start Up Funding, Start Up Companies, Student Achievement, Student, Entreprenership, Entrepeneur, Entrepreneurial, Entrepreneurial Research, Invent, Invention, Invention/Product Development, Inventor, Inventors, product design, Product Design and Innovation, Product Development, Hospital, patient advocacy

Students Design Virtual ID Badge to Combat Online Hackers

OQ-winnerpic.JPG

A student entrepreneurial team at the University of Utah believes it has come up with a winning business plan for a virtual ID badge that operates off of any mobile device. The product could be used in place of other common electronic ID badges used by hospitals, defense companies or other firms where securing data is of the utmost importance.







Chat now!