Breaking News:

Cybersecurity

Add to Favorites | Subscribe | Share

Filters:

  • (Press "esc" to clear)

Science

Channels:

Cybersecurity, renewable hydrogen, thermal expansion, emmissions control, Ferroelectrics, Biofuels

Story Tips from the Department of Energy’s Oak Ridge National Laboratory, November 2011

1) Computer hackers could lose a huge advantage because of a system being developed at ORNL. 2) Solar and wind energy could become more viable because of an innovation that produces a hydrogen stream of greater than 99 percent purity. 3) Something odd happens when you expose the element gadolinium to a strong magnetic field. 4) Carefully combining materials that shrink when heated with materials that expand creates a material unaffected by extreme temperature.

Science

Channels:

Cyber Workshop at Sandia Labs Seeks Potential Responses to Cyberattacks

The difficulties of defending utilities, commerce and national security against cyberattack,s and what to do to change that situation, were major themes of a conference at Sandia National Labs.

Life

Social and Behavioral Sciences

Channels:

Information Systems, Passwords, It Security, Behavior

User Resistance to Password Security Explored

Though most organizations have policies and guidelines to protect their information systems from unauthorized access, research has shown that employee compliance is often a problem.

Life

Social and Behavioral Sciences

Channels:

Iphone, Georgia Institute Of Technology, Privacy, Cyber Security

Georgia Tech Turns iPhone Into spiPhone

Traynor3.jpg

A research team led by Patrick Traynor (Computer Science) has discovered how to program a smartphone to sense nearby keyboard vibrations and decipher complete sentences with up to 80 percent accuracy.

Life

Law and Public Policy

Channels:

Cyberattack, Libya, War Powers Resolution

Deliberations on Cyberattacks Against Libya Raise Legal Questions

Fidler.jpg

The Obama administration's consideration and rejection of cyberattacks against Libya underscore cyberspace's emergence as a military domain but also raise questions about domestic and international law, says an Indiana University cybersecurity expert.

Science

Channels:

Cyber Security, Cyber Security Automation, Medical Records, Sexting, Software, Android OS

Software Keeps Sensitive Data Confined in Physical Space

A team of Virginia Tech researchers has created software to remotely put smart phones under lockdown.

Life

Social and Behavioral Sciences

Channels:

cyber attacks, Cyber Security, Georgia Institute Of Technology, Georgia Tech Research Institute

Georgia Tech Releases Cyber Threats Forecast for 2012

The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, as well as escalating battles over the control of online information that threatens to compromise content and erode public trust and privacy. Those were the findings announced by the Georgia Tech Information Security Center (GTISC) and the Georgia Tech Research Institute (GTRI) in today's release of the Georgia Tech Emerging Cyber Threats Report for 2012.

Business

Channels:

Phishing, spear phishing, Cybersecurity, Cybersecurity Awareness, University Of Virginia, Karen McDowell, Information Security, Identity Theft

U.Va. Expert Warns of 'Spear-Phishing'

October is National Cyber Security Awareness Month. Karen McDowell, an information security analyst at the University of Virginia, is available for interviews about cybersecurity in general and about "spear-phishing" in particular.

Life

Pop Culture

Channels:

Internet privacy, Internet Security, online privacy, Cybercrime, Identity Theft, Broadband Technologies Opportunities Program , online communication

Communications Professor, Broadband Access Expert Provides Internet Privacy Tips

Blevins_Jeff.jpg

An Iowa State University communications professor who worked on President Obama's Broadband Technologies Opportunities Program also knows how users can better protect their privacy online.

Life

Law and Public Policy

Channels:

Suspected Attack Highlights 'Mist and Haze' of Cyber War

Fidler.jpg

Media reports on a suspected North Korean cyber attack on South Korean bank reveal confusion and controversy about what such incidents mean in policy and legal terms, an Indiana University expert says.







Chat now!