Breaking News:

Cybersecurity

Add to Favorites | Subscribe | Share

Filters:

  • (Press "esc" to clear)

Life

Law and Public Policy

Channels:

cyber attack, Warfare, Act of War

'Act of War' Treatment of Cyber-attacks Fails to Answer Harder Questions

Fidler.jpg

Recent news reports that Pentagon policy will view certain cyber-attacks as acts of war to which the U.S. may respond with conventional military force is unsurprising but avoids hard policy and legal questions, according to Indiana University cybersecurity experts.

Science

Channels:

Georgia Institute Of Technology, College of Computing, Internet, Broadband Service, Consumer, Monitoring Networks, Kermit

Kermit Helps Households Monitor and Manage Their Internet Speed

For years, the relationship between Internet service provider and home user has been a simple, all-you-can-eat model. Now, as the nation’s largest providers prepare to implement usage-based pricing plans, a tool created by Georgia Tech researchers could empower consumers to ensure they are getting the service they are paying for.

Science

Channels:

Internet Security, IP6, network security, Privacy, Information Technology, IT, IP, Internet Protocol, Internet

National Security Group Recognizes Network Security Product

A Virginia Tech team has developed an innovative network security and privacy tool for the new Internet Protocol version 6 (IPv6), an Internet address system that will replace the 20-year-old IPv4.

Life

Social and Behavioral Sciences

Channels:

Cybersleuth Sniffs Out Possible Online Threats in Homage of Osama Bin Laden

gary_warner_2009_1.jpg

Since Osama Bin Laden's death, Univesity of Alabama at Birmingham's cybersleuth has been reviewing hacker chat rooms and looking for signs of particular threats or hostile response.

Science

Channels:

On iPad and iPhone File Revelations: ‘Most People Don’t Understand That We’re Selling Our Privacy,’ Says Wireless Expert

Stephen B. Wicker, Cornell professor of electrical and computer engineering, talks on recent revelations that files on iPads and iPhones exist that detail where users are geographically and what applications they use,

Science

Channels:

Encryption, Data Security, Mobile Computing

Research Focuses on Information Security

WeiWang1.jpg

Research by a South Dakota State University scientist and his colleagues elsewhere could make it safer to transfer information over mobile devices such as cell phones while conserving battery power. Researcher Wei Wang said those would be among the benefits from using a proposed new selective encryption technique to protect the most important content in streaming video over wireless networks.

Business

Channels:

Epsilon, Georgia Tech, Computing, data, Security, Identity Theft

Georgia Tech Expert Gives Tips on Safeguarding Against Data Theft

091201R007.jpg

Nick Feamster, assistant professor at Georgia Tech's College of Computing and researcher at the Georgia Tech Information Security Center offers his expertise on the Epsilon data breach and what users and custodians can do to protect their data.

Life

Business

Social and Behavioral Sciences

Channels:

Phishing, Email Communication, Online Transactions, Electronic Commerce, Computer Hackers, Online Security, Web Security

Off the Hook! Who Gets Phished and Why

Communication researchers have found that if you receive a lot of email, habitually respond to a good portion of it, maintain a lot of online relationships and conduct a large number of transactions online, you are more susceptible to email phishing.

Business

Channels:

UC Berkeley, Haas School Of Business, Net Neutrality, Internet, ISP

A Case for Network Neutrality: Charging For Fast Content Only Slows It Down

As the battle over “network neutrality” continues between supporters and Internet service providers (ISPs), a new study reveals compelling reasons to preserve a free and open world wide web. Economics Professor Benjamin Hermalin, University of California, Berkeley’s Haas School of Business, found that the purported benefits of tiered Internet service don’t materialize because over time, a tiered system slows down overall delivery speed.

Science

Channels:

PayPal, Amazon Payments, Google Checkout, cashier-as-a-service, Online Shopping, malicious online shoppers, Microsoft Research, Facebook vulnerabilities, Institute of Electrical and Electronics Engineers, IEEE Symposium on Secuirty and Privacy

Amazon, Others Make Fixes After Informaticists Uncover Online Security Flaws, Receive Free Products

RuiWangandXiaoFengWang.jpg

Internet security researchers at Indiana University and Microsoft Research have exploited software flaws in leading online stores that use third-party payment services PayPal, Amazon Payments and Google Checkout to receive products for free or at prices far below the advertised purchase price.







Chat now!