Breaking News:

Cybersecurity

Add to Favorites | Subscribe | Share

Filters:

  • (Press "esc" to clear)

Science

Channels:

cell phone surveillance, IMSI-catchers, Cell site simulators, Privacy and Security

Catching the IMSI-Catchers: SeaGlass Brings Transparency to Cell Phone Surveillance

SeaGlassbaselinemodelinganimation.gif

University of Washington security researchers have developed a new system called SeaGlass to detect anomalies in the cellular landscape that can indicate where and when IMSI-catchers, cell site simulators, Stingrays and other cell phone surveillance devices are being used.

Business

Channels:

Cybersecurity, cyber warfare, OneLogin, Medill School of Journalism

OneLogin, 'Fort Knox' of Password Lockers, Attractive to Cyber-Thieves

paulie.jpg

Science

Business

Channels:

electronic jamming, Jamming, signal inteference, Responder, responder tech, First Responder, first responder technology, Law Enforcement, law enforcement technology, DHS, S&T, FRG, Facebook Live

Facebook Live Tech Talk: Join Us Discuss How to Stop Electronic Jamming!

TechTalk_StoppingSignalInterference_Facebook.jpg

Join us for our live Facebook Tech Talk, on Thursday, May 25 at 1:30 p.m. EST., to discuss jamming and signal interference and its impact on first responders, their mission space and their standard operating procedures.

Science

Channels:

Cybersecurity, Autonomous cars, connected vehicles

Dynamic Watermarking Could Help Solve Security Issues in Connected Vehicles

Working in the Texas A&M’s Cyberphysical Systems Laboratory, Dr. P.R.Kumar, University Distinguished Professor in the Department of Electrical and Computer Engineering, along with graduate students Bharadwaj Satchidanandan and Woo-Hyun Ko, have applied the theory of dynamic watermarking of sensors in autonomous vehicles to prevent malicious attacks.

Science

Channels:

Malware, android, Permissions

Combination of Features Produces New Android Vulnerability

A new vulnerability affecting Android mobile devices results not from a traditional bug, but from the malicious combination of two legitimate permissions that power desirable and commonly-used features in popular apps. The combination could result in a new class of attacks, which has been dubbed “Cloak and Dagger.”

Science

Channels:

Malware, malware detection, malware infection, network traffic

Network Traffic Provides Early Indication of Malware Infection

malware-sources5740.jpg

By analyzing network traffic going to suspicious domains, security administrators could detect malware infections weeks or even months before they're able to capture a sample of the invading malware, a new study suggests. The findings point toward the need for new malware-independent detection strategies that will give network defenders the ability to identify network security breaches in a more timely manner.

Science

Channels:

Malware, cloud security, Computer Security, Cybersecurity

Expert Available to Discuss Malware, Computer Security and Cloud Security

Life

Social and Behavioral Sciences

Channels:

Cybersecurity Expert Says Digital Hygiene Is Key to Preventing Future Ransomware Attacks

Life

Law and Public Policy

Channels:

airport safety, Airport Security, Laptop, TSA, Airlines, Homeland Security

Laptop Travel Ban Expert

robertson_cassandra.jpg

Science

Channels:

Cybersecurity, cyberforensics , Cybercrime, Malware, malware vulnerability, Technology, Hackers, cybercriminals

Cybercrime Expert Says Computer Infection Rate of Wannacry Attack May Not Be as Widespread as Initially Reported

RS3827_gary_warner_2012_06-scr.jpg







Chat now!