Press "esc" to clear
Go to Advanced Search

Showing results

501510 of 693
Eide2.jpg

Article ID: 626142

Self-Repairing Software Tackles Malware

University of Utah

University of Utah computer scientists have developed software that not only detects and eradicates never-before-seen viruses and other malware, but also automatically repairs damage caused by them. The software then prevents the invader from ever infecting the computer again.

Released:
13-Nov-2014 12:00 PM EST
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
01330_StateSt_2013Dec.jpg

Article ID: 625987

Black Friday, Cyber Monday Experts From DePaul University Discuss Internet Security, Consumer Psychology, Advertising, Procrastination

DePaul University

Released:
11-Nov-2014 1:00 PM EST
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Pop Culture

SaxenaFigure1.jpg

Article ID: 625738

New Research Shows Vulnerability in Mobile Phones’ Applications Offering Voice Communication Security

University of Alabama at Birmingham

UAB researchers identify problems with secure voice communication over the Internet.

Released:
5-Nov-2014 6:00 PM EST
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Article ID: 625366

Georgia Tech Releases 2015 Emerging Cyber Threats Report

Georgia Institute of Technology

In its latest Emerging Cyber Threats Report, Georgia Tech warns about loss of privacy; abuse of trust between users and machines; attacks against the mobile ecosystem; rogue insiders; and the increasing involvement of cyberspace in nation-state conflicts.

Released:
29-Oct-2014 8:00 AM EDT
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Law and Public Policy

DETERGroupPhoto.png

Article ID: 624984

“Virtual Internet” Tests Software Solutions for Real World Problems

Homeland Security's Science & Technology Directorate

Developed by the Department of Homeland Security Science and Technology Directorate’s (S&T) Cyber Security Division (CSD), the DETER testbed, described as the “Internet in a box” or a “virtual Internet,” provides a safe and secure option to conduct critical cybersecurity experimentation and testing in the context of complex networks and cyber‐physical systems designed to protect the nation’s critical cyber infrastructure.

Released:
21-Oct-2014 2:40 PM EDT
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment
hacking128.jpg

Article ID: 624750

Undue Influence: How Can We Be Effectively Warned Not to Give Away Our Information Online?

University of Alabama Huntsville

Two University of Alabama in Huntsville (UAH) professors are figuring out the most effective ways we’re influenced to give away personal information online and what warnings would be most effective to get us to stop.

Released:
15-Oct-2014 2:00 PM EDT
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Social and Behavioral Sciences

Article ID: 623970

Johns Hopkins to Co-Host Cyber Security Conference for Top Business Executives

Johns Hopkins University

Johns Hopkins information security experts have helped organize an upcoming conference to inform top executives about the growing risks of digital break-ins, how to reduce these risks, and how to manage the aftermath of a data breach.

Released:
30-Sep-2014 11:00 AM EDT
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment
YaoDaphne2014.jpg

Article ID: 623662

U.S. Army Looks to Daphne Yao to Provide a More Secure Cyber Space

Virginia Tech

Virginia Tech computer scientist Daphne Yao’s proposed solutions to prevent insider attacks in the cyber security world will provide a leap forward to stronger Army command and control of cyberspace capabilities on the battlefield as well as in day-to-day operations.

Released:
23-Sep-2014 3:00 PM EDT
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment
cyber_200_2014.png

Article ID: 623577

Dynamic, Radical Solutions Needed: 2014 NYIT Cybersecurity Conference Highlights

New York Institute of Technology

Pressing questions fueled lively discussion and much debate during NYIT’s annual cybersecurity conference, at which nearly 250 attendees gathered to gain insights from expert speakers and panelists representing industry, government, and academia.

Released:
22-Sep-2014 11:00 AM EDT
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment
PozmantierwithDanielSoh.JPG

Article ID: 623062

Sandia Cyber-Testing Contributes to DHS Transition to Practice

Sandia National Laboratories

Through the Department of Homeland Security’s Transition to Practice (TTP) program, cybersecurity technologies developed at Sandia National Laboratories — and at other federal labs — now stand a better chance of finding their way into the real world.

Released:
10-Sep-2014 7:00 AM EDT
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Channels:

Cybersecurity


Showing results

501510 of 693





Chat now!