Breaking News:

Cybersecurity

Add to Favorites | Subscribe | Share

Filters:

  • (Press "esc" to clear)

Life

Law and Public Policy

Channels:

Zappos, Cybersecurity

Consumers Should Be Vigilant in Wake of Zappos Cyberattack

Cate.jpg

As an estimated 24 million Zappos.com customers begin receiving notifications that some of their personal data have been compromised, an Indiana University expert is warning those affected to be on the lookout for targeted fraud attempts.

Science

Channels:

Zappos Breach Goes Beyond Credit Cards: Consumers Face Identity Theft if Hackers Correlate Other Penetrated Databases, Says Cornell Expert

Stephen B. Wicker, Cornell professor of Electrical and Computer Engineering at Cornell University, comments on the Zappos web site breach by hackers.

Science

Channels:

tech innovations, data, Signcryption, Security

Professor's Signcryption Technology Tightens Cyber Security

UNC Charlotte professor Yuliang Zheng invented the revolutionary new technology and he continues his research in the College of Computing and Informatics. After nearly a three-year process, his research efforts have been formally recognized as an international standard by the International Organization of Standardization (ISO).

Science

Channels:

Science And Technology Directorate, Cyber, cyber attacks, Cyber Security, Domain Names, Inter, Cyberspace

What's In A Name? Homeland Security Develops Domain Name System Security Extensions (DNSSEC)

image001.jpg

The Department of Homeland Security's Science and Technology Directorate (S&T) is working to restore trust in the system and make websites more secure and reliable by improving the Internet's Domain Name System(DNS).

Science

Channels:

Carrier IQ’s Software ‘Worst Nightmare,’ Says Cornell Smart Phone Security and Privacy Expert

Stephen B. Wicker, Cornell professor of Electrical and Computer Engineering at Cornell University, comments on revelations about secret embedded software on Android, Blackberry and Nokia smart phones that can detect and record keystrokes.

Science

Channels:

Android Mobile Platform, Smartphones, Security, Hackers

Some Smartphone Models More Vulnerable To Attack

New research from North Carolina State University shows that some smartphones specifically designed to support the Android mobile platform have incorporated additional features that can be used by hackers to bypass Android’s security features, making them more vulnerable to attack.

Business

Channels:

Cyber Monday, Internet Security, Hacking, Phishing, spear phishing, U.Va., University Of Virginia, Computer Virus

Timely Cyber-Monday Tips from Internet Security Analyst

With the continued growth of online shopping and this year's "Cyber Monday," a University of Virginia expert is available to help your audience or readers keep their computers, their identities and their credit cards safe.

Life

Pop Culture

Channels:

Internet, Online Shopping, Security, Cyber Security, Holidays, Black Friday, Cyber Monday

When Holiday Shopping Online, It’s Buyerbeware.com

Online shopping has become so popular that it now accounts for nearly half of all holiday shopping, but even savvy online shoppers should take a few extra moments to ensure their online safety, say Temple University cyber security expert.

Life

Social and Behavioral Sciences

Channels:

Cyber Crime, Cyber Defense, Spam, Spam Detection, FBI, NASA, Operation Ghost Click

Software Helps FBI Crack International Cybercrime Case

skjellum_warner_sloan.jpg

UAB Spam Data Mine links Internet scam to cybercriminals accused of hacking more than 400 million computers.

Science

Channels:

insider threat, massive data, Anomalies, Algorithms, Anomaly Detection at Multiple Scales, Adams, Darpa, counter-intelligence, Computer, computer activity, high-performance computing , Email, Instant Messaging, file transfer, computer login, cyber activity, Cyber

Georgia Tech Helps to Develop System That Will Detect Insider Threats from Massive Data Sets

adams_R041_hires.jpg

Researchers at Georgia Tech are developing new approaches for identifying “insider threats” before an incident occurs. They are creating a suite of algorithms that can detect threats by analyzing massive amounts of computer data for unusual activity.







Chat now!