Press "esc" to clear
Go to Advanced Search

Showing results

641650 of 708

Article ID: 584500

Professor's Signcryption Technology Tightens Cyber Security

University of North Carolina at Charlotte

UNC Charlotte professor Yuliang Zheng invented the revolutionary new technology and he continues his research in the College of Computing and Informatics. After nearly a three-year process, his research efforts have been formally recognized as an international standard by the International Organization of Standardization (ISO).

Released:
6-Jan-2012 3:30 PM EST
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment
image001.jpg

Article ID: 583567

What's In A Name? Homeland Security Develops Domain Name System Security Extensions (DNSSEC)

Homeland Security's Science & Technology Directorate

The Department of Homeland Security's Science and Technology Directorate (S&T) is working to restore trust in the system and make websites more secure and reliable by improving the Internet's Domain Name System(DNS).

Released:
6-Dec-2011 4:05 PM EST
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Article ID: 583533

Carrier IQ’s Software ‘Worst Nightmare,’ Says Cornell Smart Phone Security and Privacy Expert

Cornell University

Stephen B. Wicker, Cornell professor of Electrical and Computer Engineering at Cornell University, comments on revelations about secret embedded software on Android, Blackberry and Nokia smart phones that can detect and record keystrokes.

Released:
1-Dec-2011 1:35 PM EST
EXPERT AVAILABLE
Open in New Tab
Add to Favorites

Channels:

Cybersecurity

Article ID: 583448

Some Smartphone Models More Vulnerable To Attack

North Carolina State University

New research from North Carolina State University shows that some smartphones specifically designed to support the Android mobile platform have incorporated additional features that can be used by hackers to bypass Android’s security features, making them more vulnerable to attack.

Released:
30-Nov-2011 8:00 AM EST
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Article ID: 583323

Timely Cyber-Monday Tips from Internet Security Analyst

University of Virginia

With the continued growth of online shopping and this year's "Cyber Monday," a University of Virginia expert is available to help your audience or readers keep their computers, their identities and their credit cards safe.

Released:
28-Nov-2011 8:00 AM EST
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Article ID: 583267

When Holiday Shopping Online, It’s Buyerbeware.com

Temple University

Online shopping has become so popular that it now accounts for nearly half of all holiday shopping, but even savvy online shoppers should take a few extra moments to ensure their online safety, say Temple University cyber security expert.

Released:
22-Nov-2011 12:10 PM EST
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Pop Culture

skjellum_warner_sloan.jpg

Article ID: 582843

Software Helps FBI Crack International Cybercrime Case

University of Alabama at Birmingham

UAB Spam Data Mine links Internet scam to cybercriminals accused of hacking more than 400 million computers.

Released:
10-Nov-2011 4:40 PM EST
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Social and Behavioral Sciences

adams_R041_hires.jpg

Article ID: 582797

Georgia Tech Helps to Develop System That Will Detect Insider Threats from Massive Data Sets

Georgia Institute of Technology, Research Communications

Researchers at Georgia Tech are developing new approaches for identifying “insider threats” before an incident occurs. They are creating a suite of algorithms that can detect threats by analyzing massive amounts of computer data for unusual activity.

Released:
10-Nov-2011 7:00 AM EST
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Article ID: 582723

Story Tips from the Department of Energy’s Oak Ridge National Laboratory, November 2011

Oak Ridge National Laboratory

1) Computer hackers could lose a huge advantage because of a system being developed at ORNL. 2) Solar and wind energy could become more viable because of an innovation that produces a hydrogen stream of greater than 99 percent purity. 3) Something odd happens when you expose the element gadolinium to a strong magnetic field. 4) Carefully combining materials that shrink when heated with materials that expand creates a material unaffected by extreme temperature.

Released:
8-Nov-2011 5:00 PM EST
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Article ID: 582179

Cyber Workshop at Sandia Labs Seeks Potential Responses to Cyberattacks

Sandia National Laboratories

The difficulties of defending utilities, commerce and national security against cyberattack,s and what to do to change that situation, were major themes of a conference at Sandia National Labs.

Released:
26-Oct-2011 1:20 PM EDT
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Channels:

Cybersecurity


Showing results

641650 of 708





Chat now!