For the second year in a row, a team of scientists from DOE’s Oak Ridge and Los Alamos National Laboratories led a demonstration hosted by EPB, a utility and telecommunications company, to test quantum-based technologies that could improve the cybersecurity, longevity and efficiency of the nation’s power grid. Among other successes, the researchers drastically increased the range these resources can cover in collaboration with new industry partner Qubitekk.
What corporate leaders may not realize is that strides they are making toward social responsibility may be placing a proverbial target on their backs — if their efforts appear to be disingenuous, according to new research from the University of Notre Dame.
Software vulnerabilities are more likely to be discussed on social media before they’re revealed on a government reporting site, a practice that could pose a national security threat, according to computer scientists at Pacific Northwest National Laboratory.
Researchers from Michigan State University released a study on “sextortion” – a lesser-known internet crime that poses a threat to adults and minors – that sheds light on the importance of protecting the public from online criminals.
A parser, the element in a computer system that converts data inputs into an understandable format, is the first line of defense for cybersecurity. A multi-institute group of researchers that includes Gang Tan, assistant professor of computer science and engineering in the School of Electrical Engineering and Computer Science at Penn State, has received an $8 million grant that allots $1 million for Penn State’s part of the research to increase computer security by developing more secure parsers.
In new research published in the Journal Technology and Culture, Rebecca Slayton, professor of science and technology studies at Cornell University, uses the field of incident response to shed light on how experts – and nations – can more effectively combat cyberwarfare when they foster trust and transcend politics.
Los Alamos National Laboratory’s Efficient Mission Centric Computing Consortium (EMC3) recently welcomed its first international partner, the South African National Integrated Cyberinfrastructure System (NICIS).
A team of cybersecurity researchers has discovered that a large number of cell phone applications contain hardcoded secrets allowing others to access private data or block content provided by users.
The study’s findings: that the apps on mobile phones might have hidden or harmful behaviors about which end users know little to nothing.
From the couch choir to YouTube yoga, online communities are flourishing, as the restrictions on social gatherings to fight against the COVID-19 pandemic, become tighter and tighter. UniSA Online course facilitator and communicative engagement researcher, Kim Burley says the speed at which people are adapting their social engagement from actual to virtual has been fast and fantastic.
A recent study from Arizona State University examined the impact of general media consumption on hacking behavior. People who consumed more media thought others were likely to engage in hacking. The punishments associated with hacking had no influence on how people thought about hacking.
Russia interfered with the U.S. presidential election in 2016, and in 2018, internet trolls again spread disinformation during the midterms. Intelligence officials warn that interference in this year’s presidential election may already be underway.
Distributed energy resources use electronics to communicate with each other or with a control center. Yet this presents opportunities for cyber attacks that could become real threats to the electric power system. Argonne experts are developing ways to protect power systems from these threats before they can occur.
Using ultrasound waves propagating through a solid surface, researchers at Washington University in St. Louis were able to read text messages and make fraudulent calls on a cellphone sitting on a desk up to 30 feet away.
Instead of blocking hackers, a new cybersecurity defense approach developed by University of Texas at Dallas computer scientists actually welcomes them.
The method, called DEEP-Dig (DEcEPtion DIGging), ushers intruders into a decoy site so the computer can learn from hackers’ tactics. The information is then used to train the computer to recognize and stop future attacks.
Researchers from the University of California San Diego, University of Texas at Austin, Stanford University and Mozilla have developed a new framework to improve web browser security. The framework, called RLBox, has been integrated into Firefox to complement Firefox’s other security-hardening efforts.
KINGSTON, R.I. — February 20, 2020, — The University of Rhode Island has announced a new degree and certificate initiative, URI Online, which provides students and professionals access to a URI education anywhere and anytime across the globe. URI Online offers fully-online undergraduate, graduate, and certificate programs designed to meet the global challenges of today’s workforce and the needs of tomorrow’s professionals.
The initiative, supported by Google, will provide invaluable resources to campaigns, election workers, elected officials, and concerned citizens to reinforce election cybersecurity measures through best practices and planning.
Micromobility vehicles, such as e-scooters, zip in and out of traffic. In San Antonio alone, over 12,000 scooters are on the road. For this reason, micromobility is seen as an alleviating trend to help tackle traffic congestion.
Newly updated with optional scenarios and expanded question sets, the ISAT is a web-based self-assessment tool that helps public safety agencies understand their current information sharing capabilities and gaps.
A team of quantum researchers from ORNL have conducted a series of experiments to gain a better understanding of quantum mechanics and pursue advances in quantum networking and quantum computing, which could lead to practical applications in cybersecurity and other areas.
DHS S&T awarded a $704,000 research-and-development (R&D) contract to Atlanta-based Georgia Tech Applied Research Center (GTARC) to address a crucial gap in the trustmark framework for the public safety community’s information sharing and safeguarding (IS&S) capabilities.
DHS S&T awarded $750,000 to SecuLore Solutions, an Odenton, Md.-based cybersecurity company, to improve and increase the resiliency of the nation’s emergency communications infrastructure, including Next Generation 911 (NG911) technologies.
DHS S&T conducted its final integration of smart city technologies this week in St. Louis, Missouri in collaboration with the city, the Open Geospatial Consortium (OGC), and the T-REX Innovation Center (T-REX).
Researchers identify the top states as having the largest victim monetary losses and number of victims, and their report shows online crime trends in the last four years before 2019 (2015 to 2018) for the six top states with the highest internet crime activity.
Research from Michigan State University is one of the first to identify common attributes of cybercrime networks, revealing how these groups function and work together to cause an estimated $445-600 billion of harm globally per year.
DHS S&T has awarded $197,020.95 Phase 1 funding to Stranger Labs, Inc. based in Cambridge, MA, to develop a digital credential solution that mitigates compromising the usability and convenience of paper-based credentials by making digital credentials verifiable offline.
The Israel – U.S. Binational Industrial Research and Development (BIRD) Foundation today announced three awards for collaborative projects totaling $2.3 million to develop advanced technologies for the homeland security mission.