The University of Arkansas at Little Rock and its partners announced the expansion of the Emerging Threat Information Sharing and Analysis Center (ET-ISAC) to further strengthen the fight against the escalating threat of cybersecurity attacks in the energy sector. This new project adds to the already operational Forge Institute Emerging Threat Center and enables purposeful collaboration to expand operational capabilities and enhance regional threat information sharing.
In testimony before the Senate Judiciary Subcommittee on Privacy, Technology and the Law on Tuesday (May 16), OpenAI CEO Sam Altman proposed the formation of a U.S. or global agency that would license the most powerful AI systems and have the authority to “take that license away and ensure compliance with safety standards.”
Title 42, the United States pandemic rule that had been used to immediately deport hundreds of thousands of migrants who crossed the border illegally over the last three years, has expired. Those migrants will have the opportunity to apply for asylum. President Biden's new rules to replace Title 42 are facing legal challenges. Border crossings have already risen sharply, as many migrants attempt to cross before the measure expires on Thursday night. Some have said they worry about tighter controls and uncertainty ahead. Immigration is once again a major focus of the media as we examine the humanitarian, political, and public health issues migrants must go through.
Experts from Indiana University are available to comment on trending topics for the week of May 8, including the Writer's Guild of America strike, the ongoing investigation into the leak of classified military documents on Discord, and the role of climate change in an early allergy season.
Privacy and security features that aim to give consumers more control over the sharing of their data by smartphone apps are widely misunderstood, shows new research from the University of Bath’s School of Management.
A team led by Michigan State University researchers has earned a $1.2 million National Science Foundation grant to continue shoring up the security of cellular 911 calls. As the nation’s cellular networks and technological infrastructure advance, customers are treated to better coverage and faster service. On the flip side, these changes also can create new opportunities for cybercriminals to exploit unforeseen gaps in security.
Researcher will discuss the study which involved a sleeping aid known as suvorexant that is already approved by the Food and Drug Administration (FDA) for insomnia, hints at the potential of sleep medications to slow or stop the progression of Alzheimer’s disease.
Youth in the U.S. are targets of cross-platform digital abuse from peers, strangers, offline acquaintances and even relatives, with threats ranging from harassment and sexual violence to financial fraud, according to a new study from Cornell University and Google researchers.
As regulators and providers grapple with the dual challenges of protecting younger social media users from harassment and bullying, while also taking steps to safeguard their privacy, a team of researchers from four leading universities has proposed a way to use machine learning technology to flag risky conversations on Instagram without having to eavesdrop on them. The discovery could open opportunities for platforms and parents to protect vulnerable, younger users, while preserving their privacy.
To transform the way we commute and live, the University of Miami College of Engineering launched the Miami Engineering Autonomous Mobility Initiative (MEAMI), a consortium of world-class academic, industry, and government partners.
Discord, a chat platform originally built for online gaming, is now subject of intense scrutiny after intelligence documents were leaked - allegedly by a member of the military. James Ivory, a Virginia Tech professor who researches social media and video game use related to military simulations and links to political extremism and intelligence risks, said Discord has become a very mainstream platform for individual and community messaging.
A technology developed at Oak Ridge National Laboratory and used by the U.S. Naval Information Warfare Systems Command to test the capabilities of commercial security tools has been licensed to cybersecurity firm Penguin Mustache to create its Evasive.ai platform.
Smartphone spyware apps that allow people to spy on each other are not only hard to notice and detect, they also will easily leak the sensitive personal information they collect, says a team of computer scientists from New York and San Diego.
A cybersecurity technique that shuffles network addresses like a blackjack dealer shuffles playing cards could effectively befuddle hackers gambling for control of a military jet, commercial airliner or spacecraft, according to new research.
James Barr von Oehsen has been selected as the director of the Pittsburgh Supercomputing Center (PSC), a joint research center of Carnegie Mellon University and the University of Pittsburgh. Von Oehsen is a leader in the fields of cyberinfrastructure, research computing, advanced networking, data science and information technology.
Scientists have taken a step toward harnessing a form of artificial intelligence known as deep reinforcement learning, or DRL, to protect computer networks. DRL’s effectiveness at stopping adversaries from reaching their goals offers promise for a role for autonomous AI in proactive cyber defense.
An innovative engineering master’s program unveiled today by Digital Learning at NYU Tandon gives students flexibility to tailor their degree to their unique professional interests and aspirations. Students will have the opportunity to enroll in one of nine interdisciplinary concentrations – including in-demand fields like robotics, cybersecurity, and data science – all offered fully online.
U2opia Technology, a consortium of technology and administrative executives with extensive experience in both industry and defense, has exclusively licensed two technologies from the Department of Energy’s Oak Ridge National Laboratory that offer a new method for advanced cybersecurity monitoring in real time.
Fear of what could go wrong is the greatest motivator when it comes to getting remote workers to protect their employer’s information technology security, according to a recent study in Computers & Security.
The Center for Research toward Advancing Financial Technologies (CRAFT), a collaboration between Rensselaer Polytechnic Institute and Stevens Institute of Technology, is dedicated to advancing blockchain technology so that scams along the lines of FTX’s can be avoided. CRAFT researchers from Rensselaer recently presented their findings on blockchain interoperability and cryptocurrency scam detection at the 2022 IEEE International Conference on Big Data.
UTEP received a $5 million grant from NSF to provide financial support and professional development experiences to talented students in the field of computer science. The initiative will provide partial scholarships to 26 students at UTEP and to 15 students who start their college education at EPCC.
A slew of emerging technologies that rely on computers and integrated networks are vulnerable to cyberattack. Argonne National Laboratory tested a groundbreaking autonomous software tool to make them more secure at NATO’s flagship cyberdefense event.
“Robust” amendments to insurance law and international environmental law are needed to allow carbon capture, utilisation and storage to take place legally so the technology can be used in the fight against global warming, a new study says.
Two years ago, several browsers that prioritize user privacy --- including Safari, Firefox, and Brave --- began to block third-party cookies for all users by default. Advertisers have responded by pioneering a new method for tracking users across the Web, known as user ID (or UID) smuggling, which does not require third-party cookies. But no one knew exactly how often this method was used to track people on the Internet.
To help prepare students for jobs in the multi-billion-dollar, microelectronics security market, MITRE is running an Embedded Capture the Flag (eCTF) competition from January to April in 2023. Beyond gaining valuable hands-on experience, student teams are eligible to win cash prizes. New this year, the eCTF is inviting sponsors to allow more students to participate and help close critical workforce talent gaps.
Researchers have joined forces to create a universal radio adapter that will enable seamless and secure operations through non-cooperative indigenous 5G networks for U.S. military, government and critical infrastructure systems.