Cybersecurity considerations both for businesses and employees while working from home
Tulane University
A team of cybersecurity researchers has discovered that a large number of cell phone applications contain hardcoded secrets allowing others to access private data or block content provided by users. The study’s findings: that the apps on mobile phones might have hidden or harmful behaviors about which end users know little to nothing.
From the couch choir to YouTube yoga, online communities are flourishing, as the restrictions on social gatherings to fight against the COVID-19 pandemic, become tighter and tighter. UniSA Online course facilitator and communicative engagement researcher, Kim Burley says the speed at which people are adapting their social engagement from actual to virtual has been fast and fantastic.
To combat the cyber threat in sports, Argonne scientists built an assessment tool for team and stadium owners to fix vulnerabilities.
A recent study from Arizona State University examined the impact of general media consumption on hacking behavior. People who consumed more media thought others were likely to engage in hacking. The punishments associated with hacking had no influence on how people thought about hacking.
Russia interfered with the U.S. presidential election in 2016, and in 2018, internet trolls again spread disinformation during the midterms. Intelligence officials warn that interference in this year’s presidential election may already be underway.
Distributed energy resources use electronics to communicate with each other or with a control center. Yet this presents opportunities for cyber attacks that could become real threats to the electric power system. Argonne experts are developing ways to protect power systems from these threats before they can occur.
Using ultrasound waves propagating through a solid surface, researchers at Washington University in St. Louis were able to read text messages and make fraudulent calls on a cellphone sitting on a desk up to 30 feet away.
Instead of blocking hackers, a new cybersecurity defense approach developed by University of Texas at Dallas computer scientists actually welcomes them. The method, called DEEP-Dig (DEcEPtion DIGging), ushers intruders into a decoy site so the computer can learn from hackers’ tactics. The information is then used to train the computer to recognize and stop future attacks.
Columbus State University’s TSYS Cybersecurity Center is hosting a series of informational sessions on the new Nexus Cybersecurity degree.
Researchers from the University of California San Diego, University of Texas at Austin, Stanford University and Mozilla have developed a new framework to improve web browser security. The framework, called RLBox, has been integrated into Firefox to complement Firefox’s other security-hardening efforts.
KINGSTON, R.I. — February 20, 2020, — The University of Rhode Island has announced a new degree and certificate initiative, URI Online, which provides students and professionals access to a URI education anywhere and anytime across the globe. URI Online offers fully-online undergraduate, graduate, and certificate programs designed to meet the global challenges of today’s workforce and the needs of tomorrow’s professionals.
The aftershocks of Russia’s interference in the 2016 U.S. election are still being felt today. Is the United States ready for 2020?
Research from Michigan State University reveals the importance of factoring in a hacker’s motive for predicting, identifying and preventing cyberattacks.
The initiative, supported by Google, will provide invaluable resources to campaigns, election workers, elected officials, and concerned citizens to reinforce election cybersecurity measures through best practices and planning.
Micromobility vehicles, such as e-scooters, zip in and out of traffic. In San Antonio alone, over 12,000 scooters are on the road. For this reason, micromobility is seen as an alleviating trend to help tackle traffic congestion.
Newly updated with optional scenarios and expanded question sets, the ISAT is a web-based self-assessment tool that helps public safety agencies understand their current information sharing capabilities and gaps.
Online discourse by users of social media can provide important clues about the political dispositions of communities.
A team of quantum researchers from ORNL have conducted a series of experiments to gain a better understanding of quantum mechanics and pursue advances in quantum networking and quantum computing, which could lead to practical applications in cybersecurity and other areas.
DHS S&T awarded a $704,000 research-and-development (R&D) contract to Atlanta-based Georgia Tech Applied Research Center (GTARC) to address a crucial gap in the trustmark framework for the public safety community’s information sharing and safeguarding (IS&S) capabilities.
DHS S&T awarded $750,000 to SecuLore Solutions, an Odenton, Md.-based cybersecurity company, to improve and increase the resiliency of the nation’s emergency communications infrastructure, including Next Generation 911 (NG911) technologies.
DHS S&T conducted its final integration of smart city technologies this week in St. Louis, Missouri in collaboration with the city, the Open Geospatial Consortium (OGC), and the T-REX Innovation Center (T-REX).
Researchers identify the top states as having the largest victim monetary losses and number of victims, and their report shows online crime trends in the last four years before 2019 (2015 to 2018) for the six top states with the highest internet crime activity.
Research from Michigan State University is one of the first to identify common attributes of cybercrime networks, revealing how these groups function and work together to cause an estimated $445-600 billion of harm globally per year.
DHS S&T has awarded $197,020.95 Phase 1 funding to Stranger Labs, Inc. based in Cambridge, MA, to develop a digital credential solution that mitigates compromising the usability and convenience of paper-based credentials by making digital credentials verifiable offline.
The Israel – U.S. Binational Industrial Research and Development (BIRD) Foundation today announced three awards for collaborative projects totaling $2.3 million to develop advanced technologies for the homeland security mission.
In CFR’s annual Preventive Priorities Survey, U.S. foreign policy experts assess the likelihood and impact of thirty potential conflicts that could emerge or escalate in the coming year.
The spread of hate speech via social media could be tackled using the same "quarantine" approach deployed to combat malicious software, according to University of Cambridge researchers.
Email users should have far more control over the transmission of their messages upon death, a new study suggests.
The University of Arkansas at Little Rock will help create a free cybersecurity curriculum for Arkansas high school students as part of a new partnership announced Dec. 9 at UA Little Rock’s College of Engineering and Information Technology. The Arkansas Department of Education (ADE) Office of Computer Science will partner with UA Little Rock, the Arch Ford Education Service Cooperative’s Virtual Arkansas division, and the University of Central Arkansas to develop a three-year cybersecurity curriculum and course pathway.
New research from Michigan State University is the first to apply criminal justice theory to smart vehicles, revealing cracks in the current system leading to potential cyber risks.
With the help of a three-year, $500,000 grant from the National Science Foundation, a research team from Wayne State University will comprehensively evaluate the characteristics of cyberattacks for processes involving chemical processes of different types, and will develop fundamental advances in control theory and algorithms for enhancing cybersecurity of control systems for these processes through control designs integrated with other frameworks such as detection algorithms.
Columbus State University’s TSYS Cybersecurity Center is hosting a series of informational sessions on the new Nexus Cybersecurity degree. The informational sessions are open to the public. Prospective students interested in applying to join the first-ever, cohort of students in Spring 2020 are strongly encouraged to attend.
Columbia, NYU, Northeastern, St. John’s, SUNY Albany, SCCC, and USMA at West Point participated in the nationwide cyberdefense competition.
As part of the HSE’s ongoing efforts to address vulnerabilities, DHS S&T and USBP conducted a field test at USBP Havre Sector.
Hackers can exploit network vulnerabilities to steal passwords without being detected or use malicious media files disguised in photos or videos to access messages on unpatched phones.