Kansas State University cybersecurity experts are researching the feasibility of building a computer network that could protect itself against online attackers by automatically changing its setup and configuration.
Graduate students pursuing careers related to cybersecurity, including specialties in computer science, engineering, law, public policy, economics and social sciences, are being encouraged to apply for Cyber Security Technology, Policy, Law and Planning for an Uncertain Future, a weeklong summer institute at Sandia National Laboratories in Livermore, Calif. The program will take place Aug. 5-10 and is open to U.S. citizens and foreign nationals.
Lee Humphreys, Cornell assistant professor of communication, offers insight into the new privacy rules going into effect on Google websites on March 1, 2012
Leveraging the concept of “survival of the fittest,” Wake Forest University researchers are fighting the continual evolution of computer viruses, worms and malware with evolution by developing the first-ever automated computer configurations that adjust as quickly as the threats.
A student entrepreneurial team at the University of Utah believes it has come up with a winning business plan for a virtual ID badge that operates off of any mobile device. The product could be used in place of other common electronic ID badges used by hospitals, defense companies or other firms where securing data is of the utmost importance.
Computer engineers at Drexel University developed a pair of open-source software programs that could help protect the free speech of whistle-blowers and protestors, among other groups. One program uses a series of filters to determine the author of a document from a group of possible writers, while the other helps to make a writer truly anonymous by hiding patters in writing style.
As an estimated 24 million Zappos.com customers begin receiving notifications that some of their personal data have been compromised, an Indiana University expert is warning those affected to be on the lookout for targeted fraud attempts.
UNC Charlotte professor Yuliang Zheng invented the revolutionary new technology and he continues his research in the College of Computing and Informatics. After nearly a three-year process, his research efforts have been formally recognized as an international standard by the International Organization of Standardization (ISO).
The Department of Homeland Security's Science and Technology Directorate (S&T) is working to restore trust in the system and make websites more secure and reliable by improving the Internet's Domain Name System(DNS).
Stephen B. Wicker, Cornell professor of Electrical and Computer Engineering at Cornell University, comments on revelations about secret embedded software on Android, Blackberry and Nokia smart phones that can detect and record keystrokes.
New research from North Carolina State University shows that some smartphones specifically designed to support the Android mobile platform have incorporated additional features that can be used by hackers to bypass Android’s security features, making them more vulnerable to attack.
With the continued growth of online shopping and this year's "Cyber Monday," a University of Virginia expert is available to help your audience or readers keep their computers, their identities and their credit cards safe.
Online shopping has become so popular that it now accounts for nearly half of all holiday shopping, but even savvy online shoppers should take a few extra moments to ensure their online safety, say Temple University cyber security expert.
Researchers at Georgia Tech are developing new approaches for identifying “insider threats” before an incident occurs. They are creating a suite of algorithms that can detect threats by analyzing massive amounts of computer data for unusual activity.
1) Computer hackers could lose a huge advantage because of a system being developed at ORNL. 2) Solar and wind energy could become more viable because of an innovation that produces a hydrogen stream of greater than 99 percent purity. 3) Something odd happens when you expose the element gadolinium to a strong magnetic field. 4) Carefully combining materials that shrink when heated with materials that expand creates a material unaffected by extreme temperature.
The difficulties of defending utilities, commerce and national security against cyberattack,s and what to do to change that situation, were major themes of a conference at Sandia National Labs.
Though most organizations have policies and guidelines to protect their information systems from unauthorized access, research has shown that employee compliance is often a problem.
A research team led by Patrick Traynor (Computer Science) has discovered how to program a smartphone to sense nearby keyboard vibrations and decipher complete sentences with up to 80 percent accuracy.
The Obama administration's consideration and rejection of cyberattacks against Libya underscore cyberspace's emergence as a military domain but also raise questions about domestic and international law, says an Indiana University cybersecurity expert.
The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, as well as escalating battles over the control of online information that threatens to compromise content and erode public trust and privacy. Those were the findings announced by the Georgia Tech Information Security Center (GTISC) and the Georgia Tech Research Institute (GTRI) in today's release of the Georgia Tech Emerging Cyber Threats Report for 2012.
October is National Cyber Security Awareness Month. Karen McDowell, an information security analyst at the University of Virginia, is available for interviews about cybersecurity in general and about "spear-phishing" in particular.
An Iowa State University communications professor who worked on President Obama's Broadband Technologies Opportunities Program also knows how users can better protect their privacy online.
Media reports on a suspected North Korean cyber attack on South Korean bank reveal confusion and controversy about what such incidents mean in policy and legal terms, an Indiana University expert says.
A radical new approach to thwarting Internet censorship would essentially turn the whole web into a proxy server, making it virtually impossible for a censoring government to block individual sites.
Three experts from the Indiana University Center for Applied Cybersecurity Research are available to comment on the Defense Department strategy for responding to cyber attacks, released this week.
We all rely on integrated circuits in our laptops, desktops and mobile devices to communicate, access information and store data. But what if the circuits in your computer had their own agenda? As Jia Di, associate professor of computer science and computer engineering, explained, hardware designers could easily insert malicious functionalities into their designs.
Recent news reports that Pentagon policy will view certain cyber-attacks as acts of war to which the U.S. may respond with conventional military force is unsurprising but avoids hard policy and legal questions, according to Indiana University cybersecurity experts.
For years, the relationship between Internet service provider and home user has been a simple, all-you-can-eat model. Now, as the nation’s largest providers prepare to implement usage-based pricing plans, a tool created by Georgia Tech researchers could empower consumers to ensure they are getting the service they are paying for.
A Virginia Tech team has developed an innovative network security and privacy tool for the new Internet Protocol version 6 (IPv6), an Internet address system that will replace the 20-year-old IPv4.
Since Osama Bin Laden's death, Univesity of Alabama at Birmingham's cybersleuth has been reviewing hacker chat rooms and looking for signs of particular threats or hostile response.
Stephen B. Wicker, Cornell professor of electrical and computer engineering, talks on recent revelations that files on iPads and iPhones exist that detail where users are geographically and what applications they use,
Research by a South Dakota State University scientist and his colleagues elsewhere could make it safer to transfer information over mobile devices such as cell phones while conserving battery power. Researcher Wei Wang said those would be among the benefits from using a proposed new selective encryption technique to protect the most important content in streaming video over wireless networks.
Nick Feamster, assistant professor at Georgia Tech's College of Computing and researcher at the Georgia Tech Information Security Center offers his expertise on the Epsilon data breach and what users and custodians can do to protect their data.
Communication researchers have found that if you receive a lot of email, habitually respond to a good portion of it, maintain a lot of online relationships and conduct a large number of transactions online, you are more susceptible to email phishing.
As the battle over “network neutrality” continues between supporters and Internet service providers (ISPs), a new study reveals compelling reasons to preserve a free and open world wide web. Economics Professor Benjamin Hermalin, University of California, Berkeley’s Haas School of Business, found that the purported benefits of tiered Internet service don’t materialize because over time, a tiered system slows down overall delivery speed.
Internet security researchers at Indiana University and Microsoft Research have exploited software flaws in leading online stores that use third-party payment services PayPal, Amazon Payments and Google Checkout to receive products for free or at prices far below the advertised purchase price.
Tracking and protecting information stored on an organization’s network could be more secure with a system developed by a team led by Justin Beaver of ORNL’s Computational Sciences and Engineering Division. Electricity generated by the ocean is gaining steam with a demonstration plant off the coast of Kona, Hawaii. Making the most of biomedical imaging data will be a huge focus for dozens of professionals participating in the 3rd Annual Biomedical Science and Engineering Conference March 15-17.
Highly effective anti-virus programs for computers are providing the inspiration for a system to protect people from deadly genetically engineered biological bugs. While the National Cyber Security Division’s US-CERT provides cyber security updates and tools to safeguard computers within federal agencies, industry, state and local governments and the public, no such program exists to protect the public from harmful biological threats. That could change, however, with BioSITES, the vision of Department of Energy Oak Ridge National Laboratory researchers Robert Cottingham and Tom Brettin.
A Facebook security vulnerability discovered by a pair of doctoral students that allowed malicious websites to uncover a visitor's real name, access private data and post bogus content on their behalf has been repaired, Facebook confirmed.
At a January 7 forum with Silicon Valley business and academic leaders at Stanford University, U.S. Commerce Secretary Gary Locke and White House Cybersecurity Coordinator Howard A. Schmidt announced plans to create a National Program Office to help foster an environment in which sensitive online transactions can be carried out with greater levels of trust.
As the day draws nearer for the world to run out of the unique addresses that allow us to use the Internet researchers at NIST have issued a guide for managers, network engineers, transition teams and others to help them deploy the next generation Internet Protocol (IPv6) securely.
Two new draft publications from NIST provide the groundwork for a three-tiered risk-management approach that encompasses computer security risk planning from the highest levels of management to the systems level. The draft documents have been released for public comment.
Out of the original 64, there now are five candidates left in the ongoing multi-year competition to create the next 'hash' algorithm to protect the integrity of electronic information.
The mob mentality behind the current wave of cyber attacks against various banking, credit and other service-industry websites is not one of frenzy or mass hysteria, according to cybercrime experts at the University of Alabama at Birmingham.
“The recent response of the White House’s Office of Management and Budget (OMB) to the WikiLeaks document dump gives us a peek at the sometimes surreal standards for dealing with classified information and at the fear-mongering in which some government officials are engaging,” says Kathleen Clark, JD, professor of law at Washington University in St. Louis School of Law. Clark teaches and writes about government ethics, national security law, legal ethics and whistleblowing.