NSA Infiltration of Google and Yahoo Networks Threatens U.S. Tech Leadership
Indiana University
During the month of October, Nova Southeastern University’s Graduate School of Computer and Information Sciences (GSCIS) is hosting a series of events in observance of National Cyber Security Awareness Month.
As the need to protect individuals and organizations against threats of cyber attacks continues to increase, New York Institute of Technology’s annual cyber security conference is bringing together experts from the security industry, government, and academia to foster dialogue and developments around increasingly complex challenges they face today.
Auto insurance 'pay as you drive' programs can be used to correctly infer one's destination, researchers find.
As encrypted email services like Lavabit shut their doors, the importance of email privacy becomes even more clear writes Neil Richards, JD, privacy law expert and professor of law at Washington University in St. Louis, in a recent CNN opinion piece. “E-mail privacy matters because our intellectual privacy matters,” he says.
Researchers from the Georgia Tech Information Security Center (GTISC) have discovered two security weaknesses that permit installation of malware onto Apple mobile devices using seemingly innocuous applications and peripherals, uncovering significant security threats to the iOS platform.
Hackers have attacked various corporations, but still most organizations do not prioritize cybersecurity as a strategic competency. A group of Iowa State University researchers says it is time for that philosophy to change.
Researchers at the University of Alabama at Birmingham (UAB) have uncovered new hard-to-detect methods that criminals may use to trigger mobile device malware that could eventually lead to targeted attacks launched by a large number of infected mobile devices in the same geographical area. Such attacks could be triggered by music, lighting or vibration.
In a private-public partnership, the University of Alabama at Birmingham has launched Malcovery, an intelligence company specializing in cyber threat detection, to help businesses protect themselves from cyberattacks. Malcovery uses patented forensic technology to identify the source and nature of immediate cyberattacks and analyze millions of cyberthreat angles to combat future crises.
Businesses have a growing need for internal auditors who can size up their data security policies and potential risks, said speakers at the recent UT Dallas Naveen Jindal School of Management’s 8th Annual Fraud Summit.
College cyber defenders will spend two days protecting a fictitious nation’s electronic voting system against expert computer hackers at the 2013 National CyberWatch Center Mid-Atlantic Regional Collegiate Cyber Defense Competition (CCDC), to be held at the Johns Hopkins University Applied Physics Laboratory (APL).
Activities at Sandia National Lab's cybercenter are expected to marry Sandia computing expertise with that of universities and businesses to develop unorthodox long-term solutions against the increasingly serious challenges posed by hackers and cybercriminals to individuals, business and government.
A Moscow-based computer-security firm led the world in tracking down the malware that sabotaged Iran's nuclear-fuel enrichment and inaugurated state-to-state cyberwar.
Recently a Los Alamos National Laboratory quantum cryptography (QC) team successfully completed the first-ever demonstration of securing control data for electric grids using quantum cryptography.
Sandia National Laboratories computer science researcher Jeremy Wendt wants to figure out how to recognize potential targets of nefarious emails and put them on their guard. The idea is to reduce the number of visitors that cyberanalysts have to check as possible bad guys among the tens of thousands who search Sandia websites each day.
Johns Hopkins computer security expert Avi Rubin is available for interviews on reports from the New York Times and Wall Street Journal that their computer systems have been targeted by Chinese hackers.
Researchers at the Georgia Tech Research Institute (GTRI) are working to counter threats from spear phishing. The attacks use knowledge of computer users to gain their trust to break into corportate networks.
Columbia Engineering researchers have found vulnerabilities in Cisco VoIP telephones, recently demonstrating how they can insert malicious code into a Cisco VoIP phone (any of the 14 Cisco Unified IP Phone models) and start eavesdropping on private conversations—not just on the phone but also in the phone’s surroundings—from anywhere in the world.
How unsafe are mobile browsers? Unsafe enough that even cyber-security experts are unable to detect when their smartphone browsers have landed on potentially dangerous websites, according to a recent Georgia Tech study.
Mimicking public health strategies, such as maintaining good “cyber hygiene,” could improve cyber security, according to a new paper by a team of economists and public health researchers at RTI International.
Cybercriminals and ordinary hackers are preparing, like bears at a trout stream, to steal our data, money, and identities. Here are some tips from a computer security expert at the University of Virginia.
Owen Arden, a graduate researcher in Cornell University’s Department of Computer Science whose research focuses on Internet and mobile data security, comments on the lesson to be learned from the scandal that followed the FBI’s investigation into emails associated with former CIA Director David Petraeus.
The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, escalating battles over the control of online information and continuous threats to the U.S. supply chain from global sources. Those were the findings released by the Georgia Tech Emerging Cyber Threats Report for 2013.
In every corner of the Internet, high-tech "phishers" are baiting their hooks as the holiday season begins, hoping to lure a prize catch--the account data and personal information of unsuspecting computer-users all across the country.
Dawn Woodard, a professor or Operations Research and Information Engineering who teaches courses on data mining, comments on privacy and data brokers in the wake of House and Senate investigations into data brokerage firms.
As of 2010, more than a third of all utility meters in the United States used wireless automatic meter reading (AMR) technology – 47 million in all. They make it a lot easier for the utility company to gather data on electricity, natural gas and water usage. But as a University of South Carolina research team has shown, it’s possible for their unencrypted broadcasts to be intercepted, giving a sophisticated eavesdropper a window into household activities.
As part of ongoing research to help prevent and mitigate disruptions to computer networks on the Internet, researchers at Sandia National Laboratories in California have turned their attention to smartphones and other hand-held computing devices.
UT Dallas computer scientists have developed a technique to automatically allow one computer in a virtual network to monitor another for intrusions, viruses or other kinds of threats.
Social media expert Ananda Mitra coined the word "narbs" to describe the small pieces of information floating in the digital sphere. His research shows that using social media to spread hate messages is a trend, not a fad, and that narb patterns may have predicted the violence in Libya.
New security mechanism uses proximity-detection approach to prevent “mafia fraud” attacks, theft of financial information.
Two professors are researching how to help computer users who have little to no computer experience improve their Web browsing safety without security-specific education. The goal is to keep users from making mistakes that could compromise their online security and to inform them when a security failure has happened.
Cybersecurity experts are working to keep medical devices — and the patients they help — safe from hackers.
To catch a thief, you have to think like one. UT Dallas computer scientists are trying to stay one step ahead of cyberattackers by creating their own monster. Their monster can cloak itself as it steals and reconfigures information in a computer program.
Top graduate students pursuing careers in cybersecurity worked alongside Sandia and other prominent cybersecurity experts in a weeklong summer institute sponsored by Sandia National Laboratories at the Livermore Valley Open Campus. Cyber Security Technology, Policy, Law, and Planning for an Uncertain Future, which followed last year’s institute on energy technology and policy, focused on cyber law, policy, information sharing and other cyber-related issues. Three mentors led the students through a robust series of high-level talks, discussions and workshops from Aug. 5-10.
While the cell phone is an amazingly useful device, using it for banking — and consumers are increasingly using mobile phones as banking tools — can lead to identity theft and other financial crimes, if reasonable precautions aren’t taken. “Anyone who has access to your cell phone has access to your identity in a few clicks,” says Elizabeth Baker, an assistant professor at Wake Forest University and an expert in information system security issues.
Do you have what it takes to be an ethical hacker? Now you can at least try, no matter what your background, with a new card game developed by University of Washington computer scientists.
During June, National Internet Safety Awareness Month, Drexel University’s Dr. Rob D’Ovidio, associate professor of criminal justice and director of the University’s program in computer crime and digital forensics, is available to comment on online safety, online privacy and a variety of cybercrime issues.