Leaders in digital technology, education, business, and city governance gathered in El Segundo Dec. 14 for Los Angeles County Economic Development Corporation’s (LAEDC) Future Forums: Cyber Security to address society’s increasing vulnerability to cyber threats.
New research from Martin J. Whitman School of Management at Syracuse University finds that when companies experience operational IT failures, such as a data breach, they make changes to their boards of directors in order to improve oversight and monitoring of IT resource utilization. The study also observes that the board-changes are proportional to the magnitude of drop in stock prices that companies often experience upon suffering an IT failure.
In an Institute of Electrical and Electronics Engineers (IEEE) keynote paper, computer engineers lay out a framework to improve research on cyber-physical systems. They encourage combining model-based design with data-based learning: in other words, merge two existing paradigms into one practice.
USC Annenberg’s CDF has released the seventh edition of the 2016 World Internet Project International Report, which compiles data on the behavior and views of Internet users and non-users worldwide.
Computer Science researchers from Stony Brook University in New York have concluded the largest study of technical support scams to date, spanning 8 months, and following are the top 9 findings:
DHS S&T has announced the eighth cybersecurity technology transitioning to commercialization as a part of its Cyber Security Division’s Transition to Practice program.
The Department of Homeland Security Science and Technology Directorate (S&T) and the Association of Public-Safety Communications Officials (APCO) International recently announced a partnership to ensure security and interoperability of mobile applications used by the public safety community.
DHS S&T will host an industry day to connect technology startups and investors to new opportunities for research and development of cybersecurity active defenses for the nation’s financial services sector critical infrastructure.
Randal Vaughn, Ph.D., professor of information systems in Baylor University’s Hankamer School of Business, said that while most online merchants he uses such as Jet.com and Amazon seem to have excellent consumer protections in place, he has a few tips to help consumers be smart online shoppers.
A University of Arkansas at Little Rock professor and two doctoral students recently got a chance to unveil their research on cyber defense at an international NATO conference. The talk, “Understanding Influence Operations of Novorossiya through Blogs and Twitter,” detailed the research team’s monitoring of social media responses to NATO exercises Operation Brilliant Jump and Anakonda over the summer. Specifically, they tracked how anti-NATO groups reacted to information released by NATO and media coverage of the exercises via social media.
Fighting computer viruses isn’t just for software anymore. Binghamton University researchers will use a grant from the National Science Foundation to study how hardware can help protect computers too.
A new report from the GW Center for Cyber and Homeland Security offers the most comprehensive assessment to date of the legal, policy and technological contexts that surround private sector cybersecurity and active defense measures to improve U.S. responses to evolving threats.
Indiana University School of Informatics and Computing researchers have received $1.8 million from the National Science Foundation to ensure that door locks, lightbulbs, cameras and other common household items, which are increasingly connected to the internet, remain secure.
Researchers from Binghamton University—State University of New York and the University of California, Riverside have found a weakness in the Haswell central processing unit (CPU) components that makes common computer operating systems vulnerable to malicious attacks.
Computer hackers could take control of individual, company and government computers if a weak point in address space layout randomization (ASLR) software is exploited by manipulating a CPU’s branch predictor, a piece of hardware designed to improve program performance.
Most white-hat hackers believe hackers will exploit cyber vulnerabilities to remotely access connected vehicles. A DHS S&T's CSD objective is to identify key vehicle cybersecurity challenges and find solutions that will reduce the risk of cyber-attacks.
Paolo Gasti, Ph.D., assistant professor of Computer Science at NYIT, and a team of researchers has been awarded nearly $300,000 from the National Science Foundation for the research project: “Towards Energy-Efficient Privacy-Preserving Active Authentication of Smartphone Users.”
A study of 20 major cloud hosting services has found that as many as 10 percent of the repositories hosted by them had been compromised – with several hundred of the “buckets” actively providing malware. Such bad content could be challenging to find, however, because it can be rapidly assembled from stored components that individually may not appear to be malicious.
Irvine, Calif., Oct. 18, 2016 – If you type on your desktop or laptop computer’s keyboard while participating in a Skype call, you could be vulnerable to electronic eavesdropping, according to researchers at the University of California, Irvine and in Italy.
Fifteen percent of sixth-grade students reported they had perpetrated at least one form of abuse toward a dating partner through technology, according to a new study from The University of Texas Health Science Center at Houston (UTHealth) School of Public Health.
Although most children use their smartphones and social media apps in appropriate ways, about 25 percent will experience online bullying at some point.
Government, private-sector integrators and investment firms were invited to see a variety of novel technologies available for operational use during the event.
The technical achievements of two Sandia National Laboratories innovators will be recognized with 2016 Hispanic Engineer National Achievement Awards Conference (HENAAC) Awards from Great Minds in STEM, an organization supporting careers in science, technology, engineering and math.
University of Washington engineers have devised a way to send secure passwords through the human body using smartphone fingerprint sensors and laptop touchpads -- rather than over the air where they're vulnerable to hacking.
Nova Southeastern University (NSU) officially opened its Center for Collaborative Research (CCR), one of the largest and most advanced research facilities in Florida.
As part of the ceremony, which was held September 21, NSU announced a gift from AutoNation to name NSU’s AutoNation Institute for Breast and Solid Tumor Cancer Research, located within the CCR. The Institute is focused on developing and advancing improved methods of prevention and treatment to ultimately eradicate cancer. The gift to name NSU’s AutoNation Institute brings the company’s cumulative giving to NSU to more than $10 million.
The National Institute of Science and Technology (NIST) is holding a field hearing on cybersecurity at American University and hosted by AU's Kogod Cybersecurity Governance Center.
University at Buffalo researchers illustrate how smartphones, due to their ubiquity and sophisticated gadgetry, can easily hack 3-D printers by measuring ‘leaked’ energy and acoustic waves that emanate from the printers. The work is eye-opening because it shows how anyone with a smartphone — from a disgruntled employee to an industrial spy — might steal intellectual property from an unsuspecting business.
The cybersecurity job market is wide open. "We're gong to need as many people as possible to 'hit the ground running' to meet the demand, says IT careers analyst.
Spotting a glitch on the factory floor in real time—and reconfiguring around it—are the goals of a new $4 million project led by University of Michigan engineering researchers.
A computer science professor from Missouri University of Science and Technology will join top government hackers, corporate risk managers and information technology professionals at the inaugural Governor’s Cybersecurity Summit this week in Jefferson City, Missouri.
Zachary King spent the summer researching how to keep cars safe from cyberattacks during an intensive eight-week cybersecurity summer research program at the University of Arkansas at Little Rock.
On Tuesday, August 23, 2016, the University of Minnesota Technological Leadership Institute (TLI) will host an open meeting of the U.S. Commission on Enhancing National Cybersecurity. The University of Minnesota is one of just five locations where the Commission is hosting meetings.
There are plenty of tech jobs in the Asia-Pacific, but the mismatch and shortage of engineering talent in much of the region has resulted in more companies creating programs aimed at upgrading the skills of engineers.
Scientists at Queen Mary University of London (QMUL) have revealed the network infrastructure used by Netflix for its content delivery, by mimicking the film request process from all over the world and analysing the responses.
At the USENIX Security Conference in Austin, Texas, a team of University of Washington researchers on Aug. 12 presented the first-ever comprehensive analysis of third-party web tracking across three decades and a new tool, TrackingExcavator, which they developed to extract and analyze tracking behaviors on a given web page. They saw a four-fold increase in third-party tracking on top sites from 1996 to 2016, and mapped the growing complexity of trackers stretching back decades.
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has awarded $1.3 million to 13 small businesses for the development of new cyber security technology.