Intelligence leak creates significant problems on and off the battlefield
Cornell University
People reveal more personal information when you ask them the same questions a second time – according to new research from the University of East Anglia.
A new study has highlighted how cryptocurrency investors often suffer gambling-related harms – and online gambling outlets accepting cryptocurrency as wagers pose even greater risks
A technology developed at Oak Ridge National Laboratory and used by the U.S. Naval Information Warfare Systems Command to test the capabilities of commercial security tools has been licensed to cybersecurity firm Penguin Mustache to create its Evasive.ai platform.
Smartphone spyware apps that allow people to spy on each other are not only hard to notice and detect, they also will easily leak the sensitive personal information they collect, says a team of computer scientists from New York and San Diego.
Women may be underrepresented in STEM fields, but these CSU programs aim to change that.
Johns Hopkins University information security expert Anton Dahbura is available to discuss the Biden administration's newly released national cybersecurity strategy.
A cybersecurity technique that shuffles network addresses like a blackjack dealer shuffles playing cards could effectively befuddle hackers gambling for control of a military jet, commercial airliner or spacecraft, according to new research.
James Barr von Oehsen has been selected as the director of the Pittsburgh Supercomputing Center (PSC), a joint research center of Carnegie Mellon University and the University of Pittsburgh. Von Oehsen is a leader in the fields of cyberinfrastructure, research computing, advanced networking, data science and information technology.
Scientists have taken a step toward harnessing a form of artificial intelligence known as deep reinforcement learning, or DRL, to protect computer networks. DRL’s effectiveness at stopping adversaries from reaching their goals offers promise for a role for autonomous AI in proactive cyber defense.
An innovative engineering master’s program unveiled today by Digital Learning at NYU Tandon gives students flexibility to tailor their degree to their unique professional interests and aspirations. Students will have the opportunity to enroll in one of nine interdisciplinary concentrations – including in-demand fields like robotics, cybersecurity, and data science – all offered fully online.
U2opia Technology, a consortium of technology and administrative executives with extensive experience in both industry and defense, has exclusively licensed two technologies from the Department of Energy’s Oak Ridge National Laboratory that offer a new method for advanced cybersecurity monitoring in real time.
Below are some of the latest articles that have been added to the Space and Astronomy channel on Newswise, a free source for journalists.
Fear of what could go wrong is the greatest motivator when it comes to getting remote workers to protect their employer’s information technology security, according to a recent study in Computers & Security.
More than 250 MITRE employees were awarded over 100 patents in the past five years. These patent holders come from multiple disciplines and underrepresented populations, including 13.4% women.
The Center for Research toward Advancing Financial Technologies (CRAFT), a collaboration between Rensselaer Polytechnic Institute and Stevens Institute of Technology, is dedicated to advancing blockchain technology so that scams along the lines of FTX’s can be avoided. CRAFT researchers from Rensselaer recently presented their findings on blockchain interoperability and cryptocurrency scam detection at the 2022 IEEE International Conference on Big Data.
UTEP received a $5 million grant from NSF to provide financial support and professional development experiences to talented students in the field of computer science. The initiative will provide partial scholarships to 26 students at UTEP and to 15 students who start their college education at EPCC.
A slew of emerging technologies that rely on computers and integrated networks are vulnerable to cyberattack. Argonne National Laboratory tested a groundbreaking autonomous software tool to make them more secure at NATO’s flagship cyberdefense event.
“Robust” amendments to insurance law and international environmental law are needed to allow carbon capture, utilisation and storage to take place legally so the technology can be used in the fight against global warming, a new study says.
Feeling proud of your background is key to one’s mental health when dealing with online racism, a new study in the Journal of Applied Communication Research suggests.
Two years ago, several browsers that prioritize user privacy --- including Safari, Firefox, and Brave --- began to block third-party cookies for all users by default. Advertisers have responded by pioneering a new method for tracking users across the Web, known as user ID (or UID) smuggling, which does not require third-party cookies. But no one knew exactly how often this method was used to track people on the Internet.
To help prepare students for jobs in the multi-billion-dollar, microelectronics security market, MITRE is running an Embedded Capture the Flag (eCTF) competition from January to April in 2023. Beyond gaining valuable hands-on experience, student teams are eligible to win cash prizes. New this year, the eCTF is inviting sponsors to allow more students to participate and help close critical workforce talent gaps.
Researchers have joined forces to create a universal radio adapter that will enable seamless and secure operations through non-cooperative indigenous 5G networks for U.S. military, government and critical infrastructure systems.
Here are some of the latest articles that have been added to the Behavioral Science channel on Newswise, a free source for journalists.
The University of Utah College of Engineering and the United States Air Force are proud to announce a new education partnership that will create valuable learning opportunities for students and research projects that can advance technologies from wireless communications and cybersecurity to robotics and composite materials.
Although blockchain is best known for securing digital currency payments, researchers at the Department of Energy’s Oak Ridge National Laboratory are using it to track a different kind of exchange: It’s the first time blockchain has ever been used to validate communication among devices on the electric grid.
Irvine, Calif., Nov. 17, 2022 – Researchers at the University of California, Irvine have discovered that the safe operation of a negative pressure room – a space in a hospital or biological research laboratory designed to protect outside areas from exposure to deadly pathogens – can be disrupted by an attacker armed with little more than a smartphone.
Mobile devices that use Bluetooth are vulnerable to a glitch that could allow attackers to track a user’s location, a new study has found.
University of Washington researchers examined 44 3D tours in 44 states across the U.S. to look for potential security issues when personal details were included in the tour.
With electric vehicles becoming more and more common, the risks and hazards of a cyber attack on electric vehicle charging equipment and systems also increases. Jay Johnson, an electrical engineer at Sandia National Laboratories, has been studying the varied vulnerabilities of electric vehicle charging infrastructure for the past four years.
Researchers develop a 5G-enabled deep learning approach for classifying malware attacks on the Industrial Internet of Things
More than 140 U.S. college teams competed to test their cyber defense skills and protect a fictional electric vehicle manufacturer’s solar installation from simulated cyberattacks.
Abigail Gutierrez Deniz is a first-generation, Latina student working to pursue her goal of working in cybersecurity.
A research team based out of the University of Waterloo has developed a drone-powered device that can use WiFi networks to see through walls.
U.S. schools and school districts have shared an estimated 4.9 million posts that include identifiable images of students on public Facebook pages, unintentionally putting student privacy at risk, according to a new study.
Cybersecurity professionals are in high demand. The Department of Energy tasks Argonne National Laboratory with challenging and inspiring college-age students to compete against one another to outsmart cyberattackers in a simulated threat scenario.
The University of Arkansas at Little Rock, a leader in cybersecurity education, has received a nearly $800,000 grant from the National Security Agency (NSA) to expand a national cybersecurity education program for teachers, as well as develop a standardized curriculum to build pathways for cybersecurity education between high schools and colleges.
The University of Arkansas at Little Rock has received a nearly $150,000 grant from the National Security Agency to hold a year’s worth of free cybersecurity educational events for junior high and high school students in Arkansas. UA Little Rock will partner with Philander Smith College to host the 2nd Arkansas GenCyber Strength Training camp in Arkansas, which will support the state’s long-term investment in secondary school cybersecurity education.
ASU business professor says cyber adversaries will look to midterm elections to stir the pot with voters, with most of the hyperbolic chatter coming from malicious bots spreading racism and hate on social media and in the comments section on news sites.
Elder financial and high-tech fraud costs seniors over $3 billion each year. Salisbury University hopes a $2.6 million federal grant to expand its law enforcement partnership will curb that number while helping students enter the forensic accounting profession and saving costs.
Experts at the San Diego Supercomputer Center at UC San Diego, San Diego State University and California State University, San Bernardino will apply NSF support to train and mentor a cohort of cyberinfrastructure professionals who will work closely with scientists to meet their computational needs.
According to research by a Cornell University SC Johnson College of Business professor and colleagues, it’s highly likely that a survey participant’s identity and other sensitive information can be traced back to the individual.