Breaking News: Cybersecurity

Filters close
Released: 11-Apr-2017 10:05 PM EDT
Your Phone's Power Use Can Give Hackers an Opening
NYIT

Experts have long known the risks associated with charging a smartphone using a USB cord that can also transfer data, but new research shows that even without data wires, hackers using a "side channel" can quickly find out what websites a user has visited while charging a device.

Released: 11-Apr-2017 2:05 PM EDT
Professors Discuss Consequences of 'Brain-Hacking' Software for Smartphones
California State University, Dominguez Hills

Anderson Cooper visited CSU Dominguez Hills for story about the effects of habit-forming smartphone applications.

Released: 11-Apr-2017 1:05 PM EDT
Internet Atlas Maps the Physical Internet to Enhance Security
University of Wisconsin–Madison

Despite the internet-dependent nature of our world, a thorough understanding of the internet’s physical makeup has only recently emerged, thanks to painstaking work by University of Wisconsin-Madison researchers and their collaborators.

Released: 6-Apr-2017 2:05 PM EDT
Lenvio Inc. Exclusively Licenses ORNL Malware Behavior Detection Technology
Oak Ridge National Laboratory

Virginia-based Lenvio Inc. has exclusively licensed a cyber security technology from the Department of Energy’s Oak Ridge National Laboratory that can quickly detect malicious behavior in software not previously identified as a threat.

Released: 6-Apr-2017 11:55 AM EDT
MSU Adds Master’s Program in Cyber Security and Operations
Mississippi State University

Building on its robust cyber security research and education programs, Mississippi State University is launching a master’s program in cyber security and operations.

Released: 6-Apr-2017 3:00 AM EDT
Educating and Strengthening the Cybersecurity Workforce
California State University (CSU) Chancellor's Office

As Americans become more dependent on modern technology, the demand to protect the nation's digital infrastructure will continue to grow. In an effort to produce career-ready cybersecurity professionals and to combat cybercrime nationwide, the California State University is creating unique educational opportunities for students and faculty members.

Released: 5-Apr-2017 11:05 AM EDT
High-Schooler Solves College-Level Security Puzzle From Argonne, Sparks Interest in Career
Argonne National Laboratory

15-year-old Jocelyn Murray and her classmates solved a series of college-level cyber puzzles. This weekend they had a front row seat to watch college-level competitors who are older and more experienced defend their networks from constant attack.

Released: 3-Apr-2017 1:05 PM EDT
Google's AI Tool for Video Searches Can Be Easily Deceived
University of Washington

University of Washington security researchers have shown that Google’s new tool that uses machine learning to automatically analyze and label video content can be deceived by inserting a photograph periodically into videos. After they inserted an image of a car into a video about animals, for instance, the system thought the video was about an Audi.

Released: 3-Apr-2017 12:05 PM EDT
Risk of Data Breaches at Hospitals Is Greater at Larger Facilities and Those with Major Teaching Mission
Johns Hopkins University Carey Business School

The risk of data breaches at U.S. hospitals is associated with larger facilities and hospitals that have a major teaching mission, according to a study published online today by JAMA Internal Medicine.

28-Mar-2017 4:15 PM EDT
Android Apps Can Conspire to Mine Information From Your Smartphone
Virginia Tech

Virginia Tech researchers have recently discovered that the same apps we use on our phones to organize lunch dates, make online purchases, and communicate the most intimate details of our existence have secretly been colluding to mine our information.

     
Released: 29-Mar-2017 10:05 AM EDT
Making America’s Power Grid Much, Much Smarter
Vanderbilt University

A new, open-source software platform has been designed to support applications required to create a smart power grid and protect it from dangers ranging from terrorists to falling tree limbs.

Released: 21-Mar-2017 11:05 AM EDT
New Brain-Inspired Cybersecurity System Detects ‘Bad Apples’ 100 Times Faster
Sandia National Laboratories

The Neuromorphic Cyber Microscope can look for the complex patterns that indicate specific “bad apples,” all while using less electricity than a standard 60-watt light bulb, due to its brain-inspired design.

Released: 17-Mar-2017 2:05 PM EDT
Arkansas Professor and Student to Lead NATO Training Course on Social Media Analysis
University of Arkansas at Little Rock

Dr. Nitin Agarwal, Jerry L. Maulden-Entergy chair and professor of information science at the University of Arkansas at Little Rock, and his doctoral student, Nihal Hussain, will conduct a four-day social media analysis training course for NATO Strategic Communications Center of Excellence (STRATCOM COE) at the Latvian Defense Academy March 21-24.

Released: 14-Mar-2017 11:05 AM EDT
Research Examines Susceptibility to Cyberattacks Through Brain Activity, Eye Gaze
University of Alabama at Birmingham

UAB doctoral student Ajaya Neupane awarded highly competitive $50,000 fellowship to continue research using neuroimaging devices to examine internet users’ susceptibility to cyberattacks.

Released: 8-Mar-2017 6:05 PM EST
Experts to Discuss Trolls, Bots, and Fake News at South Big Data Hub Roundtable
University of Arkansas at Little Rock

Four experts will participate in a roundtable discussion that will be broadcast as a free webcast on March 9 and explore how trolls, bots, and fake news are shaping conversations and shifting public discourse in an online environment.

Released: 8-Mar-2017 11:05 AM EST
Using Game Theory to Predict Cyberattacks on Elections and Voting Machines
Vanderbilt University

America’s president isn’t the only one considering the possibility of rigged elections. Vanderbilt University’s Yevgeniy Vorobeychik, assistant professor of computer science and computer engineering, spent much of last year researching how and why someone would want to tamper with an election and then developing an algorithm to protect against those efforts.

Released: 7-Mar-2017 4:05 AM EST
Cyberbullying Rarely Occurs in Isolation, Research Finds
University of Warwick

Cyberbullying is mostly an extension of playground bullying – and doesn’t create large numbers of new victims - according to research from the University of Warwick.

Released: 2-Mar-2017 9:05 AM EST
Story Tips From the Department of Energy’s Oak Ridge National Laboratory, March 2017
Oak Ridge National Laboratory

Rapid prototyping aids small manufacturer; accelerated method could separate CO2 from flue gases; EBM technique controls microstructure, locates properties in 3-D printed parts; open-source, user-friendly software monitors, controls energy use; drones to aid electric utilities to enhance safety, system reliability; ORNL cyberspace conf.

Released: 28-Feb-2017 4:05 PM EST
DHS S&T Welcomes First Canadian Exchange Officer
Homeland Security's Science And Technology Directorate

DHS S&T welcomed its first Canadian Exchange Officer today as part of a partnership with Defence Research and Development Canada’s Centre for Security Science.

Released: 28-Feb-2017 12:05 PM EST
UW Security Researchers Show That Google’s AI Platform for Defeating Internet Trolls Can Be Easily Deceived
University of Washington

University of Washington researchers have shown that Google’s new machine learning-based system to identify toxic comments in online discussion forums can be bypassed by simply misspelling or adding unnecessary punctuation to abusive words, such as “idiot” or “moron.”

Released: 23-Feb-2017 8:20 AM EST
Virginia Cyber Range Names Amazon Web Services as Preferred Partner
Virginia Tech

AWS will join the Commonwealth of Virginia and Virginia Tech to support scalable cloud infrastructure and collaborate on cybersecurity educational efforts, enabling the Cyber Range with both content and a closed network for hands-on exercises, competitions, and other simulations.

Released: 21-Feb-2017 9:00 AM EST
Nationwide Teen Bullying and Cyberbullying Study Reveals Significant Issues Impacting Youth
Florida Atlantic University

In one of the latest and most ambitious studies on bullying and cyberbullying in middle and high school students, researchers found that 1 in 5 students said that they had been threatened with a weapon at school, 73 percent of students reported that they had been bullied at school at some point in their lifetime, and 70 percent of the students said that someone spread rumors about them online.

Released: 17-Feb-2017 4:05 PM EST
Hacking the Way to Safer, Brighter City Streets
University of Nevada, Las Vegas (UNLV)

Team Wingin' It, a five-member team of UNLV students and alumni, won the $10K grand prize at the Consumer Electronics Show life-hack competition for their clever approach to tracking City of Las Vegas streetlight outages. The city is now looking to implement their invention.

Released: 16-Feb-2017 10:05 AM EST
Turning Back DDoS Attacks
Homeland Security's Science And Technology Directorate

To counter DDoS attacks, the S&T Homeland Security Advanced Research Projects Agency’s Cyber Security Division (CSD) is funding several research projects that will help defenders turn away attacks.

Released: 13-Feb-2017 9:05 AM EST
Simulated Ransomware Attack Shows Vulnerability of Industrial Controls
Georgia Institute of Technology

Cybersecurity researchers at the Georgia Institute of Technology have developed a new form of ransomware that can take over control of a simulated water treatment plant. After gaining access, they were able to command programmable logic controllers (PLCs) to shut valves, increase the amount of chlorine added to water, and display false readings.

Released: 10-Feb-2017 11:05 AM EST
Protecting Bulk Power Systems From Hackers
Michigan Technological University

Most of us take turning the lights on for granted. In reality, the energy we draw from the electrical grid to brighten homes, freeze food and watch TV is part of a complicated and widespread system. Understanding that system's vulnerabilities and reliability is a crucial step towards improving its security.

Released: 9-Feb-2017 4:05 PM EST
DHS to Hold Emerging Technology Showcase for First Responder Innovation
Homeland Security's Science And Technology Directorate

DHS S&T will host the EMERGE 2016: Wearable Technology Showcase to present the results of the 10 startup companies that were part of this year’s cohort class.

     
7-Feb-2017 2:00 PM EST
New System Makes It Harder to Track Bitcoin Transactions
North Carolina State University

Researchers have developed a Bitcoin-compatible system that could make it significantly more difficult for observers to identify or track the parties involved in any given Bitcoin transaction.

Released: 7-Feb-2017 11:05 AM EST
Need Head-to-Head Comparison Data on Responder Tech? We've Got You Covered
Homeland Security's Science And Technology Directorate

SAVER reports help first responders see the pros and cons, easily review the specs, and make a better purchasing decisions.

     
Released: 6-Feb-2017 11:05 AM EST
Blockchain Technology Explored for Homeland Security
Homeland Security's Science And Technology Directorate

If these research projects bear fruit, S&T will begin developing ways to implement blockchain technology to better safeguard the American people, our homeland and our values.

     
Released: 6-Feb-2017 11:05 AM EST
DHS S&T to Demonstrate Cyber Technologies at RSA 2017
Homeland Security's Science And Technology Directorate

DHS S&T will exhibit and demonstrate 12 mature cyber security technology solutions ready for pilot deployment and commercialization at RSA 2017 cybersecurity conference, February 14-16, in San Francisco.

     
Released: 19-Jan-2017 11:05 AM EST
MEDIA ADVISORY: What Happens When Hackers Hijack Our Smart Devices?
 Johns Hopkins University

Johns Hopkins cybersecurity expert Avi Rubin warns that our increasing reliance on Internet-connected add-ons to our home appliances and vehicles could yield unwelcome consequences.

Released: 18-Jan-2017 10:05 AM EST
Heartbeat Could Be Used as Password to Access Electronic Health Records
Binghamton University, State University of New York

Researchers at Binghamton University, State University of New York have devised a new way to protect personal electronic health records using a patient’s own heartbeat.

   
Released: 9-Jan-2017 11:05 AM EST
Study Shows How Phishing Scams Thrive on Overconfidence
University of Texas at San Antonio

Overconfident e-mail recipients are helping phishing succeed

Released: 5-Jan-2017 5:05 PM EST
CSU Dominguez Hills Presents LAEDC’s ‘Future Forums: Cyber Security’
California State University, Dominguez Hills

Leaders in digital technology, education, business, and city governance gathered in El Segundo Dec. 14 for Los Angeles County Economic Development Corporation’s (LAEDC) Future Forums: Cyber Security to address society’s increasing vulnerability to cyber threats.

Released: 5-Jan-2017 9:05 AM EST
Novel Research Demonstrates Improvements in Board-Level IT Governance in Firms That Experience Cyber Attacks
Whitman School of Management at Syracuse University

New research from Martin J. Whitman School of Management at Syracuse University finds that when companies experience operational IT failures, such as a data breach, they make changes to their boards of directors in order to improve oversight and monitoring of IT resource utilization. The study also observes that the board-changes are proportional to the magnitude of drop in stock prices that companies often experience upon suffering an IT failure.

Released: 3-Jan-2017 8:05 AM EST
Streamlining the Internet of Things and Other Cyber-Physical Systems
Michigan Technological University

In an Institute of Electrical and Electronics Engineers (IEEE) keynote paper, computer engineers lay out a framework to improve research on cyber-physical systems. They encourage combining model-based design with data-based learning: in other words, merge two existing paradigms into one practice.

Released: 21-Dec-2016 2:30 PM EST
Center for the Digital Future Publishes Findings on Global Impact of Digital Technology
USC Annenberg School for Communication and Journalism

USC Annenberg’s CDF has released the seventh edition of the 2016 World Internet Project International Report, which compiles data on the behavior and views of Internet users and non-users worldwide.

Released: 20-Dec-2016 4:05 PM EST
Top 9 Results From The Largest Study of Technical Support Scams
Stony Brook University

​Computer Science researchers from Stony Brook University in New York have concluded the largest study of technical support scams to date, spanning 8 months, and following are the top 9 findings:

Released: 13-Dec-2016 11:05 AM EST
DHS S&T Transition to Practice Program Transitions Eighth Cybersecurity Technology for Commercialization
Homeland Security's Science And Technology Directorate

DHS S&T has announced the eighth cybersecurity technology transitioning to commercialization as a part of its Cyber Security Division’s Transition to Practice program.

     


close
1.47452