Breaking News: Cybersecurity

Filters close
24-Feb-2016 4:05 PM EST
Is Zero-Effort Computer Security a Dream? Breaking a New User Verification System
University of Alabama at Birmingham

Study shows that, although ZEBRA, a system intended to enable prompt and user-friendly deauthentication, works very well with honest people, opportunistic attackers can fool the system.

Released: 16-Feb-2016 1:05 PM EST
Cyber Thieves Making Millions in Profits
Michigan State University

Cyber thieves who steal credit and debit card numbers are making millions of dollars in profits, fueling a global criminal enterprise marked by the high-profile data breaches of major companies such as Target and Home Depot.

   
Released: 10-Feb-2016 6:05 AM EST
DHS S&T Hosts Cyber Security Research & Development Showcase
Homeland Security's Science And Technology Directorate

DHS S&T Cyber Security R&D Showcase will provide technology investors, integrators and IT companies info on S&T-funded research and development on technologies, tools and techniques that can strengthen the nation's cyber security posture.

Released: 2-Feb-2016 1:05 PM EST
DHS S&T Awards Minneapolis Company $2.2M for Medical Device Cyber Security Research
Homeland Security's Science And Technology Directorate

The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) awarded $2.2 million to Adventium Enterprises of Minneapolis for the development of technology that can help defend medical devices from cyber-attacks.

Released: 1-Feb-2016 1:05 PM EST
Hyperion Cyber Security Tech Receives Commercialization Award
Oak Ridge National Laboratory

The commercial licensing of a cyber security technology developed at the Department of Energy's Oak Ridge National Laboratory has been recognized by the Federal Laboratory Consortium for Technology Transfer (FLC) as a top example of moving technology to the marketplace.

Released: 29-Jan-2016 3:05 PM EST
Solutions for Cybersecurity Gaps and Challenges -- S&T Has Tech for That!
Homeland Security's Science And Technology Directorate

DHS S&T showcased technologies to private industry cybersecurity investor, integrators and IT professionals and provided live in-depth demonstrations of the technologies.

Released: 28-Jan-2016 4:05 PM EST
PNNL Moves Cybersecurity Software and a Novel Disinfecting System Beyond the Lab
Pacific Northwest National Laboratory

Software that helps cybersecurity analysts prevent hacks and a microbial disinfecting system that kills with an activated salt spray are two of the latest innovations Pacific Northwest National Laboratory has successfully commercialized with the help of business partners. The Federal Laboratory Consortium has honored the two teams with 2016 Excellence in Technology Transfer awards.

Released: 27-Jan-2016 1:05 PM EST
Stanford Experts Reveal Latest “Doomsday Clock” Estimate
Stanford University

The world remains perilously close to a nuclear disaster or catastrophic climate change that could devastate humanity, according to Stanford experts and California Governor Jerry Brown, who were on hand to unveil the latest update to the Bulletin of Atomic Scientists’ “doomsday clock” on Tuesday.

Released: 25-Jan-2016 8:00 AM EST
Iowa State Engineers Build Cyber Security Testbed to Help Protect the Power Grid
Iowa State University

Iowa State engineers have built the "PowerCyber" testbed to help researchers, industry engineers and students learn to protect the cyber security of the power grid. The end goal is to help create a future electric power grid that is secure and resilient.

Released: 21-Jan-2016 8:05 AM EST
Defending Your Computer From Cyber-Attacks, Sun Tzu Style
University of Florida

We want our computers to perform the way we expect. But what if the key to defeating malware is introducing a bit of chaos?

Released: 15-Jan-2016 1:05 PM EST
Better Design Improves Understanding of Online Privacy Notices
Carnegie Mellon University

Privacy policies for websites, smartphone apps and, especially, components of the emerging Internet of Things are usually ineffective or ignored by users, but Carnegie Mellon University researchers say properly designed privacy notices — pushed out to users at appropriate times — could help remedy that problem.

   
Released: 14-Jan-2016 12:05 PM EST
What Does a Trusted Cyber Future Look Like?
Homeland Security's Science And Technology Directorate

DHS S&T’s Cyber Security Division held both online and in-person discussions around the country to engage a wide range of stakeholders to determine where the division should focus next in cyber security research and development.

Released: 9-Dec-2015 12:05 PM EST
DHS S&T Awards $7.8 Million for Cyber Physical System Security Research
Homeland Security's Science And Technology Directorate

The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) today announced the award of five contracts totaling $7.8 million for research on technologies to help defend against attacks on cyber physical systems.

Released: 17-Nov-2015 10:05 AM EST
Managing the Data Deluge for National Security Analysts
Sandia National Laboratories

National security analysts often find that available data is growing much faster than analysts’ ability to observe and process it. Sometimes they can’t make key connections and often they are overwhelmed struggling to use data for predictions and forensics. Sandia National Laboratories’ Pattern Analytics to Support High-Performance Exploitation and Reasoning (PANTHER) team has developed solutions that will enable analysts to work smarter, faster and more effectively when looking at huge, complex amounts of data in real-time, stressful environments where the consequences might be life or death.

Released: 16-Nov-2015 5:05 PM EST
Pacific Northwest National Laboratory Scientists Win Five R&D 100 Awards
Pacific Northwest National Laboratory

Technologies that impact cyber security, increase our ability to detect trace amounts of chemicals, convert sewage into fuel, view energy processes under real-world conditions and forecast future electric needs are among the newest R&D 100 award winners at Pacific Northwest National Laboratory.

Released: 11-Nov-2015 11:05 AM EST
Focusing on User Habits Key to Preventing Email Phishing, According to UB Research
University at Buffalo

The cumulative number of successful phishing cyberattacks has risen sharply over the last decade, and in 2014 that figure surged past the total U.S. population, according to a University at Buffalo expert in cyber deception.

Released: 5-Nov-2015 10:05 AM EST
Shields Up: Colorado State Researchers Are Making the Internet More Secure
Colorado State University

A Colorado State University-led team is developing a service that can sniff out, ward off and protect against large-scale online attacks known as Distributed Denial of Service, or DDoS, attacks.

Released: 5-Nov-2015 9:05 AM EST
Your Printer Just Got a Little More Secure
Homeland Security's Science And Technology Directorate

Hewlett-Packard (HP) recently licensed one-of-a-kind technology – called Symbiote – from Red Balloon Security, to protect its printers from cyber attacks.

Released: 23-Oct-2015 12:05 PM EDT
UAB Research Studies Cyberattacks Through the Lens of EEG and Eye Tracking
University of Alabama at Birmingham

Computer & Information Sciences researchers tested users’ abilities to detect malware and phishing attacks while measuring the neurophysiological behavior underlying these tasks.

Released: 16-Oct-2015 6:05 PM EDT
Think Again Before Tapping the Install Button for That App
Human Factors and Ergonomics Society

The results from a recent study showed that multitasking when using mobile devices creates stress and increases the potential for choosing unsafe apps.

Released: 15-Oct-2015 2:05 PM EDT
Think Twice About Android Root
University of California, Riverside

In first-of-its-kind study, UC Riverside engineers quantify amount of Android root exploits available in commercial software and show that they can be easily abused

Released: 13-Oct-2015 6:05 AM EDT
Is Your Digital Information More at Risk Today Than It Was Ten Years Ago?
Lawrence Berkeley National Laboratory

Researchers at University of New Mexico and the Lawrence Berkeley National Laboratory say cybersecurity breeches are not happening more frequently than they did a decade ago. And these data breaches in general are not growing in size.

9-Oct-2015 3:05 PM EDT
New Research Method Identifies Stealth Attacks on Complicated Computer Systems
Virginia Tech

Three Virginia Tech computer scientists are unveiling a novel approach to discovering stealth attacks on computers at the annual ACM Conference on Computer and Communications Security.

Released: 9-Oct-2015 6:05 PM EDT
New Research Center Will Focus on Cybersecurity of Nation’s Power Grid
University of Arkansas, Fayetteville

University of Arkansas engineering researchers, focused on solid-state solutions to upgrade the U.S. power grid, will lead a new national center devoted to cybersecurity for electric power utilities. The center is made possible by a $12.2 million grant from the U.S. Department of Energy, augmented by $3.3 million in matching funds from the research partners.

Released: 1-Oct-2015 5:05 PM EDT
Three Questions With: Ames Laboratory Cybersecurity Manager and Researcher Chris Strasburg
Ames National Laboratory

Ames Laboratory's Chris Strasburg discovered an interest in research while working in systems support and cybersecurity. He’s now the U.S. Department of Energy's Ames Laboratory’s cybersecurity manager and working toward a Ph.D. in computer science at Iowa State University, studying artificial intelligence approaches, automation of computer languages, and network security.

Released: 29-Sep-2015 4:05 PM EDT
New York Cybersecurity Company Licenses ORNL’s Data Diode
Oak Ridge National Laboratory

Lock Data Solutions has licensed a technology from the Department of Energy’s Oak Ridge National Laboratory designed to protect a company’s data from internal and external threats.

Released: 9-Sep-2015 3:05 AM EDT
Making IoT Configuration More Secure and Easy-to-Use
University of Southampton

With an ever increasing number of everyday objects from our homes, workplaces and even from our wardrobes, getting connected to the Internet, known as the ‘Internet of Things (IoT), researchers from the University of Southampton have identified easy-to-use techniques to configure IoT objects, to make them more secure and hence help protect them from online attacks.

Released: 1-Sep-2015 12:05 PM EDT
Top Stories 1 September 2015
Newswise Trends

Click to see today's top stories.

       
Released: 31-Aug-2015 11:05 AM EDT
DHS S&T Announces Licensing of Cyber Security Network Anomaly-Detection Technology
Homeland Security's Science And Technology Directorate

The PathScan® technology, developed by Los Alamos National Laboratory is a network anomaly-detection tool that is being licensed to Ernst & Young LLP (EY).

Released: 21-Aug-2015 1:05 PM EDT
NYIT Annual Cybersecurity Conference: Threats, Innovations, and New Frontiers
NYIT

Sixth NYIT cybersecurity conference at NYIT Auditorium on Broadway features academic, corporate, and governmental cyber experts, plus a mobile security workshop.

Released: 18-Aug-2015 11:05 AM EDT
International Contest Asks Hackers to Write “Evil” Code
Binghamton University, State University of New York

While most hackathons and programming contests encourage participants to develop usable software, a contest hosted by Binghamton University’s Scott Craver asks users to develop code that is “subtly evil.”

Released: 13-Aug-2015 11:05 AM EDT
Georgia Tech Finds 11 Security Flaws in Popular Internet Browsers Using New Analysis Method
Georgia Institute of Technology

Researchers from the Georgia Institute of Technology College of Computing developed a new cyber security analysis method that discovered 11 previously unknown Internet browser security flaws.

Released: 6-Aug-2015 9:05 AM EDT
Researchers Developing Architecture to Build Cybersecurity Into Systems
University of Alabama Huntsville

A lightweight virtualization architecture that can be used to build cybersecurity into systems used in the so-called Internet of Things is being developed by a research team at The University of Alabama in Huntsville (UAH).

Released: 4-Aug-2015 2:05 PM EDT
Cybersecurity Experts to Discuss Tricky Balance between Data Sharing and Privacy
 Johns Hopkins University

The second annual Senior Executive Cybersecurity Conference (Thursday, Sept. 10, at the Johns Hopkins University in Baltimore) will focus on the conflict between crime fighting and privacy. Early-bird discount registration prices are in effect through Aug. 15.

Released: 24-Jul-2015 8:05 AM EDT
DHS S&T Awards $2.9 Million for Mobile App Security Research
Homeland Security's Science And Technology Directorate

The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) today announced a $2.9 million cybersecurity mobile app security (MAS) research and development (R&D) award that will help identify mobile app vulnerabilities.

Released: 22-Jul-2015 12:00 PM EDT
Computer Security Tools for Journalists Lacking in a Post-Snowden World
University of Washington

Despite heightened awareness of surveillance tactics and privacy breaches, existing computer security tools aren't meeting the needs of journalists working with sensitive material, a new UW study finds.

Released: 17-Jul-2015 2:05 PM EDT
DHS S&T Applies Mobile App Archiving Technology to Copyright Infringement
Homeland Security's Science And Technology Directorate

Today, the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) announced that their mobile apps archiving technology has expanded the capability to track copyright infringement in mobile apps.

Released: 15-Jul-2015 11:05 AM EDT
Improving Cybersecurity!
Homeland Security's Science And Technology Directorate

This is S&T’s third technology that has successfully gone through the Transition to Practice (TTP) program and into the commercial market. The Network Mapping System (NeMS), developed by Lawrence Livermore National Laboratory, is a software-based tool that tells users what is connected to their network so that they know what needs to be protected.

Released: 13-Jul-2015 4:05 PM EDT
Robotics and the Law: When Software Can Harm You
University of Washington

Twenty years in, the law is finally starting to get used to the Internet. Now it is imperative, says Ryan Calo, assistant professor in the UW School of Law, that the law figure out how to deal effectively with the rise of robotics and artificial intelligence.

Released: 2-Jul-2015 11:05 AM EDT
Encryption Made Easier: Just Talk Like a Parent
Georgia Institute of Technology

A Georgia Institute of Technology researcher has created an easier email encryption method – one that sounds familiar to parents who try to outsmart their 8-year-old child. The new technique gets rid of the complicated, mathematically generated messages that are typical of encryption software. Instead, the method transforms specific emails into ones that are vague by leaving out key words.



close
1.36793