Online shoppers can protect their identities and financial account numbers by following five safety tips this holiday season, says Gary Warner, international cyber-crime consultant and director of research in computer forensics at the University of Alabama at Birmingham College of Arts and Sciences.
In an effort to increase the number of women and minorities in the field of cyber-security, Missouri University of Science and Technology is working with the University of Arkansas at Pine Bluff to develop a new program for undergraduate students.
One of the serious threats to a user’s computer is a software program that might cause unwanted keystroke sequences to occur in order to hack someone’s identity. An authentication framework called “Telling Human and Bot Apart” has been developed to combat such attacks.
In April 2007, the government of Estonia decided to move a statue honoring Russian soldiers who died in World War II out of the capital of Tallinn. Angry ethnic Russians throughout the world launched a cyberattack on the small Baltic nation, crippling its cyber infrastructure for four days. Why did such an attack happen? And can it happen again?
The University of Maryland is launching a new cybersecurity initiative to stimulate public-private partnerships and address national vulnerabilities, including those facing industry. Its new Maryland Cybersecurity Center will stress “more-than-tech” solutions and help connect the dots in the national capital region’s burgeoning cyber sector.
Buy something online, enter your credit card number and mailing address. Simple. Then you come to the box with the captcha. You dutifully copy down the warped, watery-looking letters. Incorrect. Another captcha appears. You try again. Also incorrect.
Cyber attacks of various sorts have been around for decades. University at Buffalo military ethicist Randall R. Dipert says we have good reason to worry, because cyber attacks are almost entirely unaddressed by traditional morality and laws of war.
The Georgia Tech Information Security Center (GTISC) today announced the release of the GTISC Emerging Cyber Threats Report for 2011, outlining the top three areas of security risk and concern for consumer and business Internet and computer users.
Researchers have developed a new tool that eliminates drive-by download threats. BLADE is browser-independent and when tested, it blocked all drive-by malware installation attempts from more than 1,900 malicious websites, produced no false positives and required minimal resources from the computer.
The Georgia Tech Research Institute (GTRI) has created a new Cyber Technology and Information Security Laboratory (CTISL) to apply GTRI’s broad expertise and systems engineering experience in cyber-related research to a wide range of information security issues.
Gary Warner, Director of Research in Computer Forensics at UAB, is available to comment on the breaking story about the financial and cyber crimes related to the Zeus botnet.
A team of University of Iowa researchers has developed a new tool that detects potential vandalism on Wikipedia and can help improve the accuracy of the online encyclopedia's entries.
NIST has issued its first Guidelines for Smart Grid Cyber Security, including high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for crafting strategies to protect the modernizing power grid from attacks, malicious code, cascading errors and other threats.
Professors and a Ph.D. student from UALR --the University of Arkansas at Little Rock -- developed a new model to manage the "vast ocean" of data being generated by users of growing social websites. The model allows Internet sites to automatically adjust privacy needs of consumers or organizations to the context in which the data is accessed.
The Commerce Department has published a Notice of Inquiry on 'Cybersecurity, Innovation, and Internet Policy.' The department seeks comments from all stakeholders, including the commercial, academic and civil society sectors, on measures to improve cyber security while sustaining innovation.
To many big companies, you aren’t just a customer, but are described by multiple “dimensions” of information within a computer database. Now, a University of Utah computer scientist has devised a new method for simpler, faster “data mining,” or extracting and analyzing massive amounts of such data.
ICSI researchers show how information about where videos and photos were captured can be quickly extracted, leaving those who post images online vulnerable to attacks in the real world.
NIST has published an updated set of guidelines for developing security assessment plans and associated security control assessment procedures that are consistent with the Federal Information Security Management Act (FISMA).
When Jim Caccamo, Ph.D., an expert in computing and telecommunications technology ethics, heard of Google’s recent struggles in China, he knew he’d need to update the curriculum for the Technology, Society and Christian Ethics course he teaches at Saint Joseph's University in Philadelphia, Pa.
The Internet heavyweight recently rerouted all searches from its heavily censored mainland China search engine to its more open Hong Kong engine in the wake of a massive hack on its system in December, which some have attributed to the Chinese government.
“Not a lot happens on the Web in China that the government isn’t aware of, and it’s hard to believe they didn’t know about the hacking that happened over the winter,” said Caccamo, who is an associate professor of theology.
Andrew Macpherson, research assistant professor of justice studies at the University of New Hampshire Justiceworks program and director of the Technical Analysis Group, is available to discuss new warnings about the increased threat of cyber attacks.
A Clarkson University professor is developing software programs that will test cybersecurity systems for flaws before they become operational. The National Science Foundation is funding the $1.2 million project, which also involves four other research centers.
International discussion and diplomacy continues in light of Google's announcement last week that it may pull out of China over concerns about censorship and security. Today (Jan. 21). a top Chinese official announced that the threat should not affect China's relations with the United States. Scott Kennedy, director of the Research Center on Chinese Politics and Business and an associate professor of political science and East Asian languages and cultures, is available for comment.
Is there a recipe a scientist might follow to spur creativity and cook up new discoveries? Cyber security expert Kevin Fu says experimenting with flour, salt and yeast to bake artisanal bread helps him keep creative juices flowing and creates space in which to mull over thorny research problems.