Breaking News: Cybersecurity

Filters close
Released: 15-Feb-2013 11:00 AM EST
Quantum Cryptography Put to Work for Electric Grid Security
Los Alamos National Laboratory

Recently a Los Alamos National Laboratory quantum cryptography (QC) team successfully completed the first-ever demonstration of securing control data for electric grids using quantum cryptography.

Released: 12-Feb-2013 4:25 PM EST
Sandia National Laboratories Researcher Looks for Bad Guys in Cyberspace
Sandia National Laboratories

Sandia National Laboratories computer science researcher Jeremy Wendt wants to figure out how to recognize potential targets of nefarious emails and put them on their guard. The idea is to reduce the number of visitors that cyberanalysts have to check as possible bad guys among the tens of thousands who search Sandia websites each day.

Released: 1-Feb-2013 10:15 AM EST
Computer Security Expert Available for Interviews on Hacker Attacks on The New York Times
 Johns Hopkins University

Johns Hopkins computer security expert Avi Rubin is available for interviews on reports from the New York Times and Wall Street Journal that their computer systems have been targeted by Chinese hackers.

Released: 8-Jan-2013 12:30 PM EST
Researchers Work to Counter Spear Phishing Attacks
Georgia Institute of Technology, Research Communications

Researchers at the Georgia Tech Research Institute (GTRI) are working to counter threats from spear phishing. The attacks use knowledge of computer users to gain their trust to break into corportate networks.

Released: 4-Jan-2013 2:50 PM EST
Computer Scientists Find Vulnerabilities in Cisco VoIP Phones
Columbia University School of Engineering and Applied Science

Columbia Engineering researchers have found vulnerabilities in Cisco VoIP telephones, recently demonstrating how they can insert malicious code into a Cisco VoIP phone (any of the 14 Cisco Unified IP Phone models) and start eavesdropping on private conversations—not just on the phone but also in the phone’s surroundings—from anywhere in the world.

Released: 5-Dec-2012 10:00 AM EST
Mobile Browsers Fail Georgia Tech Safety Test
Georgia Institute of Technology

How unsafe are mobile browsers? Unsafe enough that even cyber-security experts are unable to detect when their smartphone browsers have landed on potentially dangerous websites, according to a recent Georgia Tech study.

Released: 29-Nov-2012 4:40 PM EST
Mimicking Public Health Strategies Could Improve Cyber Security
RTI International

Mimicking public health strategies, such as maintaining good “cyber hygiene,” could improve cyber security, according to a new paper by a team of economists and public health researchers at RTI International.

Released: 20-Nov-2012 5:00 PM EST
Holiday Season and Cybermonday Fast Approaching! Think Before You Click
University of Virginia

Cybercriminals and ordinary hackers are preparing, like bears at a trout stream, to steal our data, money, and identities. Here are some tips from a computer security expert at the University of Virginia.

Released: 16-Nov-2012 11:10 AM EST
Expert: Petraeus Affair Shows Weak Data Privacy Is No Privacy at All
Cornell University

Owen Arden, a graduate researcher in Cornell University’s Department of Computer Science whose research focuses on Internet and mobile data security, comments on the lesson to be learned from the scandal that followed the FBI’s investigation into emails associated with former CIA Director David Petraeus.

Released: 14-Nov-2012 8:00 AM EST
Georgia Tech Releases Cyber Threats Forecast for 2013
Georgia Institute of Technology

The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, escalating battles over the control of online information and continuous threats to the U.S. supply chain from global sources. Those were the findings released by the Georgia Tech Emerging Cyber Threats Report for 2013.

Released: 8-Nov-2012 10:15 AM EST
MSU Security Expert Offers Tips for Avoiding 'Phishing' Scams
Mississippi State University

In every corner of the Internet, high-tech "phishers" are baiting their hooks as the holiday season begins, hoping to lure a prize catch--the account data and personal information of unsuspecting computer-users all across the country.

Released: 2-Nov-2012 2:35 PM EDT
Data Mining a Major Challenge to Personal Privacy
Cornell University

Dawn Woodard, a professor or Operations Research and Information Engineering who teaches courses on data mining, comments on privacy and data brokers in the wake of House and Senate investigations into data brokerage firms.

Released: 31-Oct-2012 8:00 AM EDT
Is Your Utility Meter Getting Personal?
University of South Carolina

As of 2010, more than a third of all utility meters in the United States used wireless automatic meter reading (AMR) technology – 47 million in all. They make it a lot easier for the utility company to gather data on electricity, natural gas and water usage. But as a University of South Carolina research team has shown, it’s possible for their unencrypted broadcasts to be intercepted, giving a sophisticated eavesdropper a window into household activities.

Released: 2-Oct-2012 8:00 AM EDT
Sandia Builds Android-Based Network to Study Cyber Disruptions
Sandia National Laboratories

As part of ongoing research to help prevent and mitigate disruptions to computer networks on the Internet, researchers at Sandia National Laboratories in California have turned their attention to smartphones and other hand-held computing devices.

Released: 20-Sep-2012 9:00 AM EDT
Computers Get a Better Way to Detect Threats
University of Texas at Dallas

UT Dallas computer scientists have developed a technique to automatically allow one computer in a virtual network to monitor another for intrusions, viruses or other kinds of threats.



close
2.01275