Information Security Expert Recommends System to Protect the Nation's Power Grid
Lewis University
Recently a Los Alamos National Laboratory quantum cryptography (QC) team successfully completed the first-ever demonstration of securing control data for electric grids using quantum cryptography.
Sandia National Laboratories computer science researcher Jeremy Wendt wants to figure out how to recognize potential targets of nefarious emails and put them on their guard. The idea is to reduce the number of visitors that cyberanalysts have to check as possible bad guys among the tens of thousands who search Sandia websites each day.
Johns Hopkins computer security expert Avi Rubin is available for interviews on reports from the New York Times and Wall Street Journal that their computer systems have been targeted by Chinese hackers.
Researchers at the Georgia Tech Research Institute (GTRI) are working to counter threats from spear phishing. The attacks use knowledge of computer users to gain their trust to break into corportate networks.
Columbia Engineering researchers have found vulnerabilities in Cisco VoIP telephones, recently demonstrating how they can insert malicious code into a Cisco VoIP phone (any of the 14 Cisco Unified IP Phone models) and start eavesdropping on private conversations—not just on the phone but also in the phone’s surroundings—from anywhere in the world.
How unsafe are mobile browsers? Unsafe enough that even cyber-security experts are unable to detect when their smartphone browsers have landed on potentially dangerous websites, according to a recent Georgia Tech study.
Mimicking public health strategies, such as maintaining good “cyber hygiene,” could improve cyber security, according to a new paper by a team of economists and public health researchers at RTI International.
Cybercriminals and ordinary hackers are preparing, like bears at a trout stream, to steal our data, money, and identities. Here are some tips from a computer security expert at the University of Virginia.
Owen Arden, a graduate researcher in Cornell University’s Department of Computer Science whose research focuses on Internet and mobile data security, comments on the lesson to be learned from the scandal that followed the FBI’s investigation into emails associated with former CIA Director David Petraeus.
The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, escalating battles over the control of online information and continuous threats to the U.S. supply chain from global sources. Those were the findings released by the Georgia Tech Emerging Cyber Threats Report for 2013.
In every corner of the Internet, high-tech "phishers" are baiting their hooks as the holiday season begins, hoping to lure a prize catch--the account data and personal information of unsuspecting computer-users all across the country.
Dawn Woodard, a professor or Operations Research and Information Engineering who teaches courses on data mining, comments on privacy and data brokers in the wake of House and Senate investigations into data brokerage firms.
As of 2010, more than a third of all utility meters in the United States used wireless automatic meter reading (AMR) technology – 47 million in all. They make it a lot easier for the utility company to gather data on electricity, natural gas and water usage. But as a University of South Carolina research team has shown, it’s possible for their unencrypted broadcasts to be intercepted, giving a sophisticated eavesdropper a window into household activities.
As part of ongoing research to help prevent and mitigate disruptions to computer networks on the Internet, researchers at Sandia National Laboratories in California have turned their attention to smartphones and other hand-held computing devices.
UT Dallas computer scientists have developed a technique to automatically allow one computer in a virtual network to monitor another for intrusions, viruses or other kinds of threats.