Breaking News:

Cybersecurity

Add to Favorites Subscribe Share
fbshare-Cybersecurity
Press "esc" to clear
Press "esc" to clear
Press "esc" to clear
Go to Advanced Search

Showing results

821830 of 855
ORNL Two-line_color.jpg

Article ID: 573208

Biology -- Database a Likely Lifesaver

Oak Ridge National Laboratory

Highly effective anti-virus programs for computers are providing the inspiration for a system to protect people from deadly genetically engineered biological bugs. While the National Cyber Security Division’s US-CERT provides cyber security updates and tools to safeguard computers within federal agencies, industry, state and local governments and the public, no such program exists to protect the public from harmful biological threats. That could change, however, with BioSITES, the vision of Department of Energy Oak Ridge National Laboratory researchers Robert Cottingham and Tom Brettin.

Released:
8-Feb-2011 2:00 PM EST
WangandLi.jpg

Article ID: 573072

Doctoral Students Discover, Alert Facebook to Threat Allowing Access to Private Data, Phishing

Indiana University

A Facebook security vulnerability discovered by a pair of doctoral students that allowed malicious websites to uncover a visitor's real name, access private data and post bogus content on their behalf has been repaired, Facebook confirmed.

Released:
3-Feb-2011 1:30 PM EST
nst-logo.gif

Article ID: 572606

National Program Office Planned for Online Trusted Identity Strategy

National Institute of Standards and Technology (NIST)

At a January 7 forum with Silicon Valley business and academic leaders at Stanford University, U.S. Commerce Secretary Gary Locke and White House Cybersecurity Coordinator Howard A. Schmidt announced plans to create a National Program Office to help foster an environment in which sensitive online transactions can be carried out with greater levels of trust.

Released:
20-Jan-2011 9:00 AM EST
nst-logo.gif

Article ID: 572211

IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol

National Institute of Standards and Technology (NIST)

As the day draws nearer for the world to run out of the unique addresses that allow us to use the Internet researchers at NIST have issued a guide for managers, network engineers, transition teams and others to help them deploy the next generation Internet Protocol (IPv6) securely.

Released:
6-Jan-2011 9:00 AM EST
nst-logo.gif

Article ID: 572212

Two Publications Recommend Organization-Wide IT Security Risk Management

National Institute of Standards and Technology (NIST)

Two new draft publications from NIST provide the groundwork for a three-tiered risk-management approach that encompasses computer security risk planning from the highest levels of management to the systems level. The draft documents have been released for public comment.

Released:
6-Jan-2011 9:00 AM EST
nst-logo.gif

Article ID: 572209

And Then There Were Five: Finalists Advance in NIST's SHA-3 Cryptography Competition

National Institute of Standards and Technology (NIST)

Out of the original 64, there now are five candidates left in the ongoing multi-year competition to create the next 'hash' algorithm to protect the integrity of electronic information.

Released:
6-Jan-2011 8:00 AM EST

Law and Public Policy

warner_gary-01.jpg

Article ID: 571842

Wikileaks-Related Attackers Are Not Unruly Mob but Impassioned Actors, Say UAB Experts

University of Alabama at Birmingham

The mob mentality behind the current wave of cyber attacks against various banking, credit and other service-industry websites is not one of frenzy or mass hysteria, according to cybercrime experts at the University of Alabama at Birmingham.

Released:
15-Dec-2010 10:20 AM EST

Social and Behavioral Sciences

wau-logo.gif

Article ID: 571779

Expert: Wikileaks Scandal Leads to Fear-Mongering Over Information Security

Washington University in St. Louis

“The recent response of the White House’s Office of Management and Budget (OMB) to the WikiLeaks document dump gives us a peek at the sometimes surreal standards for dealing with classified information and at the fear-mongering in which some government officials are engaging,” says Kathleen Clark, JD, professor of law at Washington University in St. Louis School of Law. Clark teaches and writes about government ethics, national security law, legal ethics and whistleblowing.

Released:
13-Dec-2010 4:25 PM EST

Law and Public Policy

cyber.jpg

Article ID: 571714

Proposed U.S. Legislation and WikiLeaks Attacks Make Case for UMD's Approach to Cybersecurity

University of Maryland, College Park

At UMD’s Maryland Cybersecurity Center launch, U.S. Sen. Ben Cardin proposed major "cybersafety" legislation. Former U.S. Director of National Intelligence Mike McConnell warned of a "catastrophic" cyber event, likely aimed at the computer networks crucial to banking and commerce, power, utility and transportation grids. View it at http://tinyurl.com/2ejeauz.

Released:
10-Dec-2010 4:25 PM EST

Law and Public Policy


Showing results

821830 of 855

Chat now!