Breaking News:

Cybersecurity

Add to Favorites Subscribe Share
fbshare-Cybersecurity

Showing results

821830 of 883
tmp-logo.gif

Article ID: 583267

When Holiday Shopping Online, It’s Buyerbeware.com

Temple University

Online shopping has become so popular that it now accounts for nearly half of all holiday shopping, but even savvy online shoppers should take a few extra moments to ensure their online safety, say Temple University cyber security expert.

Released:
22-Nov-2011 12:10 PM EST

Pop Culture

Newswise: Software Helps FBI Crack International Cybercrime Case

Article ID: 582843

Software Helps FBI Crack International Cybercrime Case

University of Alabama at Birmingham

UAB Spam Data Mine links Internet scam to cybercriminals accused of hacking more than 400 million computers.

Released:
10-Nov-2011 4:40 PM EST

Social and Behavioral Sciences

Newswise: Georgia Tech Helps to Develop System That Will Detect Insider Threats from Massive Data Sets

Article ID: 582797

Georgia Tech Helps to Develop System That Will Detect Insider Threats from Massive Data Sets

Georgia Institute of Technology, Research Communications

Researchers at Georgia Tech are developing new approaches for identifying “insider threats” before an incident occurs. They are creating a suite of algorithms that can detect threats by analyzing massive amounts of computer data for unusual activity.

Released:
10-Nov-2011 7:00 AM EST
ORNL Two-line_color.jpg

Article ID: 582723

Story Tips from the Department of Energy’s Oak Ridge National Laboratory, November 2011

Oak Ridge National Laboratory

1) Computer hackers could lose a huge advantage because of a system being developed at ORNL. 2) Solar and wind energy could become more viable because of an innovation that produces a hydrogen stream of greater than 99 percent purity. 3) Something odd happens when you expose the element gadolinium to a strong magnetic field. 4) Carefully combining materials that shrink when heated with materials that expand creates a material unaffected by extreme temperature.

Released:
8-Nov-2011 5:00 PM EST
snl_badge_subpage.png

Article ID: 582179

Cyber Workshop at Sandia Labs Seeks Potential Responses to Cyberattacks

Sandia National Laboratories

The difficulties of defending utilities, commerce and national security against cyberattack,s and what to do to change that situation, were major themes of a conference at Sandia National Labs.

Released:
26-Oct-2011 1:20 PM EDT

Channels:

Cybersecurity

Standard_CMYK.jpg

Article ID: 582170

User Resistance to Password Security Explored

Virginia Tech

Though most organizations have policies and guidelines to protect their information systems from unauthorized access, research has shown that employee compliance is often a problem.

Released:
26-Oct-2011 11:50 AM EDT

Social and Behavioral Sciences

Newswise: Georgia Tech Turns iPhone Into spiPhone

Article ID: 581839

Georgia Tech Turns iPhone Into spiPhone

Georgia Institute of Technology

A research team led by Patrick Traynor (Computer Science) has discovered how to program a smartphone to sense nearby keyboard vibrations and decipher complete sentences with up to 80 percent accuracy.

Released:
18-Oct-2011 12:50 PM EDT

Social and Behavioral Sciences

Newswise: Deliberations on Cyberattacks Against Libya Raise Legal Questions

Article ID: 581833

Deliberations on Cyberattacks Against Libya Raise Legal Questions

Indiana University

The Obama administration's consideration and rejection of cyberattacks against Libya underscore cyberspace's emergence as a military domain but also raise questions about domestic and international law, says an Indiana University cybersecurity expert.

Released:
18-Oct-2011 11:50 AM EDT

Law and Public Policy

Standard_CMYK.jpg

Article ID: 581668

Software Keeps Sensitive Data Confined in Physical Space

Virginia Tech

A team of Virginia Tech researchers has created software to remotely put smart phones under lockdown.

Released:
12-Oct-2011 3:40 PM EDT

Article ID: 581577

Georgia Tech Releases Cyber Threats Forecast for 2012

Georgia Institute of Technology

The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, as well as escalating battles over the control of online information that threatens to compromise content and erode public trust and privacy. Those were the findings announced by the Georgia Tech Information Security Center (GTISC) and the Georgia Tech Research Institute (GTRI) in today's release of the Georgia Tech Emerging Cyber Threats Report for 2012.

Released:
11-Oct-2011 9:00 AM EDT

Social and Behavioral Sciences


Showing results

821830 of 883

Chat now!