Popular Cybersecurity News and Current Events

Popular Cybersecurity News and Current Events, Cybersecurity News Articles.
Sort By: Most Relevant | Most Recent
Page 1 of 8 | 281 Results
An ionic black box
While we embrace the way the Internet of Things already is making our lives more streamlined and convenient, the cybersecurity risk posed by millions of wirelessly connected gadgets, devices and appliances remains a huge concern. Even single, targeted attacks can result in major damage; when cybercriminals control and manipulate several nodes in a network, the potential for destruction increases. (2018-04-25)

Researchers aim to prevent medical imaging cyberattacks
Researchers and cybersecurity experts have begun to examine ways to mitigate the risk of cyberattacks in medical imaging before they become a real danger. (2018-11-27)

Pulses of light to encrypt data and protect security of cryptocurrencies
Data travels through thousands of miles of fiber optic cables underneath the world's oceans--via pulses of light. And according to experts, the data in these cables is at great risk of being intercepted. However, a newly designed frequency comb--recently developed by researchers at the USC Viterbi School of Engineering might be an effective tool for data encryption. (2018-01-11)

Your smartphone's next trick? Fighting cybercrime.
A University at Buffalo-led team of researchers has discovered how to identify smartphones by examining just one photo taken by the device. The advancement opens the possibility of using smartphones -- instead of body parts -- as a form of identification to deter cybercrime. (2017-12-13)

To prevent cyberattacks, agency similar to National Transportation Safety Board suggested
After arguably the worst year ever for cyberattacks and data breaches, Indiana University research suggests it may be time to create an independent cybersecurity agency board comparable in approach to the National Transportation Safety Board that investigates airplane crashes and train derailments. (2018-02-13)

New UTSA study presents method to stop cyber attacks on GPS-enabled devices
A new study by researchers Nikolaos Gatsis, David Akopian and Ahmad F. Taha from the UTSA Department of Electrical and Computer Engineering describes a computer algorithm that mitigates the effects of spoofed GPS attacks on electrical grids and other GPS-reliant technologies. This new algorithm has the potential to help cybersecurity professionals to better detect and prevent cyber attacks in real time. (2018-03-19)

A Georgia State cybersecurity study of the dark web exposes vulnerability to machine identities
A thriving marketplace for SSL and TLS certificates -- small data files used to facilitate confidential communication between organizations' servers and their clients' computers -- exists on a hidden part of the Internet, according to new research by Georgia State University's Evidence-Based Cybersecurity Research Group (EBCS) and the University of Surrey. (2019-03-08)

Researchers outline game-theory approach to better understand genetics
Principles of game theory offer new ways of understanding genetic behavior, a pair of researchers has concluded in a new analysis. (2018-09-04)

Can your cardiac device be hacked?
Medical devices, including cardiovascular implantable electronic devices could be at risk for hacking. In a paper publishing online today in the Journal of the American College of Cardiology, the American College of Cardiology's Electrophysiology Council examines the potential risk to patients and outlines how to improve cybersecurity in these devices. (2018-02-20)

UBC study: Publicizing a firm's security levels may strengthen security over time
New research from the UBC Sauder School of Business has quantified the security levels of more than 1,200 Pan-Asian companies in order to determine whether increased awareness of one's security levels leads to improved defense levels against cybercrime. (2018-09-27)

Protecting your health data -- Healthcare leaders share
Like other data-driven organizations, healthcare networks are vulnerable to potentially crippling cyberattacks - but may lag behind other sectors in preparing for and avoiding data breaches, according to a series of articles and commentaries in the Fall issue of Frontiers of Health Services Management, an official publication of the American College of Healthcare Executives (ACHE). This journal is published in the Lippincott portfolio by Wolters Kluwer. (2018-08-24)

Time-shift TV does not reduce amount of live TV, ads consumers watch
A new study looked at whether time-shift television, a technology that allows people to watch TV shows they missed without presetting devices to record content, has affected how people watch TV. The study found that people with time-shift TV watched slightly more TV overall than they did before having the technology; they did not watch less live TV, and they did not watch fewer advertisements. (2019-02-07)

Combing through someone's phone could lead to end of relationship -- or not
For some people, the thought of their partner, friend or colleague snooping through their phone, reading their texts and emails, is an automatic deal breaker. However, some relationships can survive the snooping, a new study examining the motivations behind phone snooping has found. (2019-05-30)

NJIT researchers will follow in the moon's slipstream to capture high-res sunspot images
While much of the research around the eclipse on Monday will focus on the effects of the Sun's brief, daytime disappearance on Earth and its atmosphere, a group of solar physicists will be leveraging the rare event to capture a better glimpse of the star itself. (2017-08-18)

UTSA researchers create framework to stop cyber attacks on internet-connected cars
A new study by Maanak Gupta, doctoral candidate at The University of Texas at San Antonio, and Ravi Sandhu, Lutcher Brown Endowed Professor of computer science and founding executive director of the UTSA Institute for Cyber Security (ICS), examines the cybersecurity risks for new generations of smart which includes both autonomous and internet connected cars. (2018-05-29)

Information technology jobs outpace most other jobs in productivity and growth since 2004
Jobs in information technology -- like computer software, big data, and cybersecurity -- are providing American workers with long-lasting financial stability, suggests a new study from the University of British Columbia and the Massachusetts Institute of Technology. (2018-08-30)

Army game-theory research better allocates military resources, fight cancer
US Army game-theory research using artificial intelligence may help treat cancer and other diseases, improve cybersecurity, deploy Soldiers and assets more efficiently and even win a poker game. (2019-07-15)

Researchers identify how phishing strategies may lead to success or failure
To begin to understand the psychology of criminals' behaviors in cybersecurity and how it can be used to prevent phishing attacks, Carnegie Mellon University's Prashanth Rajivan and Cleotilde Gonzalez identified how adversaries may be more successful when they exploit specific phishing strategies than when they use other less successful ones. (2018-02-26)

SwRI develops system to legally test GPS spoofing vulnerabilities in automated vehicles
Southwest Research Institute has developed a cyber security system to test for vulnerabilities in automated vehicles and other technologies that use GPS receivers for positioning, navigation and timing. (2019-04-30)

Scientists pump up chances for quantum computing
University of Adelaide-led research has moved the world one step closer to reliable, high-performance quantum computing. (2018-07-03)

How susceptible are hospital employees to phishing attacks?
A multicenter study finds high click rate for simulated phishing emails, potential benefit in phishing awareness training. (2019-03-11)

'Cyberbiosecurity' and protecting the life sciences
Biology and biotechnology have entered a digital age, but security policies around such activities have not kept pace. That's according to Colorado State University's Jean Peccoud, Abell Chair of Synthetic Biology and professor in the Department of Chemical and Biological Engineering. Peccoud is lead author on a new paper in Trends in Biotechnology, urging awareness of (2017-12-07)

Keeping children safe in the 'Internet of Things' age
Children need protection when using programmable Internet computing devices -- and Lancaster University scientists have drawn up new guidelines to help designers build in safeguards. (2019-06-21)

How unsecured medical record systems and medical devices put patient lives at risk
A team of physicians and computer scientists at the University of California has shown it is easy to modify medical test results remotely by attacking the connection between hospital laboratory devices and medical record systems. These types of attacks might more likely be used against high-profile targets, such as heads of state and celebrities, than against the general public. But they could also be used by a nation-state to cripple the United States' medical infrastructure. (2018-08-29)

Dena Haritos Tsamitis secures $5 million NSF award for CyberCorps Scholarship for Service program
At a time when demand for cybersecurity expertise has never been higher, Carnegie Mellon University has just been awarded a $5 million renewal of its National Science Foundation CyberCorps Scholarship for Service program through 2023. Led by Dr. Dena Haritos Tsamitis, the Barbara Lazarus Professor in Information Networking and director of Information Networking Institute, the SFS@CMU program provides students a full-tuition scholarship and a generous stipend in exchange for government service in a cybersecurity role. (2018-10-19)

NIST: Blockchain provides security, traceability for smart manufacturing
Engineers at the National Institute of Standards and Technology (NIST) needed a way to secure smart manufacturing systems using the digital thread , so they turned to the new kid on the block ... blockchain, that is. (2019-02-11)

Human factors and ergonomics society proposals invited
The meeting program will feature the latest research and practice on areas such as automation, patient safety, occupational health and safety, surface and air transportation, virtual environments, and children's issues. (2017-01-27)

Lead exposure found to affect fertility rates
New research that examined the impact of exposure to lead (in the air and topsoil) on fertility in the United States has found that exposure matters for both women and men. It is the first study to find causal evidence of the relationship between lead exposure and fertility rates in the 1980s and mid-2000s. (2018-05-22)

The digital doctor's visit: Enormous potential benefits with equally big risk
One out of at least 10 patients records doctors' visits, usually on a cell phone, Apple recently released a new Health Records feature built into the Health app as part of iOS 11.3. No longer a wave of the future, Dartmouth Institute researchers, and their patient co-author, analyze the benefits of digital recordings of healthcare visits, the need to create a new model of health data ownership, and potential cybersecurity threats (2018-05-14)

Common Wifi can detect weapons, bombs and chemicals in bags
Ordinary WiFi can easily detect weapons, bombs and explosive chemicals in bags at museums, stadiums, theme parks, schools and other public venues, according to a Rutgers University-New Brunswick-led study. The researchers' suspicious object detection system is easy to set up, reduces security screening costs and avoids invading privacy such as when screeners open and inspect bags, backpacks and luggage. Traditional screening typically requires high staffing levels and costly specialized equipment. (2018-08-15)

Android apps can conspire to mine information from your smartphone
'What this study shows undeniably with real-world evidence over and over again is that app behavior, whether it is intentional or not, can pose a security breach depending on the kinds of apps you have on your phone,' said researcher Gang Wang. (2017-04-03)

Army research takes proactive approach to defending computer systems
A team of researchers from the U.S. Army Research Laboratory, the University of Canterbury in New Zealand and the Gwangju Institute of Science and Technology in the Republic of Korea have taken a step toward the development of moving target defense techniques in software-defined networks. This is a demanding cybersecurity research topic, scientists said. (2018-09-07)

Claiming credit for cyberattacks
The decision to acknowledge sponsorship of an attack is often linked to whether the attacker hopes to draw attention to a cause or to actually influence events, says political scientist Evan Perkoski. (2018-06-12)

Story tips from the Department of Energy's Oak Ridge National Laboratory, October 2017
A method developed by Oak Ridge National Laboratory could protect connected and autonomous vehicles from possible network intrusion. A new ORNL technique makes ultrafast measurements using atomic force microscopy. (2017-10-05)

Companies are making cybersecurity a greater priority
Companies are spending increasing amounts on cybersecurity tools, but aren't convinced their data is truly secure and many chief information security officers believe that attackers are gaining on their defenses, according to a new RAND Corporation study. (2015-06-10)

UBC researchers find ways to hackproof smart meters
Cybersecurity researcher Karthik Pattabiraman, an associate professor of electrical and computer engineering at the University of British Columbia, has developed an automated program aimed at foiling smart meter hacking and boosting security in the smart grid. (2019-06-06)

Black markets for hackers are increasingly sophisticated, specialized and maturing
Black and gray markets for computer hacking tools, services and byproducts such as stolen credit card numbers continue to expand, creating an increasing threat to businesses, governments and individuals, according to a new RAND Corporation study. (2014-03-25)

Study finds companies may be wise to share cybersecurity efforts
Research finds that when one company experiences a cybersecurity breach, other companies in the same field also become less attractive to investors. However, companies that are open about their cybersecurity risk management fare significantly better than peers that don't disclose their cybersecurity efforts. (2019-10-29)

$10 million NSF grant to help computer scientists understand the world of cybercrime
Computer scientists at the University of California, San Diego, the International Computer Science Institute at Berkeley and George Mason University have received a $10 million, five-year grant from the National Science Foundation to map out the illicit activities taking place in the cybersecurity underworld and to understand how the mind of a cybercriminal works. (2012-09-25)

$4.6 million award creates program to train cybersecurity professionals
A five-year, $4.63 million award from the National Science Foundation will enable a multi-disciplinary team of researchers at the University of Arkansas to create a program to recruit, educate and train the next generation of cybersecurity professionals. (2019-07-16)

Page 1 of 8 | 281 Results
   First   Previous   Next      Last   
Brightsurf.com is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com.