Current Cybersecurity News and Events | Page 2

Current Cybersecurity News and Events, Cybersecurity News Articles.
Sort By: Most Relevant | Most Viewed
Page 2 of 8 | 281 Results
Army researchers identify new way to improve cybersecurity
Researchers at the US Army Combat Capabilities Development Command's Army Research Laboratory, the Army's corporate research laboratory also known as ARL, and Towson University may have identified a new way to improve network security. (2019-04-17)

How susceptible are hospital employees to phishing attacks?
A multicenter study finds high click rate for simulated phishing emails, potential benefit in phishing awareness training. (2019-03-11)

A Georgia State cybersecurity study of the dark web exposes vulnerability to machine identities
A thriving marketplace for SSL and TLS certificates -- small data files used to facilitate confidential communication between organizations' servers and their clients' computers -- exists on a hidden part of the Internet, according to new research by Georgia State University's Evidence-Based Cybersecurity Research Group (EBCS) and the University of Surrey. (2019-03-08)

NIST: Blockchain provides security, traceability for smart manufacturing
Engineers at the National Institute of Standards and Technology (NIST) needed a way to secure smart manufacturing systems using the digital thread , so they turned to the new kid on the block ... blockchain, that is. (2019-02-11)

Time-shift TV does not reduce amount of live TV, ads consumers watch
A new study looked at whether time-shift television, a technology that allows people to watch TV shows they missed without presetting devices to record content, has affected how people watch TV. The study found that people with time-shift TV watched slightly more TV overall than they did before having the technology; they did not watch less live TV, and they did not watch fewer advertisements. (2019-02-07)

Computer hackers could be thwarted by new 'deception consistency' method
Can you deceive a deceiver? That's the question that computer scientists at Binghamton University, State University of New York have recently been exploring. Assistant Professor of Computer Science Guanhua Yan and PhD student Zhan Shu are looking at how to make cyber deception a more effective tool against malicious hackers. (2018-11-28)

Researchers aim to prevent medical imaging cyberattacks
Researchers and cybersecurity experts have begun to examine ways to mitigate the risk of cyberattacks in medical imaging before they become a real danger. (2018-11-27)

New survey highlights digital health challenges
New survey: Health system leaders plan to increase spending to defend against cyberattacks, express optimism about reimbursement for telehealth services, and feel anxiety about Apple, Amazon and Google entering the health care space. (2018-11-19)

New deep knowledge AI system could resolve bottlenecks in drug research
Researchers at the University of Waterloo have developed a new system that could significantly speed up the discovery of new drugs and reduce the need for costly and time-consuming laboratory tests. (2018-11-06)

At least 57 negative impacts from cyber-attacks
Cyber-security researchers have identified a total of at least 57 different ways in which cyber-attacks can have a negative impact on individuals, businesses and even nations, ranging from threats to life, causing depression, regulatory fines or disrupting daily activities (2018-10-24)

Dena Haritos Tsamitis secures $5 million NSF award for CyberCorps Scholarship for Service program
At a time when demand for cybersecurity expertise has never been higher, Carnegie Mellon University has just been awarded a $5 million renewal of its National Science Foundation CyberCorps Scholarship for Service program through 2023. Led by Dr. Dena Haritos Tsamitis, the Barbara Lazarus Professor in Information Networking and director of Information Networking Institute, the SFS@CMU program provides students a full-tuition scholarship and a generous stipend in exchange for government service in a cybersecurity role. (2018-10-19)

UBC study: Publicizing a firm's security levels may strengthen security over time
New research from the UBC Sauder School of Business has quantified the security levels of more than 1,200 Pan-Asian companies in order to determine whether increased awareness of one's security levels leads to improved defense levels against cybercrime. (2018-09-27)

Army research takes proactive approach to defending computer systems
A team of researchers from the U.S. Army Research Laboratory, the University of Canterbury in New Zealand and the Gwangju Institute of Science and Technology in the Republic of Korea have taken a step toward the development of moving target defense techniques in software-defined networks. This is a demanding cybersecurity research topic, scientists said. (2018-09-07)

Researchers outline game-theory approach to better understand genetics
Principles of game theory offer new ways of understanding genetic behavior, a pair of researchers has concluded in a new analysis. (2018-09-04)

Information technology jobs outpace most other jobs in productivity and growth since 2004
Jobs in information technology -- like computer software, big data, and cybersecurity -- are providing American workers with long-lasting financial stability, suggests a new study from the University of British Columbia and the Massachusetts Institute of Technology. (2018-08-30)

How unsecured medical record systems and medical devices put patient lives at risk
A team of physicians and computer scientists at the University of California has shown it is easy to modify medical test results remotely by attacking the connection between hospital laboratory devices and medical record systems. These types of attacks might more likely be used against high-profile targets, such as heads of state and celebrities, than against the general public. But they could also be used by a nation-state to cripple the United States' medical infrastructure. (2018-08-29)

Friends' influence helps telecom firms retain customers
A new study tested a strategy to help a telecommunications firm manage churn. Contacting not only customers but also their friends helped reduce the customers' propensity to discontinue their ties to the company. (2018-08-24)

Protecting your health data -- Healthcare leaders share
Like other data-driven organizations, healthcare networks are vulnerable to potentially crippling cyberattacks - but may lag behind other sectors in preparing for and avoiding data breaches, according to a series of articles and commentaries in the Fall issue of Frontiers of Health Services Management, an official publication of the American College of Healthcare Executives (ACHE). This journal is published in the Lippincott portfolio by Wolters Kluwer. (2018-08-24)

Common Wifi can detect weapons, bombs and chemicals in bags
Ordinary WiFi can easily detect weapons, bombs and explosive chemicals in bags at museums, stadiums, theme parks, schools and other public venues, according to a Rutgers University-New Brunswick-led study. The researchers' suspicious object detection system is easy to set up, reduces security screening costs and avoids invading privacy such as when screeners open and inspect bags, backpacks and luggage. Traditional screening typically requires high staffing levels and costly specialized equipment. (2018-08-15)

Scientists pump up chances for quantum computing
University of Adelaide-led research has moved the world one step closer to reliable, high-performance quantum computing. (2018-07-03)

Claiming credit for cyberattacks
The decision to acknowledge sponsorship of an attack is often linked to whether the attacker hopes to draw attention to a cause or to actually influence events, says political scientist Evan Perkoski. (2018-06-12)

UTSA researchers create framework to stop cyber attacks on internet-connected cars
A new study by Maanak Gupta, doctoral candidate at The University of Texas at San Antonio, and Ravi Sandhu, Lutcher Brown Endowed Professor of computer science and founding executive director of the UTSA Institute for Cyber Security (ICS), examines the cybersecurity risks for new generations of smart which includes both autonomous and internet connected cars. (2018-05-29)

Lead exposure found to affect fertility rates
New research that examined the impact of exposure to lead (in the air and topsoil) on fertility in the United States has found that exposure matters for both women and men. It is the first study to find causal evidence of the relationship between lead exposure and fertility rates in the 1980s and mid-2000s. (2018-05-22)

The digital doctor's visit: Enormous potential benefits with equally big risk
One out of at least 10 patients records doctors' visits, usually on a cell phone, Apple recently released a new Health Records feature built into the Health app as part of iOS 11.3. No longer a wave of the future, Dartmouth Institute researchers, and their patient co-author, analyze the benefits of digital recordings of healthcare visits, the need to create a new model of health data ownership, and potential cybersecurity threats (2018-05-14)

Cybersecurity teams that don't interact much perform best
Army scientists recently found that the best, high-performing cybersecurity teams have relatively few interactions with their team-members and team captain. (2018-04-26)

An ionic black box
While we embrace the way the Internet of Things already is making our lives more streamlined and convenient, the cybersecurity risk posed by millions of wirelessly connected gadgets, devices and appliances remains a huge concern. Even single, targeted attacks can result in major damage; when cybercriminals control and manipulate several nodes in a network, the potential for destruction increases. (2018-04-25)

New UTSA study presents method to stop cyber attacks on GPS-enabled devices
A new study by researchers Nikolaos Gatsis, David Akopian and Ahmad F. Taha from the UTSA Department of Electrical and Computer Engineering describes a computer algorithm that mitigates the effects of spoofed GPS attacks on electrical grids and other GPS-reliant technologies. This new algorithm has the potential to help cybersecurity professionals to better detect and prevent cyber attacks in real time. (2018-03-19)

Researchers identify how phishing strategies may lead to success or failure
To begin to understand the psychology of criminals' behaviors in cybersecurity and how it can be used to prevent phishing attacks, Carnegie Mellon University's Prashanth Rajivan and Cleotilde Gonzalez identified how adversaries may be more successful when they exploit specific phishing strategies than when they use other less successful ones. (2018-02-26)

Can your cardiac device be hacked?
Medical devices, including cardiovascular implantable electronic devices could be at risk for hacking. In a paper publishing online today in the Journal of the American College of Cardiology, the American College of Cardiology's Electrophysiology Council examines the potential risk to patients and outlines how to improve cybersecurity in these devices. (2018-02-20)

To prevent cyberattacks, agency similar to National Transportation Safety Board suggested
After arguably the worst year ever for cyberattacks and data breaches, Indiana University research suggests it may be time to create an independent cybersecurity agency board comparable in approach to the National Transportation Safety Board that investigates airplane crashes and train derailments. (2018-02-13)

Pulses of light to encrypt data and protect security of cryptocurrencies
Data travels through thousands of miles of fiber optic cables underneath the world's oceans--via pulses of light. And according to experts, the data in these cables is at great risk of being intercepted. However, a newly designed frequency comb--recently developed by researchers at the USC Viterbi School of Engineering might be an effective tool for data encryption. (2018-01-11)

Electromagnetic emissions from smartphones analyzed for security vulnerability
Researchers at Universidad Carlos III de Madrid (UC3M) and the Consejo Superior de Investigaciones Científicas-CSIC (Spanish National Research Council) are developing a tool that enables cell phones to be analyzed in order to determine if they could undergo a cyber-attack to obtain encryption keys through their electromagnetic emanations. (2017-12-19)

Your smartphone's next trick? Fighting cybercrime.
A University at Buffalo-led team of researchers has discovered how to identify smartphones by examining just one photo taken by the device. The advancement opens the possibility of using smartphones -- instead of body parts -- as a form of identification to deter cybercrime. (2017-12-13)

'Cyberbiosecurity' and protecting the life sciences
Biology and biotechnology have entered a digital age, but security policies around such activities have not kept pace. That's according to Colorado State University's Jean Peccoud, Abell Chair of Synthetic Biology and professor in the Department of Chemical and Biological Engineering. Peccoud is lead author on a new paper in Trends in Biotechnology, urging awareness of (2017-12-07)

Story tips from the Department of Energy's Oak Ridge National Laboratory, October 2017
A method developed by Oak Ridge National Laboratory could protect connected and autonomous vehicles from possible network intrusion. A new ORNL technique makes ultrafast measurements using atomic force microscopy. (2017-10-05)

Clear tactics, but few easy solutions, for hospitals combating ransomware
Hospitals facing the prospect of ransomware attacks like the one that afflicted British hospitals in May can take many concrete steps to better protect themselves, but some of the most important measures -- such as a national policy not to pay ransoms -- may be tougher to formulate. (2017-09-19)

NJIT researchers will follow in the moon's slipstream to capture high-res sunspot images
While much of the research around the eclipse on Monday will focus on the effects of the Sun's brief, daytime disappearance on Earth and its atmosphere, a group of solar physicists will be leveraging the rare event to capture a better glimpse of the star itself. (2017-08-18)

New report concludes SBE sciences help advance national health, prosperity and defense
At the request of the National Science Foundation (NSF), the National Academies of Sciences, Engineering, and Medicine has produced a report, (2017-07-25)

How to prevent 3-D printing hacks? Install secret flaws and share the decoder ring
Since the global supply chain for additive manufacturing (AM)-- also called 3-D printing-- requires companies to share CAD files within the organization or with outside parties via email or cloud, intellectual-property thieves and malefactors have many opportunities to filch a manufacturer's design files to produce counterfeit parts. Researchers have discovered ways for manufacturers to turn the tables on thieves by deliberately embedding hidden flaws in CAD files to thwart intellectual property theft. (2017-05-23)

Android apps can conspire to mine information from your smartphone
'What this study shows undeniably with real-world evidence over and over again is that app behavior, whether it is intentional or not, can pose a security breach depending on the kinds of apps you have on your phone,' said researcher Gang Wang. (2017-04-03)

Page 2 of 8 | 281 Results
   First   Previous   Next      Last   
Brightsurf.com is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com.