The University at Albany has several experts available to discuss the importance of Cybersecurity Awareness Month and how to best protect yourself against cybercrimes.
Vulnerabilities in Apple Pay and Visa could enable hackers to bypass an iPhone’s Apple Pay lock screen and perform contactless payments, according to research by the University of Birmingham and University of Surrey.
Georgia Tech researchers have recently discovered a new side channel attack that is effective on a wide range of low-end phones. All that's needed for the attack to work is to place a sensor close to the phone, for example, under the coffee table where the phone is sitting. If the sensor bears witness to a single secure transaction, like a bank login, then the attacker can immediately break the user's encryption and forge their digital signature.
New “Cyber Safe” training from the Arkansas Small Business and Technology Development Center equips businesses to recognize and thwart cyber threats. ASBTDC collaborated with the University of Arkansas at Little Rock Cyber Arena to create the Cyber Safe: Cybersecurity for Small Business online training course. The free, on-demand course is broken into short modules covering cybersecurity basics, such as access control, passwords, physical security, and network protection.
In AVS Quantum Science, investigators outline how a time-sensitive network control plane could be a key component of a workable quantum network. In addition to the well-understood requirements of transmission distance and data rate, for quantum networks to be useful in a real-world setting there are at least two other requirements that need to be considered. One is real-time network control, specifically time-sensitive networking. The second is cost.
Building on its success in preparing professionals for careers in cybersecurity, Indiana University has been awarded a grant from the National Science Foundation for a new project to train the next generation of the nation's crucial cybersecurity workforce to address vulnerabilities and identify threats using artificial intelligence.
Expert Q&A: Do breakthrough cases mean we will soon need COVID boosters? The extremely contagious Delta variant continues to spread, prompting mask mandates, proof of vaccination, and other measures. Media invited to ask the experts about these and related topics.
The University of Arkansas at Little Rock is part of an international research cohort that has received about $2.35 million in funding from the Department of Defense to investigate the use of social cyber forensics to understand covert online influence. UA Little Rock will receive $691,339 for its part of the project, which began in February and will conclude in 2025.
Computer scientists have developed a new compiler framework, called Swivel, to protect WebAssembly, or Warm, against Spectre attacks—the class of execution attacks, which exploit the way processors predict the computations that need to happen next.
Educational institutions have had to transition to remote learning and exam taking. This has led to an increase in the use of online proctoring services to curb student cheating. In a first-of-its-kind study, researchers explored the security and privacy perceptions of students taking proctored exams.
The AI Institute for Intelligent Cyberinfrastructure with Computational Learning in the Environment, or ICICLE, will focus on next-generation intelligent cyberinfrastructure that makes using AI as easy as plugging an appliance into an electrical outlet.
While services such as Snapchat allow self-destructing messages or notify users when a recipient takes a screenshot of a message, there is no way to prevent someone from photographing or showing it to others on the screen. A new invention controls how and when shared documents are displayed and restricts individuals from viewing documents based on individual identity (e.g., face ID, a voice sample), their social network, and when and where the document is being viewed.
A new study of almost 12,000 Australians has found one-third of the adult population has experienced pure cybercrime during their lifetime, with 14% reporting this disruption to network systems in the past 12 months.
The U.S. Department of Energy (DOE) today announced awards totaling $127 million to a diverse set of small businesses working on advanced scientific tools and clean, secure energy for the American people.
Harrisburg University of Science and Technology is looking for subject matter experts in cryptocurrency, bitcoin, blockchain topics at the upcoming Harrisburg Cryptocurrency and Blockchain conference.
The in-person day-long event is set for September 22, 2021, at Harrisburg University. The University seeks speakers for the keynote addresses and panel discussions who can passionately and effectively share their subject matter expertise and insights with the attendees.
A pair of College of Business professors and their doctoral student at The University of Texas at Arlington are exploring how ransomware attacks sometimes pit organizations against the law enforcement agencies trying to protect them.
DHS S&T transitioned the Resilient Positioning, Navigation, and Timing Conformance Framework to the Institute of Electrical and Electronics Engineers to further refine into international industry standards.
Columbia Engineering researchers who are leading experts in computer security recently presented two major papers on memory safety that make computer systems more secure at the International Symposium on Computer Architecture. This new research, which has zero to little effect on system performance, is already being used to create a processor for the Air Force Research Lab.
It's been nine years since the LinkedIn data breach, eight years since Adobe customers were victims of cyber attackers and four years since Equifax made headlines for the exposure of private information of millions of people.
Scientists have created a cybersecurity technology called Shadow Figment that is designed to lure hackers into an artificial world, then stop them from doing damage by feeding them illusory tidbits of success. The technology is aimed at protecting physical targets—infrastructure such as buildings, the electric grid, and water and sewage systems.
A team of scientists from the Moscow Institute of Physics and Technology and the Tupolev Kazan National Research Technological University is developing a mathematical apparatus that could lead to a breakthrough in network security. The results of the work have been published in the journal Mathematics.
Columbia Engineering researchers have developed SeKVM, the first system that guarantees--through a mathematical proof--the security of virtual machines in the cloud. “This is the first time that a real-world multiprocessor software system has been shown to be mathematically correct and secure,” said Computer Science Professor Jason Nieh. “This means that users’ data are correctly managed by software running in the cloud and are safe from security bugs and hackers.”
The current U.S. innovation model has in multiple respects fallen short in the face of today’s technology competition challenges. MITRE calls for a national-level effort between government, industry, and academia to address the most critical S&T priorities.
A research team at the NYU Center for Cyber Security (CCS) at NYU Tandon are participating in a major initiative in collaboration with data security company Duality — supported by a $14 million grant from the Defense Advanced Research Projects Agency (DARPA) — to design a revolutionary new microchip (codenamed “Trebuchet”).
Deborah Frincke, one of the nation’s preeminent computer scientists and cybersecurity experts, serves as associate laboratory director of ORNL’s National Security Science Directorate.
A study to understand the dating violence experience and perpetration of college-age women, as well as how they conceptualize violence in dating relationships, reveals normalization of unhealthy violent behaviors where sexual pressure or sexualized verbal harassment are viewed as an innate part of men, supporting the idea that “boys will be boys.” Study participants demonstrated a lack of knowledge of the forms of dating violence and its consequences. They accepted, rationalized and provided excuses for these acts of violence.
Research to harness commonplace errors in wireless devices to make them usable and provide for better security and efficiency has won a University of Alabama in Huntsville (UAH) assistant professor of electrical and computer engineering a five-year, $500,000 National Science Foundation (NSF) CAREER award.