News
  • Supply Chain Security Lessons from a Pager System Breach
    A recent incident involving pager system vulnerabilities highlights critical lessons for modern supply chain security.
  • AI Security: Emerging Threats and the Call for Global Collaboration
    At the recent Singapore International Cyber Week, cybersecurity experts stressed the urgency of addressing the unique security challenges posed by the rapid adoption of artificial intelligence (AI).
  • CMU Student Leverages AI to Streamline Cybersecurity Testing
    In a promising development for cybersecurity testing, a Central Michigan University undergraduate is pioneering the use of artificial intelligence to simplify testing processes for software vulnerabilities.
  • Enhancing Security in Industrial Control Systems with SDN/NFV
    Vijay Varadharajan, Uday Tupakula, and Kallol Krishna Karmakar's recent publication, Techniques for Enhancing Security in Industrial Control Systems (ACM Trans. Cyber-Phys.
  • "New Algorithms Increase the Privacy of Sensitive Data"
    Saloni Kwatra, a doctoral student at Umea University, has identified flaws in the technology known as "federated learning" or "collaborative learning" and developed new algorithms to bolster user security.
  • "Researchers Eye 'Topological Signatures' of Cyber Threats"
    Researchers at Pacific Northwest National Laboratory (PNNL) are developing a new method to exploring the higher-dimensional shape of cyber systems in order to identify adversarial attack signatures.
  • "New NSF-Backed Research Addressing Threat of Security Breaches in Semiconductor Design"
    The University of Maine's National Science Foundation (NSF)-funded collaborative research project, “KIPPER: A Scalable Learning-Guided Hardware IP Protection Platform,” will address the threat of confidentiality breaches in semiconductor design, includ
  • "Secure Messaging Through Distributed Messages"
    Researchers at the Technical University of Darmstadt have developed a method called "Encrypted Multi-Channel Communication" (EMC2) to secure sensitive messages by distributing trust across multiple communication channels.
  • "Grad Student Works With Research Team to Strengthen Nonprofits’ Cybersecurity"
    Anivesh Sinha, a master's student in Information Science at Penn State Great Valley, is collaborating with a team of faculty and other students to conduct a Presidential Public Impact Research Project to help Pennsylvania nonprofit organizations improv
  • "Security in Quantum Computing"
    Researchers at the National Center for Supercomputing Applications (NCSA), a unit of the University of Illinois Urbana-Champaign, are addressing the issue of practical quantum computers breaking classical encryption before it becomes an actual problem.
  • "Health Monitoring Devices at Risk of Being Hacked, Study Shows"
    Researchers at Charles Darwin University (CDU) hacked into an oximeter, a smartwatch, and a smart peak flow meter to explore the potential risks and vulnerabilities of these Internet-connected medical devices. According to the study's co-author, Dr.
  • "The Sherlock Holmes of AI"
    Georgia Tech developed a postmortem cybersecurity forensic tool named "AI Psychiatry" (AiP) that uses Artificial Intelligence (AI) to recover the original Deep Learning (DL) models a compromised machine, such as a self-driving car, runs on and determin