News
-
"Researchers Eye 'Topological Signatures' of Cyber Threats"Researchers at Pacific Northwest National Laboratory (PNNL) are developing a new method to exploring the higher-dimensional shape of cyber systems in order to identify adversarial attack signatures.
-
"New NSF-Backed Research Addressing Threat of Security Breaches in Semiconductor Design"The University of Maine's National Science Foundation (NSF)-funded collaborative research project, “KIPPER: A Scalable Learning-Guided Hardware IP Protection Platform,” will address the threat of confidentiality breaches in semiconductor design, includ
-
"Secure Messaging Through Distributed Messages"Researchers at the Technical University of Darmstadt have developed a method called "Encrypted Multi-Channel Communication" (EMC2) to secure sensitive messages by distributing trust across multiple communication channels.
-
"Grad Student Works With Research Team to Strengthen Nonprofits’ Cybersecurity"Anivesh Sinha, a master's student in Information Science at Penn State Great Valley, is collaborating with a team of faculty and other students to conduct a Presidential Public Impact Research Project to help Pennsylvania nonprofit organizations improv
-
"Security in Quantum Computing"Researchers at the National Center for Supercomputing Applications (NCSA), a unit of the University of Illinois Urbana-Champaign, are addressing the issue of practical quantum computers breaking classical encryption before it becomes an actual problem.
-
"Health Monitoring Devices at Risk of Being Hacked, Study Shows"Researchers at Charles Darwin University (CDU) hacked into an oximeter, a smartwatch, and a smart peak flow meter to explore the potential risks and vulnerabilities of these Internet-connected medical devices. According to the study's co-author, Dr.
-
"The Sherlock Holmes of AI"Georgia Tech developed a postmortem cybersecurity forensic tool named "AI Psychiatry" (AiP) that uses Artificial Intelligence (AI) to recover the original Deep Learning (DL) models a compromised machine, such as a self-driving car, runs on and determin
-
"Cybersecurity and Privacy Institute Secures $1.5M in Funding"Researchers at the University of Waterloo's Cybersecurity and Privacy Institute (CPI) will receive over $1.5 million in funding from the National Cybersecurity Consortium (NCC) to advance digital security in Canada.
-
"CodeHoppers Returns With Aim to Inspire Girls to Learn More About Cyber"The student-led program "CodeHoppers," sponsored by Augusta University's (AU) School of Computer and Cyber Sciences, is returning.
-
"50% of Financial Orgs Have High-Severity Security Flaws in Their Apps"According to security researchers at Veracode, security debt, flaws that remain unfixed for longer than a year, exists in 76% of organizations in the financial services sector, with 50% of organizations carrying critical security debt.
-
"Lottie-Player Supply Chain Attack Targets Cryptocurrency Wallets"LottieFiles has recently confirmed that its Lottie-Player software has been compromised in a supply chain attack aimed at stealing cryptocurrency from victims. LottieFiles’ Lottie-Player is widely used for embedding and playing Lottie animati