News
  • "Researchers Eye 'Topological Signatures' of Cyber Threats"
    Researchers at Pacific Northwest National Laboratory (PNNL) are developing a new method to exploring the higher-dimensional shape of cyber systems in order to identify adversarial attack signatures.
  • "New NSF-Backed Research Addressing Threat of Security Breaches in Semiconductor Design"
    The University of Maine's National Science Foundation (NSF)-funded collaborative research project, “KIPPER: A Scalable Learning-Guided Hardware IP Protection Platform,” will address the threat of confidentiality breaches in semiconductor design, includ
  • "Secure Messaging Through Distributed Messages"
    Researchers at the Technical University of Darmstadt have developed a method called "Encrypted Multi-Channel Communication" (EMC2) to secure sensitive messages by distributing trust across multiple communication channels.
  • "Grad Student Works With Research Team to Strengthen Nonprofits’ Cybersecurity"
    Anivesh Sinha, a master's student in Information Science at Penn State Great Valley, is collaborating with a team of faculty and other students to conduct a Presidential Public Impact Research Project to help Pennsylvania nonprofit organizations improv
  • "Security in Quantum Computing"
    Researchers at the National Center for Supercomputing Applications (NCSA), a unit of the University of Illinois Urbana-Champaign, are addressing the issue of practical quantum computers breaking classical encryption before it becomes an actual problem.
  • "Health Monitoring Devices at Risk of Being Hacked, Study Shows"
    Researchers at Charles Darwin University (CDU) hacked into an oximeter, a smartwatch, and a smart peak flow meter to explore the potential risks and vulnerabilities of these Internet-connected medical devices. According to the study's co-author, Dr.
  • "The Sherlock Holmes of AI"
    Georgia Tech developed a postmortem cybersecurity forensic tool named "AI Psychiatry" (AiP) that uses Artificial Intelligence (AI) to recover the original Deep Learning (DL) models a compromised machine, such as a self-driving car, runs on and determin
  • "Cybersecurity and Privacy Institute Secures $1.5M in Funding"
    Researchers at the University of Waterloo's Cybersecurity and Privacy Institute (CPI) will receive over $1.5 million in funding from the National Cybersecurity Consortium (NCC) to advance digital security in Canada.
  • "CodeHoppers Returns With Aim to Inspire Girls to Learn More About Cyber"
    The student-led program "CodeHoppers," sponsored by Augusta University's (AU) School of Computer and Cyber Sciences, is returning.
  • Pub Crawl - November 2024
    Selections by dgoff
  • "50% of Financial Orgs Have High-Severity Security Flaws in Their Apps"
    According to security researchers at Veracode, security debt, flaws that remain unfixed for longer than a year, exists in 76% of organizations in the financial services sector, with 50% of organizations carrying critical security debt.
  • "Lottie-Player Supply Chain Attack Targets Cryptocurrency Wallets"
    LottieFiles has recently confirmed that its Lottie-Player software has been compromised in a supply chain attack aimed at stealing cryptocurrency from victims. LottieFiles’ Lottie-Player is widely used for embedding and playing Lottie animati