Information Security

Cybersecurity researchers claim every network router at risk of secretly leaking data

http://www.techrepublic.com/article/cybersecurity-researchers-claim-every-network-router-at-risk-of-secretly-leaking-data/

Russian Researchers Claim First Quantum-Safe Blockchain

https://www.hpcwire.com/2017/05/25/russian-researchers-claim-first-quantum-safe-blockchain/

Under Cyber Attack: UH Researchers Look at How to Catch a ‘Phisher’

http://www.uh.edu/news-events/stories/2017/05162017UH-researchers-look-at-how-to-catch-a-phisher.php

The Bizarre Quantum Test That Could Keep Your Data Secure

https://www.wired.com/2017/05/bizarre-quantum-test-keep-data-secure/

Texas A&M research team suggests how to defend against collective attention threats

http://www.techrepublic.com/article/a-texas-a-m-research-team-suggests-how-to-defend-against-collective-attention-threats/

Smartphone security hole: ‘Open port’ backdoors are widespread

http://www.ns.umich.edu/new/releases/24795-smartphone-security-hole-open-port-backdoors-are-widespread

Using AI-enhanced malware, researchers disrupt algorithms used in antimalware

http://www.techrepublic.com/article/using-ai-enhanced-malware-researchers-disrupt-algorithms-used-in-antimalware/

Could a doodle replace your password?

https://theconversation.com/could-a-doodle-replace-your-password-56792

Microsoft’s novel approach to securing IoT

http://www.infoworld.com/article/3193742/internet-of-things/microsofts-novel-approach-to-securing-iot.html

Researchers at University of Luxembourg develop core component for Zcash cryptocurrency

http://sciencebusiness.net/news/80128/University-of-Luxembourg-Researchers-develop-Zcash-cryptocurrency

Novel technique tracks more web users across browsers

http://www1.lehigh.edu/news/novel-technique-tracks-more-web-users-across-browsers

Simulated Ransomware Attack Shows Vulnerability of Industrial Controls

http://www.rh.gatech.edu/news/587359/simulated-ransomware-attack-shows-vulnerability-industrial-controls

Malware Lets a Drone Steal Data by Watching a Computer’s Blinking LED

https://www.wired.com/2017/02/malware-sends-stolen-data-drone-just-pcs-blinking-led/

Researchers from Google, CTI Break SHA-1 Hash Encryption Function

http://www.eweek.com/security/researchers-from-google-cti-break-sha-1-hash-encryption-function.html

Google Releases Test Set to Check Cryptographic Library Security

http://www.eweek.com/security/google-releases-test-set-to-check-cryptographic-library-security.html

Six seconds to hack a credit card

http://www.ncl.ac.uk/press/news/2016/12/cyberattack/#hp-banner

Malware that turns PCs into eavesdropping devices demonstrated by Ben-Gurion U.

https://www.eurekalert.org/pub_releases/2016-11/aabu-mtt112216.php

Computer scientists work to prevent hackers from remotely controlling cars

http://phys.org/news/2016-11-scientists-hackers-remotely-cars.html

 

Encrypting medical photos with chaos

http://www.alphagalileo.org/ViewItem.aspx?ItemId=168839&CultureCode=en

Computer scientists explore random numbers, cybersecurity

http://www.dailytexanonline.com/2016/10/07/computer-scientists-explore-random-numbers-cybersecurity

Combating cybercrime when there’s plenty of phish in the sea

http://www.cam.ac.uk/research/features/combating-cybercrime-when-theres-plenty-of-phish-in-the-sea

Crypto needs more transparency, researchers warn

http://www.theregister.co.uk/2016/10/09/crypto_needs_more_transparency_researchers_warn/

Hacker-Proof Code Confirmed

https://www.quantamagazine.org/20160920-formal-verification-creates-hacker-proof-code/

Hardware hack defeats iPhone passcode security

http://www.bbc.com/news/technology-37407047

The Cryptographic Key That Secures the Web Is Being Changed for the First Time

http://motherboard.vice.com/read/the-encryption-key-that-secures-the-web-is-being-changed-for-the-first-time?trk_source=homepage-lede

CMU ALGORITHM DETECTS ONLINE FRAUDSTERS

http://www.cmu.edu/news/stories/archives/2016/september/detecting-online-fraudsters.html

Smartphone hacks 3-D printer by measuring ‘leaked’ energy and acoustic waves

http://www.buffalo.edu/news/releases/2016/09/009.html

Researchers create 3D faces from online photos to defeat face authentication systems

http://www.networkworld.com/article/3109899/security/researchers-create-3d-faces-from-online-photos-to-defeat-face-authentication-systems.html

 

CYBERSECURITY RESEARCHERS DESIGN A CHIP THAT CHECKS FOR SABOTAGE

http://engineering.nyu.edu/press-releases/2016/08/23/cybersecurity-researchers-design-chip-checks-sabotage

 

New approach needed to IT, says NIST’s top cyber scientist

http://fedscoop.com/ron-ross-cybersecurity-comission-august-2016

 

Secure networks for the Internet of the future

https://www.uni-wuerzburg.de/en/sonstiges/meldungen/detail/artikel/sichere-netzwerke-fuers-internet-der-zukunft-1/

 

World’s most efficient AES crypto processing technology for IoT devices developed

https://www.sciencedaily.com/releases/2016/08/160822100659.htm

Encryption breakthrough: Scientists derive truly random numbers using two-source extractors

http://www.techrepublic.com/article/computer-scientists-derive-truly-random-numbers-using-two-source-extractors/

DARPA Challenge Tests AI as Cybersecurity Defenders

http://spectrum.ieee.org/tech-talk/computing/software/darpa-challenge-tests-ai-as-cybersecurity-defenders

Sandia Labs Researchers Build DNA-Based Encrypted Storage

http://www.darkreading.com/vulnerabilities—threats/sandia-labs-researchers-build-dna-based-encrypted-storage-/d/d-id/1326267

Harmonised security across devices

http://cordis.europa.eu/news/rcn/125625_en.html

How well do facial recognition algorithms cope with a million strangers?

http://www.washington.edu/news/2016/06/23/how-well-do-facial-recognition-algorithms-cope-with-a-million-strangers/

Computing a secret, unbreakable key

https://uwaterloo.ca/news/news/computing-secret-unbreakable-key

Tor Project works on boosting encryption for next release

http://www.zdnet.com/article/tor-project-works-on-boosting-encryption-in-next-release/

Closing security gaps in Internet-connected household

http://aktuell.ruhr-uni-bochum.de/pm2016/pm00086.html.en

Advanced game theory goes to work for homeland security

https://gcn.com/blogs/emerging-tech/2016/06/game-theory-homeland-security.aspx

 

Researchers Demo How to Build Nearly Invisible Backdoor in Computer Chips

http://www.darkreading.com/threat-intelligence/researchers-demo-how-to-build-nearly-invisible-backdoor-in-computer-chips/d/d-id/1325786

 

Computing a secret, unbreakable key

https://uwaterloo.ca/news/news/computing-secret-unbreakable-key

4 big plans to fix internet security

http://www.infoworld.com/article/3067739/security/4-big-plans-to-fix-internet-security.html

How to Hack the Hackers: The Human Side of Cyber Crime

http://www.scientificamerican.com/article/how-to-hack-the-hackers-the-human-side-of-cyber-crime/

New Method of Producing Random Numbers Could Improve Cybersecurity

http://news.utexas.edu/2016/05/16/computer-science-breakthrough-could-improve-cybersecurity

DARPA has since September awarded seven XD3 multi-million contracts to Georgia Tech, George Mason University, Invincea Labs, Raytheon BBN, Vencore Labs and this week to the University of Pennsylvania

http://www.networkworld.com/article/3073481/security/darpa-extreme-ddos-project-transforming-network-attack-mitigation.html

NIST looks to reengineer thinking about cyber

https://fcw.com/articles/2016/04/27/nist-cyber-draft.aspx?m=2

It’s the year 2020…how’s your cybersecurity?

https://theconversation.com/its-the-year-2020-hows-your-cybersecurity-57868

NIST Kicks Off Effort to Defend Encrypted Data from Quantum Computer Threat

 http://www.nist.gov/itl/csd/nist-kicks-off-effort-to-defend-encrypted-data-from-quantum-computer-threat.cfm

DARPA Is Looking For The Perfect Encryption App, and It’s Willing to Pay

http://motherboard.vice.com/read/darpa-decentralized-blockchain-encryption-messaging-app

NIST is nearly ready to pick the next hash algorithm

http://gcn.com/Articles/2010/08/18/SHA-3-Conference-NIST-cryptography.aspx?Page=1

DARPA takes aim at insider threats

http://www.networkworld.com/community/node/65544

Scientists view cybersecurity as an intimidating conundrum

http://www.nextgov.com/nextgov/ng_20100902_6736.php

New Research Improves Ability To Detect Malware in Cloud-Computing Systems

http://news.ncsu.edu/releases/wmsninghypersentry/

AUTOMATED BIOMETRIC RECOGNITION TECHNOLOGIES ‘INHERENTLY FALLIBLE,’  BETTER SCIENCE BASE NEEDED

http://www8.nationalacademies.org/onpinews/newsitem.aspx?RecordID=12720

Rivest unlocks cryptography’s past, looks toward future
Public-key system has worked and made Internet commerce feasible, but new systems are ready in case flaws are found

http://web.mit.edu/newsoffice/2011/killian-rivest-0215.html

Cyber security summit signs UK-US university deal

http://www.bbc.co.uk/news/uk-wales-12854531

Strong protection for weak passwords

http://www.mpg.de/2823498/effective_password_protection?filter_order=L

Cyber identity strategy would eliminate the need for multiple passwords

http://www.nextgov.com/nextgov/ng_20110415_8437.php

Researchers show Android devices susceptible to eavesdropping

http://www.physorg.com/news/2011-05-android-devices-susceptible-eavesdropping.html

Stanford computer scientists find Internet security flaw

http://news.stanford.edu/news/2011/may/captcha-security-flaw-052311.html

Alberta research aims to keep information secure

http://www.cbc.ca/news/canada/calgary/story/2011/07/13/cal-safe-information.html

UA Researchers Develop Prototype to Detect Fake Websites

http://uanews.org/node/40484

Researchers identify first flaws in the Advanced Encryption Standard

http://www.kuleuven.be/english/newsletter/newsflash/encryption_standard.html

Secure updates for navigation systems & Co

http://www.fraunhofer.de/en/press/research-news/2010-2011/21/secure-updates.jsp

Will advanced biometrics automate future war machines?

http://www.networkworld.com/news/2011/092811-biometrics-war-machine-251352.html

The Science of Cyber Security

http://www.usnews.com/science/articles/2011/08/04/the-science-of-cyber-security

New forensics tool can expose all your online activity

http://www.newscientist.com/article/mg21128285.300-new-forensics-tool-can-expose-all-your-online-activity.html

Texas Computer Scientist Outflanks Next-Generation Computer Viruses

http://www.afcea.org/signal/articles/templates/Signal_Article_Template.asp?articleid=2754&zoneid=329

NIST Signs Agreement to Enhance Cybersecurity Education Programs

http://www.nist.gov/itl/cyberschool-110811.cfm

Georgia Tech Helps to Develop System That Will Detect Insider Threats from Massive Data Sets

http://www.gatech.edu/newsroom/release.html?nid=72599

NIST Improves Tool for Hardening Software Against Cyber Attack

http://www.nist.gov/itl/ssd/20111122_samate.cfm

White House Sets Cybersecurity R&D Priorities

http://informationweek.com/news/government/security/232300107

Could hackers develop a ‘computer virus’ to infect the human mind?

Microsoft to launch real-time intelligent threat feed

http://www.networkworld.com/news/2012/011212-microsoft-intelligence-254846.html

Sandia cyber project looks to help IT professionals with complex Domain Name System (DNS) vulnerabilities

https://share.sandia.gov/news/resources/news_releases/dnsviz/

DARPA set to develop super secure “cognitive fingerprint”

http://www.networkworld.com/community/node/79581

Researchers crack online encryption system

http://www.computerworld.com/s/article/9224265/Researchers_crack_online_encryption_system

Scripps Research and Technion Scientists Develop Biological Computer to Encrypt and Decipher Images

http://www.scripps.edu/news/press/20120207keinan.html

Researchers set new cryptanalysis world record for pairing-based cryptography

http://www.networkworld.com/news/2012/061912-researchers-set-new-cryptanalysis-world-260338.html

Researchers advance biometric security

http://www.ucalgary.ca/news/utoday/june19-2012/biometric

Scientists Develop Method for Authenticating Digital Images by Analyzing ‘Noise’

http://www.albany.edu/news/26046.php

Swiss scientists develop algorithm to sniff out source of malware, spam attacks

http://www.computerworld.com/s/article/9230199/Swiss_scientists_develop_algorithm_to_sniff_out_source_of_malware_spam_attacks

The password you can use without knowing it

http://www.newscientist.com/article/mg21528743.900-the-password-you-can-use-without-knowing-it.html

New Tool Aims To Ensure Software Security Policies Reflect User Needs

http://news.ncsu.edu/releases/wms-xie-acp/

Researchers borrow DNA tricks to identify malware’s genetic code

http://www.v3.co.uk/v3-uk/the-frontline-blog/2244636/researchers-borrow-dna-tricks-to-identify-malwares-genetic-code

UAB develops a simple defense for complex smartphone malware

http://www.uab.edu/news/latest/item/3224-uab-develops-a-simple-defense-for-complex-smartphone-malware

More secure bank cards

http://cordis.europa.eu/fetch?CALLER=EN_NEWS&ACTION=D&SESSION=&RCN=35565

HTTPS Security Encryption Flaws Found

http://www.informationweek.com/security/encryption/https-security-encryption-flaws-found/240151117

Encryption Chip Fights Off Sneak Attacks

http://spectrum.ieee.org/computing/it/encryption-chip-fights-off-sneak-attacks/

Security holes in smartphone apps (WITH VIDEO)

http://news.ucdavis.edu/search/news_detail.lasso?id=10556

GEORGIA TECH UNCOVERS IOS SECURITY WEAKNESSES

http://www.gatech.edu/newsroom/release.html?nid=225501

Shadows and light: Dartmouth researchers develop new software to detect forged photos

http://www.sciencecodex.com/shadows_and_light_dartmouth_researchers_develop_new_software_to_detect_forged_photos-116991

Detecting program-tampering in the cloud

http://web.mit.edu/newsoffice/2013/detecting-program-tampering-in-the-cloud-0911.html

Bristol researchers work to secure next generation chip-card payment technology

http://www.bristol.ac.uk/news/2013/9879.html#!

NSA’s reported tampering could change how crypto standards are made

http://gcn.com/articles/2013/11/04/nist-crypto-review.aspx#!

Engineers Plan a Fully Encrypted Internet

http://www.technologyreview.com/news/521621/engineers-plan-a-fully-encrypted-internet/

Research trio crack RSA encryption keys by listening to computer noise

http://phys.org/news/2013-12-trio-rsa-encryption-keys-noise.html#!

“Honey Encryption” Will Bamboozle Attackers with Fake Secrets

http://www.technologyreview.com/news/523746/honey-encryption-will-bamboozle-attackers-with-fake-secrets/

Cryptography Breakthrough Could Make Software Unhackable

http://www.wired.com/wiredscience/2014/02/cryptography-breakthrough/

Fighting off virtual attacks

http://news.uci.edu/features/fighting-off-virtual-attacks/

New algorithm shakes up cryptography

http://www.sciencedaily.com/releases/2014/05/140515163739.htm

Researchers Test Distributed Computing As Defense against Cyberattacks on Power Grids

http://web.ncsu.edu/abstract/technology/grid-cyberattack-defense/

MINT program helps pinpoint threats contained in intelligence data

http://phys.org/news/2014-05-mint-threats-intelligence.html

How to Exchange Encrypted Messages on Any Website

http://www.technologyreview.com/news/532186/how-to-exchange-encrypted-messages-on-any-website/

Raising cryptography’s standards

http://newsoffice.mit.edu/2014/cryptographic-schemes-security-guarantees-1030

The future of encryption

http://www.nsf.gov/discoveries/disc_summ.jsp?cntn_id=136673&org=NSF&from=news

A basis for all cryptography

http://news.mit.edu/2015/secure-foundation-any-cryptographic-system-1028

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: