Patent data analysis highlights the leading companies in cybersecurity innovations At a time when public trust has been undermined by strings of cyberattacks and cyber spying, IFI CLAIMS Patent Services – the industry’s most trusted patent data provider – has…
Tag: cyber attack
Vulnerability exposed: Car dealerships grapple with fallout from cybersecurity attacks
Nearly 15,000 car dealerships across North America are still struggling to operate after a massive cyberattack has crippled their software systems. As more vehicles become connected to the Internet and reliant on digital systems, cyberattacks pose a serious risk to businesses and…
MSU receives $1M to create center for cybersecurity training
Michigan State University’s School of Criminal Justice is taking the lead on addressing the state’s cybercrime investigation policy. The school will be working with law enforcement partners across the state to create a full-service training hub to ensure law enforcement agencies are prepared to respond to the increasing threat of cybercrimes.
Expert: Three Skills Cybersecurity Professionals Should Have in 2024
In advance of October’s Cybersecurity Awareness Month, Michael Nizich, Ph.D., adjunct associate professor of computer science at New York Institute of Technology and author of the new book, The Cybersecurity Workforce of Tomorrow, is available for interviews/comments on the most critical…
A simple tool to protect websites from cyber hacking
Cybercrime cost the world $6 trillion in 2021, in many cases due to website vulnerabilities. Now, engineers from Australia, Pakistan and the UAE have developed a new tool to curb hacking and make websites more secure.
All-virtual CSAW 2021 features presentations on hardware vulnerabilities, integrated circuits, AI and more
The world has seen dozens of attacks in the past two years. The New York University Tandon School of Engineering’s annual CSAW games aims to prepare a new generation of cyber defenders in ways to address myriad software and hardware threats, from vulnerabilities in artificial intelligence (AI) systems, microchip theft, and more.
Scientists recognise intruders in noise
A team of scientists from the Moscow Institute of Physics and Technology and the Tupolev Kazan National Research Technological University is developing a mathematical apparatus that could lead to a breakthrough in network security. The results of the work have been published in the journal Mathematics.
Colonial Pipeline is a harbinger of things to come in business
Six days after the Colonial Pipeline was attacked by cyberhackers and left millions hanging at the gas pump, they have gained control of their operations once again. But not before the refinery paid their attackers $5 million in untraceable cryptocurrency, according to…
Colonial Pipeline: Pres. Biden’s Cybersecurity Executive Order, Economic Impacts, Gas Shortages & Ransomware Attack: Kogod School of Business Experts Available
WHAT: After almost a week of being shut down due to a ransomware attack, the Colonial Pipeline has finally restarted operations yesterday evening. The shut down caused panic throughout the East Coast with gas stations experiencing shortages and very…
Homeland Security Expert: Colonial Pipeline Cyber Attack is a Wakeup Call
Professor Michael Greenberger is the founder and director of the University of Maryland Center for Health and Homeland Security (CHHS) and a law school professor at the University of Maryland Francis King Carey School of Law. He developed and teaches…
Cybersecurity in the Blue Economy
More than two-thirds of the Earth’s surface is covered by the oceans and seas. Over the next decade, these vast waters are expected to add $3 trillion to the global economy by generating electricity using marine renewable energy (MRE) devices. These “blue economy” technologies harness power across waves, tides, and currents that could reduce the carbon footprint from energy production and provide grid stability to remote coastal communities.
Missouri S&T expert available to discuss SolarWinds cyber attack
Dr. Sajal Das is available to discuss the science behind the cyber attack on IT company SolarWinds in which attackers were able to access federal networks. Das is a professor of computer science and Daniel St. Clair Endowed Chair at…
Renowned cybersecurity expert Thomas Holt tracks government hacks in real-time.
Thomas J. Holt is Director and Professor in the School of Criminal Justice at Michigan State University. His research focuses on computer hacking, malware, and the role of the Internet in facilitating all manner of crime and deviance. His work…
UA Little Rock makes COSMOS a designated research center
The University of Arkansas at Little Rock Collaboratorium for Social Media and Online Behavioral Studies (COSMOS) Lab has received approval from the Arkansas Department of Education (ADHE) to become an established research center on campus.“By designating COSMOS as a formal center, UA Little Rock will be a leader and pioneer in social media analytics and social media forecasting,” said Dr.
Media consumption predicts how people think about computer hacking
A recent study from Arizona State University examined the impact of general media consumption on hacking behavior. People who consumed more media thought others were likely to engage in hacking. The punishments associated with hacking had no influence on how people thought about hacking.
University of Texas at Dallas Computer Scientists’ New Tool Fools Hackers into Sharing Keys for Better Cybersecurity
Instead of blocking hackers, a new cybersecurity defense approach developed by University of Texas at Dallas computer scientists actually welcomes them.
The method, called DEEP-Dig (DEcEPtion DIGging), ushers intruders into a decoy site so the computer can learn from hackers’ tactics. The information is then used to train the computer to recognize and stop future attacks.
Washington University in St. Louis Cybersecurity expert available to talk mobile malware attacks
The Director of the McKelvey School of Engineering’s Cybersecurity Strategic Initiative is available to discuss the many ways we are all vulnerable to cyber attacks on our mobile devices in the wake of the news of the hack into Jeff…
Organized cybercrime – not your average mafia
Research from Michigan State University is one of the first to identify common attributes of cybercrime networks, revealing how these groups function and work together to cause an estimated $445-600 billion of harm globally per year.
As Iran tensions loom, legal, cybersecurity experts available for media interviews
In the wake of the Jan. 3 airstrike killing Iranian Gen. Qasem Soleimani, legal and cybersecurity concerns linger regarding next moves from Iran and from the Trump administration. University of Colorado Boulder experts are available for media interviews. On legal…
Risk of cyberattack for individuals not substantially greater, according to Virginia Tech expert
While individuals with access to critical infrastructure systems of any type should be vigilant in the coming weeks – most Americans are at no substantially greater risk of cyberattack related to on-going tensions with Iran, according to a Virginia Tech…
ORNL to host 13 teams for DOE CyberForce Competition
Oak Ridge National Laboratory will give college students the chance to practice cybersecurity skills in a real-world setting as a host of the Department of Energy’s fifth collegiate CyberForce Competition on Nov. 16.