University of Central Florida team protects virtual solar facility to win CyberForce Competition

More than 140 U.S. college teams competed to test their cyber defense skills and protect a fictional electric vehicle manufacturer’s solar installation from simulated cyberattacks.

GW Experts on Election Security and Political Violence Ahead of the Midterms

“Election officials in the United States have been alerted to safe-proof their voting systems and be vigilant about political violence amid a “very complex threat environment,” top U.S. cybersecurity official Jen Easterly said on Sunday in the wake of an…

Collegiate students fired up to protect virtual solar facility from cyberattack

Cybersecurity professionals are in high demand. The Department of Energy tasks Argonne National Laboratory with challenging and inspiring college-age students to compete against one another to outsmart cyberattackers in a simulated threat scenario.

UA Little Rock Receives $150,000 NSA Grant to Host Cybersecurity Educational Program Across Arkansas

The University of Arkansas at Little Rock has received a nearly $150,000 grant from the National Security Agency to hold a year’s worth of free cybersecurity educational events for junior high and high school students in Arkansas. UA Little Rock will partner with Philander Smith College to host the 2nd Arkansas GenCyber Strength Training camp in Arkansas, which will support the state’s long-term investment in secondary school cybersecurity education.

GW Experts Available During National Cybersecurity Awareness Month

The George Washington University has several experts available to discuss various cybersecurity topics throughout National Cybersecurity Awareness Month, including privacy and cybersecurity risks, election information security, and cybersecurity as it relates to terrorism and homeland security. If you would like…

NSF-funded project looks at protecting security of marginalized and vulnerable populations

Using a $7.5 million grant from the National Science Foundation (NSF), University of Florida engineers are leading a new effort to understand how groups like the poor, children and the elderly, and the disabled are marginalized by current technologies like smartphones and video conferencing and how current and future technologies can be designed to be more inclusive.

NSF Tags FAU Researcher for Post-quantum Cryptography in NextG Networks

FAU’s Reza Azarderakhsh, Ph.D., was among 34 investigators nationwide selected by the NSF for RINGS, which is short for Resilient and Intelligent Next-Generation Systems. His project is the only one working on taking post-quantum cryptography to next generation systems.

A quarter of world’s Internet users rely on infrastructure at high risk of attack

About a quarter of the world’s Internet users live in countries that are more susceptible than previously thought to targeted attacks on their Internet infrastructure. Many of the at-risk countries are located in the Global South.

‘Beam Me Up:’ Nation’s First Quantum Drone Provides Unrivaled Security

Researchers are developing the nation’s first drone-based, mobile quantum network for unhackable wireless communication. The network includes drones, a ground station, lasers and fiber optics. In war, these drones would provide one-time crypto-keys to exchange critical information, which spies and enemies would not be able to intercept. Quantum protects information using the laws of nature and not just by a clever manmade code.

All-virtual CSAW 2021 features presentations on hardware vulnerabilities, integrated circuits, AI and more

The world has seen dozens of attacks in the past two years. The New York University Tandon School of Engineering’s annual CSAW games aims to prepare a new generation of cyber defenders in ways to address myriad software and hardware threats, from vulnerabilities in artificial intelligence (AI) systems, microchip theft, and more.

CyberForce Competition challenges collegiate students to outwit cyber attackers

College students will secure systems against a simulated cyberattack in the U.S. Department of Energy (DOE) CyberForce Competition™ on November 13. The competition develops experts who can safeguard critical infrastructure, including power plants and other energy facilities.

UA Little Rock, ASBTDC Introduce Online Training to Keep Small Businesses Cyber Safe

New “Cyber Safe” training from the Arkansas Small Business and Technology Development Center equips businesses to recognize and thwart cyber threats. ASBTDC collaborated with the University of Arkansas at Little Rock Cyber Arena to create the Cyber Safe: Cybersecurity for Small Business online training course. The free, on-demand course is broken into short modules covering cybersecurity basics, such as access control, passwords, physical security, and network protection.

Quantum Networks in Our Future

In AVS Quantum Science, investigators outline how a time-sensitive network control plane could be a key component of a workable quantum network. In addition to the well-understood requirements of transmission distance and data rate, for quantum networks to be useful in a real-world setting there are at least two other requirements that need to be considered. One is real-time network control, specifically time-sensitive networking. The second is cost.

New Study Examines Privacy and Security Perceptions of Online Education Proctoring Services

Educational institutions have had to transition to remote learning and exam taking. This has led to an increase in the use of online proctoring services to curb student cheating. In a first-of-its-kind study, researchers explored the security and privacy perceptions of students taking proctored exams.

FAU Invention for Maximum Privacy of Sharing Files Online Gets U.S. Patent

While services such as Snapchat allow self-destructing messages or notify users when a recipient takes a screenshot of a message, there is no way to prevent someone from photographing or showing it to others on the screen. A new invention controls how and when shared documents are displayed and restricts individuals from viewing documents based on individual identity (e.g., face ID, a voice sample), their social network, and when and where the document is being viewed.

Making Our Computers More Secure

Columbia Engineering researchers who are leading experts in computer security recently presented two major papers on memory safety that make computer systems more secure at the International Symposium on Computer Architecture. This new research, which has zero to little effect on system performance, is already being used to create a processor for the Air Force Research Lab.

Director of UCI Cybersecurity Policy & Research Institute available to address recent ransomware attacks.

As the first executive director of the multidisciplinary Cybersecurity Policy & Research Institute at the University of California, Irvine, Bryan Cunningham is focused on solution-oriented strategies to address technical, legal and policy challenges to combat cyber threats, protect individual privacy and civil…

PNNL’s Shadow Figment Technology Foils Cyberattacks

Scientists have created a cybersecurity technology called Shadow Figment that is designed to lure hackers into an artificial world, then stop them from doing damage by feeding them illusory tidbits of success. The technology is aimed at protecting physical targets—infrastructure such as buildings, the electric grid, and water and sewage systems.

Columbia Engineering Team Builds First Hacker-resistant Cloud Software System

Columbia Engineering researchers have developed SeKVM, the first system that guarantees–through a mathematical proof–the security of virtual machines in the cloud. “This is the first time that a real-world multiprocessor software system has been shown to be mathematically correct and secure,” said Computer Science Professor Jason Nieh. “This means that users’ data are correctly managed by software running in the cloud and are safe from security bugs and hackers.”

A “Horizon Strategy” Framework for Science and Technology Policy

The current U.S. innovation model has in multiple respects fallen short in the face of today’s technology competition challenges. MITRE calls for a national-level effort between government, industry, and academia to address the most critical S&T priorities.

Colonial Pipeline hack a wake-up call to ramp up cybersecurity for nation’s infrastructure

The ransomware attack on the Colonial Pipeline, which has sparked fears of a gasoline shortage, exposes vulnerabilities within critical infrastructure systems in the U.S., according to a West Virginia University cybersecurity expert. Ransomware – a cyber attack designed to render files…

Colonial Pipeline: Pres. Biden’s Cybersecurity Executive Order, Economic Impacts, Gas Shortages & Ransomware Attack: Kogod School of Business Experts Available

  WHAT: After almost a week of being shut down due to a ransomware attack, the Colonial Pipeline has finally restarted operations yesterday evening. The shut down caused panic throughout the East Coast with gas stations experiencing shortages and very…

Under attack: Tulane expert offers tips of how to avoid falling victim to ransomware attacks

Randy Magiera, a cybersecurity expert and professor of information technology and information security in Tulane University’s School of Professional Advancement, is available to speak about ransomware attacks, what exactly happens and how to avoid these attacks. For interviews, contact [email protected]