New method to defend against smart home cyber attacks developed by Ben-Gurion University researchers

BEER-SHEVA, Israel…August 3, 2020 – Instead of relying on customers to protect their vulnerable smart home devices from being used in cyberattacks, Ben-Gurion University of the Negev (BGU) and National University of Singapore (NUS) researchers have developed a new method…

Cyber expert on ‘insider threat’ attacks

Dr Duncan Hodges, Senior Lecturer in Cyberspace Operations, Cranfield University, is actively researching insider threats such as the recent Twitter attacck . He and researcher Katie Paxton-Fear are presenting this paper Understanding Insider Threat Attacks Using Natural Language Processing , at the HCI International Conference…

Expanding access to cyber research tools

ALBUQUERQUE, N.M. — Faculty and students at Purdue University now have access to cybersecurity research software developed at Sandia National Laboratories. This marks the first time Sandia has collaborated with an academic community to make its cyber software widely available.…

Technology for cloud efficiency for databases during data-intensive COVID-19 pandemic

WEST LAFAYETTE, Ind. – A Purdue University data science and machine learning innovator wants to help organizations and users get the most for their money when it comes to cloud-based databases. Her same technology may help self-driving vehicles operate more…

Technology for cloud efficiency for databases during data-intensive COVID-19 pandemic

WEST LAFAYETTE, Ind. – A Purdue University data science and machine learning innovator wants to help organizations and users get the most for their money when it comes to cloud-based databases. Her same technology may help self-driving vehicles operate more…

Observations of robotic swarm behavior can help workers safely navigate disaster sites

Using biologically inspired robotic swarms consisting of large groups of robots that have been programmed to operate cooperatively, much like individuals in an ant or bee colony, scientists from the University of Colorado demonstrate that the locally observed distribution of…

New Home Office funded report urges greater action for cybercrime victims

The first major UK study into victims of computer misuse crime has exposed the serious harm some victim’s experience, as well as barriers to reporting such offences, receiving support, achieving justice and the precarious resources dedicated by the police to…

New Home Office funded report urges greater action for cybercrime victims

The first major UK study into victims of computer misuse crime has exposed the serious harm some victim’s experience, as well as barriers to reporting such offences, receiving support, achieving justice and the precarious resources dedicated by the police to…

EPFL researchers put proximity tracing app to the test

Over the past two weeks, EPFL computer scientists have been testing and refining the smartphone-based system developed by the international Decentralized Privacy-Preserving Proximity Tracing project (DP3T), with the help of the Swiss Army. Their goal: to optimize the app’s ability…