During the opening ceremonies of the 2018 Winter Olympics, held in PyeongChang, South Korea, Russian hackers launched a cyberattack that disrupted television and internet systems at the games. The incident was resolved…
During the opening ceremonies of the 2018 Winter Olympics, held in PyeongChang, South Korea, Russian hackers launched a cyberattack that disrupted television and internet systems at the games. The incident was resolved…
A hack of the U.S. Treasury and Commerce departments last week, described by The New York Times as one of the most “sophisticated and perhaps largest hacks in more than five years,” was likely perpetrated…
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) is working to speed development of solutions for the most pressing homeland security challenges with the launch of an entrepreneurship program called…
A hacker can reproduce a circuit on a chip by discovering what key transistors are doing in a circuit – but not if the transistor “type” is undetectable. Purdue University engineers have…
A new study outlines ways colleges and universities can update their curricula to prepare the workforce for a new wave of quantum technology jobs. Three researchers, including Rochester Institute of Technology Associate…
The University of Arkansas at Little Rock is part of a coalition of universities and industry partners that are developing a curriculum to increase cybersecurity talent focused on health care with $6.3…
Researchers have found that using multiple patterns to unlock an Android phone provides significantly more security than the current single-pattern method, and, in some cases, may be more secure than the 4-…
Computer scientists at Columbia Engineering have shown for the first time that it is possible to analyze how thousands of Android apps use cryptography without needing to have the apps’ actual…
The Internet of Things (IoT) allowing smart phones, home appliances, drones and self-driving vehicles to exchange digital information in real time requires a powerful security solution, as it can have a direct…