News Breaking Â鶹´«Ã½ Channel: Cybersecurity /articles/channels/Cybersecurity This breaking news channel highlights experts, research, and feature stories related to the China/Google dispute and Cybersecurity. en-us Copyright 2024 News News Breaking Â鶹´«Ã½ Channel: Cybersecurity 115 31 / /images/newswise-logo-rss.gif Apple Intelligence's Potential Unintended Privacy Consequences /articles/apple-intelligence-s-unintended-privacy-consequences/?sc=c117 /articles/apple-intelligence-s-unintended-privacy-consequences/?sc=c117 Wed, 11 Sep 2024 14:05:17 EST Artificial Intelligence,Technology,Cybersecurity Science Â鶹´«Ã½,Business News Expert Pitch University of Maryland, Robert H. Smith School of Business New iPhone integrates AI: Expert explains what that really means for users /articles/new-iphone-integrates-ai-expert-explains-what-that-really-means-for-users/?sc=c117 /articles/new-iphone-integrates-ai-expert-explains-what-that-really-means-for-users/?sc=c117 Wed, 11 Sep 2024 11:05:21 EST Artificial Intelligence,Engineering,Technology,Cybersecurity Science News Feature Expert <img src="/legacy/image.php?image=https://ece.vt.edu/content/ece_vt_edu/en/people/profile/saad/jcr:content/bio-image.transform/xl-medium/image.jpg&width=100&height=150" alt="Â鶹´«Ã½ image" />Apple unveiled the iPhone 16 on Monday, a device designed around Apple Intelligence, the company's generative artificial intelligence (AI) offering. This new feature promises a highly personalized experience that goes beyond AI, but what does that mean for avid iPhone users? As AI continues to appear in our everyday lives, what do consumers need to be aware of Walid Saad, a professor of electrical and computer engineering and artificial intelligence expert at Virginia Tech, says AI today is equivalent to the Internet in the 1990s, early 2000s: "Its adoption will be inevitable, and we should be well-informed in order to understand how it will change our world in the next few years. /articles/https://ece.vt.edu/content/ece_vt_edu/en/people/profile/saad/jcr:content/bio-image.transform/xl-medium/image.jpg Virginia Tech Sleep-deprived, cyberbullied teenagers addicted to smartphones now a common global phenomenon /articles/sleep-deprived-cyberbullied-teenagers-addicted-to-smartphones-now-a-common-global-phenomenon/?sc=c117 /articles/sleep-deprived-cyberbullied-teenagers-addicted-to-smartphones-now-a-common-global-phenomenon/?sc=c117 Tue, 03 Sep 2024 19:05:14 EST Addiction,All Journal Â鶹´«Ã½,Behavioral Science,Children's Health,Mental Health,Sleep,Cybersecurity Life Â鶹´«Ã½ (Social and Behavioral Sciences) Research Results <img src="/legacy/image.php?image=/images/uploads/2024/09/03/66d79a0bc7c48_GettyImages-1424585106.jpg&width=100&height=150" alt="Â鶹´«Ã½ image" />A survey of 50,000 primary and secondary school students has found a clear link between night time phone use, sleep deprivation, cyberbullying and poor mental health. /articles//images/uploads/2024/09/03/66d79a0bc7c48_GettyImages-1424585106.jpg University of South Australia Department of Energy Announces $142 Million in Grants to Small Businesses /articles/department-of-energy-announces-142-million-in-grants-to-small-businesses/?sc=c117 /articles/department-of-energy-announces-142-million-in-grants-to-small-businesses/?sc=c117 Tue, 03 Sep 2024 13:05:05 EST Budgets and Funding,Business Ethics,DOE Science Â鶹´«Ã½ Source,Energy,Entrepreneurship,Cybersecurity,DOE Science Â鶹´«Ã½ Source Science News Announcement The U.S. Department of Energy (DOE) today announced awards totaling $142 million for small businesses in 34 states. The 123 projects to be funded address multiple mission-critical areas important for the nation, including clean energy and decarbonization, cybersecurity and grid reliability, fusion energy, and nuclear nonproliferation. Department of Energy, Office of Science The influence of optimism bias and loss aversion of cyber risk management decisions /articles/the-influence-of-optimism-bias-and-loss-aversion-of-cyber-risk-management-decisions/?sc=c117 /articles/the-influence-of-optimism-bias-and-loss-aversion-of-cyber-risk-management-decisions/?sc=c117 Tue, 27 Aug 2024 03:05:26 EST All Journal Â鶹´«Ã½,Technology,Cybersecurity Science News Research Results <img src="/legacy/image.php?image=/images/uploads/2024/08/27/66cd832fbe312_1.jpg&width=100&height=150" alt="Â鶹´«Ã½ image" />The research contributes to the understanding of how optimism bias and loss aversion can skew risk awareness and risk management decisions, emphasizing the need for comprehensive strategies that address these biases to enhance resilience against cyber threats. /articles//images/uploads/2024/08/27/66cd832fbe312_1.jpg Chinese Academy of Sciences Data Privacy in a World of Cyber Threats /articles/data-privacy-in-a-world-of-cyber-threats/?sc=c117 /articles/data-privacy-in-a-world-of-cyber-threats/?sc=c117 Wed, 21 Aug 2024 08:45:50 EST Business Ethics,Entrepreneurship,Technology,Cybersecurity Business News Feature Digital privacy is often framed as an issue for consumers, but Ross School of Business Assistant Professor of Technology and Operations Ruslan Momot argues that companies need to consider the concept as a key element of their business. University of Michigan Ross School of Business Computer Scientists Discover Vulnerabilities in a Popular Security Protocol /articles/computer-scientists-discover-vulnerabilities-in-a-popular-security-protocol/?sc=c117 /articles/computer-scientists-discover-vulnerabilities-in-a-popular-security-protocol/?sc=c117 Tue, 20 Aug 2024 09:00:00 EST All Journal Â鶹´«Ã½,Engineering,Technology,Cybersecurity Science News Research Results <img src="/legacy/image.php?image=/images/uploads/2024/08/19/66c3f0513994a_Blast-RADIUS3.png&width=100&height=150" alt="Â鶹´«Ã½ image" />A research team led by University of California San Diego computer scientists investigated the Remote Authentication Dial-In User Service (RADIUS) protocol and found a vulnerability they call Blast-RADIUS that has been present for decades. /articles//images/uploads/2024/08/19/66c3f0513994a_Blast-RADIUS3.png University of California San Diego UAH student wins national 2024 Department of Energy CyberForce(r) competition /articles/uah-student-wins-national-2024-department-of-energy-cyberforce-competition/?sc=c117 /articles/uah-student-wins-national-2024-department-of-energy-cyberforce-competition/?sc=c117 Wed, 14 Aug 2024 16:05:53 EST STEM Education,Technology,Cybersecurity Science News Announcement <img src="/legacy/image.php?image=/images/uploads/2024/08/14/66bd1413c50f7_HunterWittenborn.jpg&width=100&height=150" alt="Â鶹´«Ã½ image" />A student at The University of Alabama in Huntsville (UAH) has won the 2024 Department of Energy (DOE) CyberForce competition(r), a national contest designed to hone cybersecurity skills and visibility by challenging students to face off in simulated cyber-focused scenarios centered on securing operational energy technology from adversarial forces. /articles//images/uploads/2024/08/14/66bd1413c50f7_HunterWittenborn.jpg University of Alabama Huntsville Cybersecurity Flaws Could Derail High-profile Cycling Races /articles/cybersecurity-flaws-could-derail-high-profile-cycling-races/?sc=c117 /articles/cybersecurity-flaws-could-derail-high-profile-cycling-races/?sc=c117 Wed, 14 Aug 2024 11:00:00 EST Technology,Travel and Transportation,Cybersecurity,Scientific Meetings,Top Hit Stories Science News Research Results <img src="/legacy/image.php?image=/images/uploads/2024/08/13/66bc24a29ac99_EarlenceFernandesbikehacking.jpg&width=100&height=150" alt="Â鶹´«Ã½ image" />High-end bicycles used for high-profile road races such as the Tour de France are vulnerable to cybersecurity attacks targeting the bike's wireless gear shifting system. The researchers are now working with Shimano, one of the leading bicycle component manufacturers, to patch the vulnerabilities. /articles//images/uploads/2024/08/13/66bc24a29ac99_EarlenceFernandesbikehacking.jpg University of California San Diego UWF Center for Cybersecurity earns prestigious CompTIA award /articles/uwf-center-for-cybersecurity-earns-prestigious-comptia-award/?sc=c117 /articles/uwf-center-for-cybersecurity-earns-prestigious-comptia-award/?sc=c117 Mon, 12 Aug 2024 10:05:46 EST STEM Education,Technology,Cybersecurity Life Â鶹´«Ã½ (Education) Announcement <img src="/legacy/image.php?image=/images/uploads/2024/08/12/66ba1f6c3ef67_UWFCompTIAPartnerAwards.png&width=100&height=150" alt="Â鶹´«Ã½ image" />Congratulations to UWF Center for Cybersecurity for receiving the Pathways Champion Award: Cybersecurity Award at the CompTIA Partner Summit! /articles//images/uploads/2024/08/12/66ba1f6c3ef67_UWFCompTIAPartnerAwards.png University of West Florida Cyber Risk Can't be Eliminated, But Can be Managed (in 7 Steps) /articles/cyber-risk-can-t-be-eliminated-but-can-be-managed-in-7-steps/?sc=c117 /articles/cyber-risk-can-t-be-eliminated-but-can-be-managed-in-7-steps/?sc=c117 Mon, 12 Aug 2024 09:05:56 EST Artificial Intelligence,Technology,Cybersecurity Business News Op-Ed Following the CrowdStrike outage, it's significant to reassess total cybersecurity as neither technically possible nor economically desirable. However, an organization can effectively manage cyber risk by approaching it as a process of iterative steps. University of Maryland, Robert H. Smith School of Business UWF Center for Cybersecurity participates in White House cybersecurity roundtable /articles/uwf-center-for-cybersecurity-participates-in-white-house-cybersecurity-roundtable/?sc=c117 /articles/uwf-center-for-cybersecurity-participates-in-white-house-cybersecurity-roundtable/?sc=c117 Tue, 06 Aug 2024 11:05:04 EST In the Workplace,Cybersecurity Life Â鶹´«Ã½ (Education) Feature <img src="/legacy/image.php?image=/images/uploads/2024/08/06/66b23bf95e321_WHONCDExecutiveDirector.png&width=100&height=150" alt="Â鶹´«Ã½ image" />Last week, UWF Center for Cybersecurity participated in The White House's Good-Paying Cyber Jobs for Veterans and Military Spouses Workshop, highlighting the center's CyberSkills2Work program. /articles//images/uploads/2024/08/06/66b23bf95e321_WHONCDExecutiveDirector.png University of West Florida Expert Available: Meta's $1.4B settlement with Texas in Privacy Lawsuit /articles/expert-available-meta-039-s-1-4b-settlement-with-texas-in-privacy-lawsuit/?sc=c117 /articles/expert-available-meta-039-s-1-4b-settlement-with-texas-in-privacy-lawsuit/?sc=c117 Thu, 01 Aug 2024 12:00:49 EST Scientific Meetings,Government and Law,Cybersecurity,U.S. Politics,U.S. Supreme Court Life Â鶹´«Ã½ (Law and Public Policy) Expert Pitch Meta agrees to $1.4B settlement with Texas in privacy lawsuit over facial recognition ... George Washington University Senate Passes Bills to Protect Kids Online /articles/senate-passes-bills-to-protect-kids-online/?sc=c117 /articles/senate-passes-bills-to-protect-kids-online/?sc=c117 Wed, 31 Jul 2024 10:05:15 EST Social Media,Technology,Cybersecurity,Internet Policy Medical News Expert Pitch George Washington University AI 'hallucinations' tackled by University of Bristol researchers /articles/ai-hallucinations-tackled-by-university-of-bristol-researchers/?sc=c117 /articles/ai-hallucinations-tackled-by-university-of-bristol-researchers/?sc=c117 Wed, 31 Jul 2024 04:05:46 EST All Journal Â鶹´«Ã½,Artificial Intelligence,Technology,Cybersecurity Science News Research Results Significant strides in addressing the issue of AI 'hallucinations' and improving the reliability of anomaly detection algorithms in Critical National Infrastructures (CNI) have been made by scientists based in Bristol's School of Computer Science. University of Bristol New Integrated Risk Analysis Framework Enhances Cybersecurity for SMEs /articles/new-integrated-risk-analysis-framework-enhances-cybersecurity-for-smes/?sc=c117 /articles/new-integrated-risk-analysis-framework-enhances-cybersecurity-for-smes/?sc=c117 Tue, 30 Jul 2024 21:05:32 EST Artificial Intelligence,Business Ethics,Technology,Cybersecurity,All Journal News Science News Research Results <img src="/legacy/image.php?image=/images/uploads/2024/07/30/66a995b8cba49_1.jpg&width=100&height=150" alt="Â鶹´«Ã½ image" />MARISMA is a risk analysis framework designed to improve cybersecurity for businesses by offering adaptive, real-time protection for digital assets against evolving threats. /articles//images/uploads/2024/07/30/66a995b8cba49_1.jpg Higher Education Press NYU Tandon School of Engineering and Indian Institute of Technology Kanpur announce seven joint research projects launching their new partnership /articles/nyu-tandon-school-of-engineering-and-indian-institute-of-technology-kanpur-announce-seven-joint-research-projects-launching-their-new-partnership/?sc=c117 /articles/nyu-tandon-school-of-engineering-and-indian-institute-of-technology-kanpur-announce-seven-joint-research-projects-launching-their-new-partnership/?sc=c117 Tue, 30 Jul 2024 16:00:34 EST Artificial Intelligence,Biotech,Robotics,Technology,Cybersecurity Science News Announcement NYU Tandon School of Engineering and Indian Institute of Technology Kanpur (IIT Kanpur) have unveiled their inaugural roster of collaborative research projects, the first such initiatives under the partnership that NYU and IIT Kanpur established last year. The projects aim to advance fields including cybersecurity, biotech, AI, robotics, and wireless communications. NYU Tandon School of Engineering UWF awarded $320,210 to help students understand and prepare applications for security clearance /articles/uwf-awarded-320-210-to-help-students-understand-and-prepare-applications-for-security-clearance/?sc=c117 /articles/uwf-awarded-320-210-to-help-students-understand-and-prepare-applications-for-security-clearance/?sc=c117 Mon, 29 Jul 2024 10:15:00 EST Technology,Cybersecurity Life Â鶹´«Ã½ (Education) Announcement The Florida Defense Support Task Force awarded UWF $320,210 to develop a pilot program that helps students prepare security clearance applications and understand the process of applying for a security clearance. University of West Florida Enhancing Cloud Data Security for Efficient and Private Queries with New Encrypt-Then-Index Strategy /articles/enhancing-cloud-data-security-for-efficient-and-private-queries-with-new-encrypt-then-index-strategy/?sc=c117 /articles/enhancing-cloud-data-security-for-efficient-and-private-queries-with-new-encrypt-then-index-strategy/?sc=c117 Wed, 24 Jul 2024 10:05:04 EST All Journal Â鶹´«Ã½,Artificial Intelligence,Cybersecurity Science News Research Results <img src="/legacy/image.php?image=/images/uploads/2024/07/24/66a1101825b1d_1.jpg&width=100&height=150" alt="Â鶹´«Ã½ image" />A novel encrypt-then-index strategy improves secure data queries on encrypted cloud databases, offering enhanced efficiency and privacy-preserving machine learning. /articles//images/uploads/2024/07/24/66a1101825b1d_1.jpg,/images/uploads/2024/07/24/66a11069182a4_2.jpg Higher Education Press Mass layoffs and data breaches could be connected, according to researchers /articles/are-mass-layoffs-and-data-breaches-connected/?sc=c117 /articles/are-mass-layoffs-and-data-breaches-connected/?sc=c117 Tue, 23 Jul 2024 10:05:15 EST Business Ethics,Technology,Cybersecurity,All Journal Â鶹´«Ã½,Top Hit Stories Science News Research Results <img src="/legacy/image.php?image=/images/uploads/2024/07/23/669fcb5e7cd5e_cybersecurity2.jpg&width=100&height=150" alt="Â鶹´«Ã½ image" />A research team led by faculty from Binghamton University, State University of New York has been exploring how mass layoffs and data breaches could be connected. Their theory: since layoffs create conditions where disgruntled employees face added stress or job insecurity, they are more likely to engage in risky behaviors that heighten the company's vulnerability to data breaches. /articles//images/uploads/2024/07/23/669fcb5e7cd5e_cybersecurity2.jpg Binghamton University, State University of New York