Subscribe to Security

The Lead

The Biosurveillance Gateway site offers a variety of Los Alamos-developed biosurveillance tools that can be used for decision support in disease surveillance.

Biosurveillance Gateway Supports Centralized Global Disease Response

January 28, 2015 2:21 pm | by Los Alamos National Laboratory | News | Comments

A new online resource, called the Biosurveillance Gateway, is in place at Los Alamos National Laboratory, providing a centralized portal for all news, information, resources and research related to biosurveillance at the laboratory. The goal of the site is to support global disease surveillance, providing useful tools for professionals around the world to reference from a single location.

Self-powered Intelligent Keyboard could Provide New Layer of Biometric Security

January 27, 2015 10:12 am | by John Toon, Georgia Institute of Technology | News | Comments

By analyzing such parameters as the force applied by key presses and the time interval between...

Extending Einstein's Spooky Actions for Use in Quantum Networks

January 26, 2015 4:18 pm | by Swinburne University of Technology | News | Comments

Researchers have demonstrated that the 1935 Einstein-Podolsky-Rosen quantum mechanics paradox...

British Code Breaker Alan Turing's Notebook Goes to Auction

January 26, 2015 1:33 pm | by AP | News | Comments

A handwritten notebook by Alan Turing, the World War II code-breaking genius depicted by...

View Sample

FREE Email Newsletter

The Repository of Industrial Security Incidents is a database of incidents of a cybersecurity nature that have (or could have) affected process control, industrial automation or Supervisory Control and Data Acquisition (SCADA) systems.

Cybersecurity Expert Warns Not Enough Being Done to Prevent Highly Destructive Cyberattacks on Critical Infrastructure

January 21, 2015 1:13 pm | by International Society of Automation | News | Comments

Inadequate training and a culture of complacency among many owners and operators of critical infrastructure are significantly raising the risks of highly damaging cyberattack throughout the world. That’s the viewpoint expressed by Steve Mustard, an industrial cybersecurity subject-matter expert and consultant with extensive development and management experience in real-time embedded equipment and automation systems.

President Barack Obama, right, walks with British Prime Minister David Cameron on the West Wing Colonnade of the White House, on Thursday, January 15, 2015, in Washington. (AP Photo/Evan Vucci)

US, Britain to Stage Cyber War Games

January 16, 2015 12:02 pm | by Josh Lederman, Associated Press | News | Comments

The U.S. and U.K. will stage cyber "war games" together, starting this year, to boost both countries' resistance to cyberattacks, Britain's government said. The two Western powers have also agreed to launch a joint cyber cell to share information on cyberthreats, as both countries seek to ramp up their cyberdefenses in the wake of alarming attacks. The FBI and National Security Agency will be involved, along with Britain's GCHQ and MI5...

Automated systems for isolating collected data, restricting queries that can be made against those data, and auditing usage of the data can help to enforce privacy protections and allay some civil liberty concerns.

Surveillance: NRC finds No Alternative to Bulk Data Collection

January 15, 2015 12:10 pm | by The National Academies | News | Comments

No software-based technique can fully replace bulk collection of signals intelligence, but methods can be developed to more effectively conduct targeted collection and to control usage of collected data, says the NRC. Automated systems for isolating collected data, restricting queries that can be made against those data, and auditing usage of the data can help to enforce privacy protections and allay some civil liberty concerns.

President Barack Obama speaks at the National Cybersecurity and Communications Integration Center in Arlington, VA, January 13, 2015. Obama renewed his call for Congress to pass cybersecurity legislation, including a proposal that encourages companies to

Obama Unveils Cybersecurity Proposals in Advance of State of the Union Address

January 14, 2015 11:46 am | by Jack Gillum, Associated Press | News | Comments

President Barack Obama has said that recent cyberthreats to Sony and the military's U.S. Central Command are reminders of the serious threats facing the nation. Obama laid out plans on January 13, 2015, as part of a push for new cybersecurity legislation that increases government information-sharing and protects businesses from lawsuits for revealing cyberthreats.

Measuring side-channel signals2: Georgia Tech researcher Alenka Zajic measures electromagnetic emissions from various components of a desktop computer. The researchers have studied emissions from desktop and laptop computers, as well as cellphones.

Countering Side-channel Hacker Attacks

January 14, 2015 11:35 am | by Georgia Institute of Technology | News | Comments

If you’re sitting in a coffee shop, tapping away on your laptop, feeling safe from hackers because you didn’t connect to the shop’s Wi-Fi, think again. The bad guys may be able to see what you’re doing just by analyzing the low-power electronic signals your laptop emits, even when it’s not connected to the Internet. Side-channel signals could provide hackers with another way to see what the devices are doing.

IBM broke the U.S. patent record in 2014, becoming the first company to exceed 7,000 patents in a single year. More than 8,500 IBM inventors around the world, including researcher Stacy Hobson (pictured), produced 7,534 patents for IBM in 2014.

IBM Breaks U.S. Patent Record

January 13, 2015 10:35 am | by IBM | News | Comments

IBM has announced that it received a record 7,534 patents in 2014 — marking the 22nd consecutive year that the company topped the annual list of U.S. patent recipients. IBM inventors earned an average of more than 20 patents per day in 2014, propelling the company to become the first to surpass more than 7,000 patents in a single year.

IEEE Computer Society has announced the top 10 most important technology trends for 2015 and explores how these technologies will be integrated into daily life.

IEEE Unveils Top 10 Technology Trends for 2015

January 12, 2015 12:10 pm | by IEEE | News | Comments

In the coming year, while consumers will be treated to a dizzying array of augmented reality, wearables, and low-cost 3-D printers, computer researchers will be tackling the underlying technology issues that make such cutting-edge consumer electronics products possible. IEEE Computer Society has announced the top 10 most important technology trends for 2015 and explores how these technologies will be integrated into daily life.

Hole cards in a game of Texas Hold 'em. A computer program that taught itself to play poker has created nearly the best possible strategy for one version of the game, showing the value of techniques that may prove useful for real-world challenges Courtesy

Game Theory: Self-taught Program Finds Ideal Poker Strategy

January 9, 2015 10:14 am | by Malcolm Ritter, AP Science Writer | News | Comments

A computer program that taught itself to play poker has created nearly the best possible strategy for one version of the game, showing the value of techniques that may prove useful to help decision-making in medicine and other areas. The program considered 24 trillion simulated poker hands per second for two months, probably playing more poker than all humanity has ever experienced.

Geoff Pryde from Griffith's Centre for Quantum Dynamics led a team that showed the quantum-refereed steering protocol can match tests for strong entanglement in not requiring trust in the measuring devices, and has the further advantage of being robust to

Quantum Steering Enhances Internet Data Security

January 8, 2015 12:26 pm | by Griffith University | News | Comments

Research conducted at Griffith University may lead to greatly improved security of information transfer over the Internet. Physicists from the Centre for Quantum Dynamics demonstrate the potential for "quantum steering" to be used to enhance data security over long distances, discourage hackers and eavesdroppers and resolve issues of trust with communication devices.

A smart home can be controlled remotely, inviting hacking.

Smart Homes: Working to Prevent a Cybersecurity Nightmare

January 7, 2015 12:59 pm | by Jennifer Donovan, Michigan Technological University | News | Comments

Imagine the smart home of the future. Thanks to a central controller and Wi-Fi, not only does the thermostat power up and warm or cool the house as you are heading home, smart light bulbs come on low at dusk and brighten up as the sky gets darker; and your washing machine starts a load of clothes when the electricity is cheapest. But what if a hacker gained access to your central controller? Your heat has been on full blast all day ...

The FBI is recruiting new cyber special agents, along with computer scientists, digital forensic examiners, and cyber-skilled interns.

FBI Seeking Tech Experts to Become Cyber Special Agents

January 2, 2015 12:22 pm | by FBI | News | Comments

Since its earliest days, the FBI has looked for recruits with specialized skills to fill its special agent ranks. Today, the most sought-after candidates possess a uniquely 21st century quality: cyber expertise. To keep pace with the evolving threat, the Bureau is appealing to experienced and certified cyber experts to consider joining the FBI to apply their well-honed tradecraft as cyber special agents.

David Mazieres, an associate professor of computer science at Stanford, is leading an effort to get COWL through the process of standardization, which takes about a year. The goal is to have the first public draft of the standard ready by January.

New Security System Extends Firefox and Chrome to make Internet Safer

December 24, 2014 10:19 am | by Chris Cesare, Stanford | News | Comments

Computer scientists have extended two popular browsers to empower developers to deliver creative new services while also make surfing safer. The team added a security system called COWL, or Confinement with Origin Web Labels, to Firefox and Chrome to manage how data is shared. It prevents malicious computer code from leaking sensitive information and, at the same time, allows Web applications to display content drawn from multiple sources.

An atomic memory (glowing green), made at the Faculty of Physics at the University of Warsaw, can be used to store quantum information in telecomunication purposes. From left to right: Michał Dąbrowski, Radek Chrapkiewicz and Wojciech Wasilewski. Courtesy

Global Quantum Communications No Longer the Stuff of Fiction

November 26, 2014 1:40 pm | by University of Warsaw | News | Comments

Following years of tests in physics laboratories, the first quantum technologies are slowly emerging into wider applications. One example is quantum cryptography — an encryption method providing an almost full guarantee of secure data transmission, currently being introduced by military forces and banking institutions.

The program showed "mind-blowing" sophistication by penetrating several different computer networks in an unnamed Middle Eastern country. Rather than communicate with each target, the malware was able to avoid detection by using one network to relay comma

Mind-blowingly Sophisticated Hacking Program is Groundbreaking, Almost Peerless

November 26, 2014 12:15 pm | by Brandon Bailey, AP Technology Writer | News | Comments

Cyber-security researchers say they've identified a highly sophisticated computer hacking program that appears to have been used to spy on banks, telecommunications companies, official agencies and other organizations around the world. The malicious software known as "Regin" is designed to collect data from its targets for periods of months or years, penetrating deep into computer networks while covering its tracks to avoid detection.

Eric Eide, University of Utah research assistant professor of computer science, stands in the computer science department's "Machine Room" where racks of Web servers sit. It is on these computers that Eide, computer science associate professor John Regehr

Self-Repairing Software Tackles Malware

November 14, 2014 3:54 pm | by University of Utah | News | Comments

Computer scientists have developed software that not only detects and eradicates never-before-seen viruses and other malware, but also automatically repairs damage caused by them. The software then prevents the invader from ever infecting the computer again.

Panasas SiteSync

Panasas SiteSync

November 13, 2014 2:43 pm | Panasas | Product Releases | Comments

SiteSync is a high-speed, parallel replication and file transfer solution designed to solve the challenge of moving massive data sets across the LAN quickly and with ease. The software can replicate data up to 10x faster than conventional file transfer utilities. It provides fast and flexible parallel data migration and synchronization for disaster recovery, disk-to-disk backup and remote archive applications.

Specific bits of a digital image file that have been replaced with the bits of a secret steganographic payload permit a covert agent to post top-secret documents on their Facebook wall by simply uploading what appear to be cute images of kittens on any ty

Leading the Eyewitness: Digital Image Forensics in a Megapixel World

November 12, 2014 3:42 pm | by William Weaver, Ph.D. | Articles | Comments

Current research in the area of digital image forensics is developing better ways to convert image files into frequencies, such as using wavelet transforms in addition to more traditional cosine transforms and more sensitive methods for determining if each area of an image belongs to the whole.

Traditionally, a person might enter a password or pull out a driver's license or passport as proof of identity. But increasingly, identification and authentication can also require an eye scan or a well-placed hand. It's a science known as biometrics, rec

Cybersecurity: Computer Scientist Sees New Possibilities for Ocular Biometrics

November 4, 2014 12:37 pm | by Miles O'Brien, NSF | News | Comments

Researhers are developing a three-layered, multi-biometric approach that tracks the movement of the eye globe and its muscles, and monitors how and where a person's brain focuses visual attention, in addition to scanning patterns in the iris. The system essentially upgrades the security of existing iris recognition technology with nothing more than a software upgrade.

Products and services based on TIBCO's Fast Data platform are designed to enable businesses worldwide to turn big data into a differentiator.

TIBCO Announces New Ease-of-Use Enhancements to Fast Data Capabilities

November 3, 2014 11:37 am | by TIBCO Software | News | Comments

TIBCO Software has announced improvements to the company's Fast Data capabilities, enabling IT and business users to leverage today’s rapidly changing business environment. Products and services based on TIBCO's Fast Data platform are designed to enable businesses worldwide to turn big data into a differentiator.

When properly understood, privacy rules are essential, Neil M. Richards, JD, professor of law says.

Right to Privacy: Achieving Meaningful Protection in a Big Data World

October 24, 2014 8:42 pm | by Washington University in St. Louis | News | Comments

In the digital age in which we live, monitoring, security breaches and hacks of sensitive data are all too common. It has been argued that privacy has no place in this big data environment and anything we put online can, and probably will, be seen by prying eyes. In a new paper, a privacy law expert makes the case that, when properly understood, privacy rules will be an essential and valuable part of our digital future.

NIST Cloud Computing Roadmap Details Research Requirements, Action Plans  Courtesy of Irvine/NIST and ©magann/Fotolia

NIST Cloud Computing Roadmap Reflects Worldwide Input

October 23, 2014 3:23 pm | by National Institute of Standards and Technology (NIST) | News | Comments

The National Institute of Standards and Technology (NIST) has published the final version of the US Government Cloud Computing Technology Roadmap, Volumes I and II. The roadmap focuses on strategic and tactical objectives to support the federal government’s accelerated adoption of cloud computing. This final document reflects the input from more than 200 comments on the initial draft received from around the world.

Companies can log on, cost-free, at and track developing threats, plus map their IT supply chains and anonymously measure themselves against industry peers and NIST standards.

Counter-measure Offers Cyber Protection for Supply Chains

October 22, 2014 10:14 am | by University of Maryland | News | Comments

The supply chain is ground zero for several recent cyber breaches. Hackers, for example, prey on vendors that have remote access to a larger company's global IT systems, software and networks. In the 2013 Target breach, the attacker infiltrated a vulnerable link: a refrigeration system supplier connected to the retailer's IT system. A counter-measure, via a user-ready online portal, has been developed at the Supply Chain Management Center.

Caris Life Sciences is accelerating precision medicine for cancer treatment using IBM technical computing and software defined storage solutions.  Courtesy of Caris Life Science

Accelerating Use of Molecular Profiling in Cancer Treatment Selection

September 25, 2014 4:43 pm | by IBM | News | Comments

IBM announced that Caris Life Sciences is using IBM technical computing and storage technology to accelerate the company’s molecular profiling services for cancer patients. The Caris tumor profiling database is one of the largest datasets in the application of advanced molecular profiling technologies to support clinicians in delivering personalized treatment recommendations — or precision oncology.

The research center’s first director, Jeff Moulton, will be charged with attracting major research contracts by leveraging the university’s unique strengths in such disciplines as supercomputing, cybersecurity and nanotechnology.

Cyber Research Center Announced at LSU

September 24, 2014 1:52 pm | by Louisiana Economic Development | News | Comments

Governor Jindal and LSU President and Chancellor Alexander announced creation of the LSU Transformational Technology and Cyber Research Center, which will pursue major federal and commercial research projects in applied technology fields, leveraging the university’s unique strengths in such disciplines as supercomputing, cybersecurity and nanotechnology.

This small device developed at Los Alamos National Laboratory uses the truly random spin of light particles as defined by laws of quantum mechanics to generate a random number for use in a cryptographic key that can be used to securely transmit informatio

Secure Computing for the Everyman: Quantum Computing goes to Market

September 17, 2014 1:40 pm | by Los Alamos National Laboratory | News | Comments

The largest information technology agreement ever signed by Los Alamos National Laboratory brings the potential for truly secure data encryption to the marketplace after nearly 20 years of development at the nation's national-security science laboratory.

You may login with either your assigned username or your e-mail address.
The password field is case sensitive.