Archive of ‘Cybersecurity’ category

master program on cybersecurity

Berkeley Launches Online Master of Information and Cybersecurity

By Joshua Bolkan 11/16/16

https://campustechnology.com/articles/2016/11/16/berkeley-launches-online-master-of-information-and-cybersecurity.aspx

The University of California, Berkeley’s School of Information (I School) has tapped a private partner to help launch a new online program, Master of Information and Cybersecurity (MICS).

Dubbed cybersecurity@berkeley, the new program was developed in collaboration with the university’s Center for Long-Term Cybersecurity and College of Engineering.

The 27-unit course will use 2U’s online learning platform for live, weekly meetings. Between sessions, students will have access to interactive content designed by MICS faculty. Students will also have the opportunity to visit campus to meet faculty and classmates and attend lectures and workshops curated specifically for students in the program.

++++++++++++++++++
more on cybersecurity in this IMS blog
http://blog.stcloudstate.edu/ims?s=cybersecurity

signal open whisper system

signal app
open whisper system is the company
download from the NPR Marketplace Tech available here:
http://play.podtrac.com/APM-MarketplaceTechReport/play.publicradio.org/rss/d/podcast/marketplace/tech_report/2016/11/16/tech_20161116_pod_64.mp3?siteplayer=true&dl=1

More on the app in the Codebreaker podcast

++++++++++++++++++++++++++++
more on cybersecurity in this blog:
http://blog.stcloudstate.edu/ims?s=cybersecurity
More on civil disobedience in this blog:
http://blog.stcloudstate.edu/ims?s=civil

 

visualization of cyberattacks

Carnegie Mellon Researchers Create Data Visualization Tool to Identify Cyber Attacks

By Rhea Kelly 11/07/16

https://campustechnology.com/articles/2016/11/07/carnegie-mellon-researchers-create-data-visualization-tool-to-identify-cyber-attacks.aspx

Researchers at Carnegie Mellon University‘s CyLab Security and Privacy Institute have developed a new tool for analyzing network traffic and identifying cyber attacks. The tool uses data visualization to make it easier for network analysts to see key changes and patterns generated by distributed denial of service attacks, malware distribution networks and other malicious network traffic.

presented the tool last week at the IEEE Symposium on Visualization for Cybersecurity in Baltimore, MD.

+++++++++++++++++++
more on cybersecurity in this IMS blog
http://blog.stcloudstate.edu/ims?s=Search

hacking voting

A Voice Cuts Through, and Adds to, the Intrigue of Russia’s Cyberattacks

++++++++++++++++++++
more on Eastern European hackers in this IMS blog:
http://blog.stcloudstate.edu/ims/2016/06/22/ukrainian-hacker-and-fbi/

Google AI

Google Researchers Create AI That Builds Its Own Encryption

BY TOM BRANT OCTOBER 28, 2016 04:45PM EST

http://www.pcmag.com/news/349154/google-researchers-create-ai-that-builds-its-own-encryption

Alice and Bob have figured out a way to have a conversation without Eve being able to overhear, no matter how hard she tries.

They’re artificial intelligence algorithms created by Google engineers, and their ability to create an encryption protocol that Eve (also an AI algorithm) can’t hack is being hailed as an important advance in machine learning and cryptography.

Martin Abadi and David G. Andersen, explained in a paper published this week that their experiment is intended to find out if neural networks—the building blocks of AI—can learn to communicate secretly.

As the Abadi and Anderson wrote, “instead of training each of Alice and Bob separately to implement some known cryptosystem, we train Alice and Bob jointly to communicate successfully and to defeat Eve without a pre-specified notion of what cryptosystem they may discover for this purpose.”

same in German

Googles AI entwickelt eigenständig Verschlüsselung

von – 31.10.2016
http://www.com-magazin.de/news/verschluesselung/googles-ai-entwickelt-eigenstaendig-verschluesselung-1145175.html
Google-Forscher Martin Abadi und David G. Andersen des Deep-Learning-Projekts “Google Brain” eine neue Verschlüsselungsmethode entwickelt beziehungsweise entwickeln lassen. Die Forscher haben verschiedene neurale Netze damit beauftragt, eine abhörsichere Kommunikation aufzustellen.

++++++++++++++++
more on AI in this IMS blog:
http://blog.stcloudstate.edu/ims?s=artificial+intelligence

hack the drones

Hackers are able to seize control of consumer drones and make them fall from the sky

https://plus.google.com/+ScrewMuggz/posts/KMtnAxhMYtc

there aren’t clear rules about what manufacturers need to do to secure drones to prevent them from being tampered with by malicious hackers.

Police have owned signal jamming tools to interfere with consumer drones for years. After all, it was a regular consumer drone that a member of ISIS turned into a kamikaze to bomb Kurdish fighters.

My note: from jamming devices, to raptors (birds) to hacking the apps – #BumpyRoad for drones

+++++++++++++++++
more on drones in this IMS blog:
http://blog.stcloudstate.edu/ims?s=drones

millennials and cybersecurity

Survey: Growing Interest in Cyber Security Careers Among Millennials

By Leila Meyer 10/12/16

https://campustechnology.com/articles/2016/10/12/survey-growing-interest-in-cyber-security-careers-among-millennials.aspx

new report from Raytheon and the National Cyber Security Alliance

The report, “Securing Our Future: Closing the Cybersecurity Talent Gap,” surveyed 3,779 adults aged 18 to 26, from 12 countries around the world, including the United States, Australia, the United Kingdom, and countries in Europe, Asia and the Middle East.

a high-paying career as a cyber security professional requires skills millennials value, such as problem solving, analytical thinking and communication — and employment opportunities are available across a wide variety of sectors, including start-ups, government and hospitals.

Key findings from the report:

  • 64 percent of young adults in the U.S. heard about cyberattacks in the news last year, up from 36 percent the previous year, and compared to 48 percent of young adults worldwide;
  • 70 percent of millennials in the U.S. said cyber security programs or activities are available to them, up from 46 percent the previous year, and compared to 68 percent worldwide;
  • 21 percent of young men expressed interest in cyber competitions, compared to 15 percent of women;
  • 48 percent or respondents said more information about the specifics of cyber security jobs would help increase interest;
  • 59 percent of young men and 51 percent of young women received formal cyber safety lessons in school, up from 43 percent and 40 percent respectively last year; and
  • 40 percent of respondents said parents are the most influential people helping them with career advice, and 19 percent said no one was influential in helping them with career advice.

++++++++++++++++++++++++
more on cybersecurity in this blog

http://blog.stcloudstate.edu/ims?s=cybersecurity

hackers versus crackers: Guccifer

Hackers versus crackers

http://www.techrepublic.com/blog/it-security/hacker-vs-cracker/

http://www.pctools.com/security-news/crackers-and-hackers/

Federal court sentences original Guccifer

By Mark Rockwell Sep 02, 2016

https://fcw.com/articles/2016/09/02/guccifer-sentence-rockwell.aspx

+++++++++++++++++

more in this blog on hackers and crackers

http://blog.stcloudstate.edu/ims?s=hackers

http://blog.stcloudstate.edu/ims?s=crackers

 

1 2