Source: eurekalert.org

NSF announces $78.2 million to support frontiers of cybersecurity, privacy research - Cyber security news

NSF announces $78.2 million to support frontiers of cybersecurity, privacy research

UTSA Gets $2 million to train national security analytics cyber workforce - Cyber security news

UTSA Gets $2 million to train national security analytics cyber workforce

Army research takes proactive approach to defending computer systems - Cyber security news

Army research takes proactive approach to defending computer systems

Password managers vulnerable to insider hacking - Cyber security news

Password managers vulnerable to insider hacking

New malicious email detection method that outperforms 60 antivirus engines - Cyber security news

New malicious email detection method that outperforms 60 antivirus engines

Decade of research shows little improvement in websites' password guidance - Cyber security news

Decade of research shows little improvement in websites' password guidance

An MSU-based researcher developed an algorithm to improve information security tools - Cyber security news

An MSU-based researcher developed an algorithm to improve information security tools

Game-changing invention to revolutionize internet security - Cyber security news

Game-changing invention to revolutionize internet security

Quantum transfer at the push of a button - Cyber security news

Quantum transfer at the push of a button

Extra vigilance required to combat growing sophistication of phishing attacks - Cyber security news

Extra vigilance required to combat growing sophistication of phishing attacks

UTSA researchers create framework to stop cyber attacks on internet-connected cars - Cyber security news

UTSA researchers create framework to stop cyber attacks on internet-connected cars

Portland State receives NSF grant to battle cyber-security threats - Cyber security news

Portland State receives NSF grant to battle cyber-security threats

Cybersecurity teams that don't interact much perform best - Cyber security news

Cybersecurity teams that don't interact much perform best

Electromagnetic emissions from smartphones analyzed for security vulnerability - Cyber security news

Electromagnetic emissions from smartphones analyzed for security vulnerability

Researchers use WWII code-breaking techniques to interpret brain data - Cyber security news

Researchers use WWII code-breaking techniques to interpret brain data

UTSA receives $5 million to support new cybersecurity education pipeline - Cyber security news

UTSA receives $5 million to support new cybersecurity education pipeline