A University of Michigan (U-M) team has announced plans to develop an “unhackable” computer, funded by a new $3.6 million grant from the Defense Advanced Research Projects Agency (DARPA). The goal of the project, called MORPHEUS, is to design computers that avoid the vulnerabilities of most current microprocessors, such as the Spectre and Meltdown flaws announced last week.
China’s established practice of intellectual property (IP) theft has contributed significantly to the acceleration of the country’s technical competitiveness, making China one of the US's major cyber threats today. China’s IP theft has occurred across every sector of the U.S. market, and most impactfully against our military defense contractors.
Technology giant Apple has confirmed all iPhones, iPads, Mac computers, and even its Apple TV set-top box had been vulnerable to snooping by hackers as part of two widespread computer chip flaws revealed this week. Only the Apple Watch was safe from attack by one of the security flaws, it revealed today, although software fixes had been issued for others.
Over the past few days we’ve covered major new security risks that struck at a number of modern microprocessors from Intel and to a much lesser extent, ARM and AMD. Information on the attacks and their workarounds initially leaked out slowly, but Google has pushed up its timeline for disclosing the problems and some vendors, like AMD, have issued their own statements. The two flaws in question are known as Spectre and Meltdown, and they both relate to one of the core capabilities of modern CPUs, known as speculative execution.
Chances are you own a smartphone or computer that contains a chip hackers could potentially exploit to get access to sensitive information. That's because billions of devices are affected by two major security flaws revealed by cybersecurity researchers on Wednesday.
As the scourge of ransomware continues unabated, K–12 education increasingly falls victim. As of December, at least 283 U.S. public schools and districts have reported cybersecurity incidents in the nearly two years since January 2016, according to the EdTech Strategies’ K-12 Cyber Incident map.
Facebook Inc and Microsoft Corp disabled a number of North Korean cyber threats last week, a White House official said on Tuesday, as the United States publicly blamed Pyongyang for a May cyber attack that crippled hospitals, banks and other companies.
As we come to the close of 2017, it is increasingly evident that K-12 cybersecurity threats are neither hypothetical, nor imagined. In our rush to embrace technologies for teaching, learning and school operations, we may have made innocent, but ultimately faulty assumptions about the need and effort required to protect digital assets and data.
Digital thieves have a playbook for stealing your sensitive data. A software security firm spells it out. Avira, a company that provides antivirus and Internet security software, has published a concise but informative 5 step guide to mobile theft explaining the how and why of malware getting inside your mobile device.
As reports of cyberattacks multiply--from national election-related hacking to school-level phishing scams--the need for trained high school and postsecondary graduates in the field is growing. And increasingly, industry, governments, and educators are looking to introduce students to online security earlier in their K-12 careers, in the hope of encouraging their continued academic study of the topic and their awareness of careers in the field.