Computer Sciences

Supercomputers can spot cyber threats

Identifying cybersecurity threats from raw internet data can be like locating a needle in a haystack. The amount of internet traffic data generated in a 48-hour period, for example, is too massive for one or even 100 laptops ...

Security

EPA mandates states report on cyber threats to water systems

The Biden administration on Friday said it would require states to report on cybersecurity threats in their audits of public water systems, a day after it released a broader plan to protect critical infrastructure against ...

Security

Hacker claims breach of FBI's critical-infrastructure portal

A hacker who reportedly posed as the CEO of a financial institution claims to have obtained access to the more than 80,000-member database of InfraGard, an FBI-run outreach program that shares sensitive information on national ...

Security

Hack may have exposed deep US secrets; damage yet unknown

Some of America's most deeply held secrets may have been stolen in a disciplined, monthslong operation being blamed on elite Russian government hackers. The possibilities of what might have been purloined are mind-boggling.

Computer Sciences

Scientists will protect the 'Smart City' from cyber threats

St. Petersburg, like other cities in the Russian Federation, is actively participating in the establishment of the 'Smart City' program, which will provide new services for residents of the megalopolis, increasing the safety ...

Internet

Securing the internet

While many people can name an Internet Service Provider (ISP) and describe what an ISP does, fewer people know the exchange of internet traffic that happens between different ISPs' networks, which are called Autonomous Systems ...

page 1 from 2