Archive for October 2013

Promoting FSU Cybersecurity out and about, and on the airwaves

Shuyuan spoke at Tallahassee Community College’s Center for Workforce Development in honor of National Cyber Security Awareness Month on Oct. 24. and was interviewed by WCTV Eyewitness News in Tallahassee.  Click here to see…

Dr. Ho, assistant professor at Florida State University iSchool, spoke about her research in cyber insider threats and online identity theft and potential careers in the field of cyber security.  She also talked about her role as an advisor for Florida State’s Cyber Defense team and discussed her work in designing online games as cyber defense experiment protocols.

National Cyber Security Awareness Month in October engages public and private sector partners to raise awareness and educate Americans about cyber security through a series of events and initiatives across the country.

TCC’s Center for Workforce Development specifically targeted Information Technology students as the audience for Ho’s speaking engagement as cyber security is one of the fastest growing careers in the nation.

Find the full story WCTV ran about Ho’s speech on Oct. 24 at:

LinkedIn: Hack Here For Juicy Data

LinkedIn’s new Intro service has put up a big sign advertising to cyber criminals, nation states and others ‘hack here, we’ve got loads of juicy data’. The architecture of its new service is innovative but compromises your security and privacy in ways you really should care about. Oh, and whilst I am at it, I’ll have a dig at Apple AAPL -1.12%for putting LinkedIn in this position in the first place. So how does it work?

The new service proudly announced on the LinkedIn LNKD -1.06% blog integrates with the Apple iOS native mail application to provide integrated details about the contact you are conversing with. Neat idea. What is interesting however is that LinkedIn has succeeded in integrating into the native Apple Mail application, an impressive feat of engineering given how intensely Apple restricts its applications and operating system ecosystem (more on the pros and cons of that later). In short, the application works by re-configuring your e-mail to proxy through LinkedIn servers so that as your e-mail passes through they can inject (inject sounds bad I know, but hold on and you will see how bad it is) a fancy banner at the top that looks like it has been integrated with the application natively.

More available from Forbes Online by clicking here

Penn State to lead new cyber-security Collaborative Research Alliance

Creating a science to detect and model cyberattacks and the risk and motivations behind them, and creating a response that can counter the attack and neutralize the cyberattackers in real time, is the aim of a cooperative agreement between the Army Research Laboratory and Penn State.

The five-year funding for the core and enhanced program is $23.2 million, with an additional $25 million for the optional five-year extension — a potential total of $48.2 million over the 10-year collaboration.

“We’re going to develop a new science of understanding how to make security-relevant decisions in cyberspace,” said Patrick D. McDaniel, professor of computer science and engineering and principal investigator on the project. “Essentially, we’re looking to create predictive models that allow us to make real-time decisions that will lead to mission success.”

From Penn State News…  For more information, click here