Archive for News

Data Breach, Privacy, and Cyber Insurance: How Insurance Companies Act as “Compliance Managers” for Businesses

by Shauhin A. Talesh

While data theft and cyber risk are major threats facing organizations, existing research suggests that most organizations do not have sufficient protection to prevent data breaches, deal with notification responsibilities, and comply with privacy laws. This article explores how insurance companies play a critical, yet unrecognized, role in assisting organizations in complying with privacy laws and dealing with cyber theft.

Read More > Talesh-2018-Law_Social_Inquiry Cyber

INSURANCE COMPANIES AS CORPORATE REGULATORS: THE GOOD, THE BAD, AND THE UGLY

by Shauhin A. Talesh

Political scientists, economists, and legal scholars have been debating corporate social responsibility for decades. To that end, the financial crisis, fraud relating to Enron and Worldcom, Occupy Wall Street, and even the 2016 presidential primary debates all raise attention and concern about what corporate social responsibility is and should be in the United States.

Read More > Talesh DePaul Cyber Insurance

ICS Researchers Introduce Thermanator, Revealing a New Threat to Using Keyboards to Enter Passwords and Other Sensitive Information

A thermal image of “iloveyou” 20 seconds after entry.

After entering a password, your regular computer keyboard might appear to look the same as always, but a new approach harvesting thermal energy can illuminate the recently pressed keys, revealing that keyboard-based password entry is even less secure than previously thought. Computer Science Ph.D. students Tyler Kaczmarek and Ercan Ozturk in the Donald Bren School of Information and Computer Sciences (ICS), working with Chancellor’s Professor of Computer Science Gene Tsudik, have exploited thermal residue from human fingertips to introduce a new insider attack — the Thermanator.

(more…)

Gene Tsudik, Two Computer Science Ph.D. Students Develop Novel De-Authentication Prototype

Chancellor’s Professor of Computer Science Gene Tsudik and two of his Ph.D. students, Tyler Kaczmarek and Ercan Ozturk, have developed a novel technique aimed at mitigating “Lunchtime Attacks.” Such attacks occur when an insider adversary takes over an authenticated state of a careless user who has left his or her computer unattended. Tsudik, Kaczmarek and Ozturk have come up with an unobtrusive and continuous biometic-based “de-authentication,” i.e., a means of quickly terminating the secure session of a previously authenticated user after detecting that user’s absence. They introduce the new biometric, called Assentication, in a paper appearing at the 2018 International Conference on Applied Cryptography and Network Security (ACNS).

(more…)

Gene Tsudik, ICS Exchange Students on International Team Studying Information Leakage

In a paper to appear at the 2018 European Symposium on Research in Computer Security (ESORICS), a team of researchers from UC Irvine, New York Institute of Technology and University of Padova (Italy) reveal a new attack: Secret Information Leakage from Keystroke Timing Videos (SILK-TV). The UCI researchers include Chancellor’s Professor of Computer Science Gene Tsudik and undergrad exchange students Martin Georgiev and Nikita Samarian.

(more…)

C-SPAN: “Election Hacking and the Future of Politics”

James Carville, campaign strategist for former President Bill Clinton, was the keynote speaker at a conference on U.S. election hacking. He discussed foreign interference in U.S. elections and the impact on the future of politics. Cybersecurity expert Bryan Cunningham, a former senior CIA officer and White House lawyer, moderated the conversation and questions from students.

Watch the video at c-span.org.

Page 5of 7: 1 ... 3 4 5 6 7