Business

  • Iona College to Launch BS, BA, MS concentrations in cybersecurity

    Iona College announced the launch in fall 2014 of undergraduate and graduate programs in computer science with a concentration in cyber security. The concentration will be offered for the Bachelor of Science, Bachelor of Arts, and the Master of Science degrees. The programs will provide students with fundamental cyber security skills, theoretical as well as hands-on experience. Students are exposed to new research ideas across many cyber security areas including software security, Web application security, mobile security, networking security, database security, and cryptography.

  • Small biomass power plants could help rural economies, stabilize national power grid

    As energy costs rise, more Americans are turning to bioenergy to provide power to their homes and workplaces. Bioenergy is renewable energy made from organic sources, such as biomass. Technology has advanced enough that biomass power plants small enough to fit on a farm can be built at relatively low costs. Researchers have found that creating a bioenergy grid with these small plants could benefit people in rural areas of the country as well as provide relief to an overworked national power grid.

  • Allowing Terrorism Risk Insurance Act to expire could hurt national security: Study

    The current terrorism risk insurance program has a $27.5 billion threshold for aggregate losses that are paid by the insurance industry and commercial policyholders before the government program begins paying. The program will expire in 2014 and Congress again is considering the appropriate government role in terrorism insurance markets. Allowing the federal terrorism risk insurance act to expire could have negative consequences for U.S. national security, according to a new study from the RAND Corporation.

  • High level of “brain waste” among highly educated immigrants

    Many highly educated immigrants coming to the United States without a job lined up have been unable to find work at their level of education, leading to considerable “brain waste,” researchers have found. The prevalence of such “brain waste” exceeded 40 percent for immigrants with a bachelor’s degree, 50 percent for those with a doctoral or professional degree, and 75 percent for those with a master’s degree.

  • Biometric security for mobile devices becoming mainstream

    Biometric security such as fingerprint, face, and voice recognition is set to hit the mainstream as global technology companies market the systems as convenient and easy to use. The latest biometric technologies are not without their security issues, but they are marketed as more convenient than traditional methods rather than more secure, and encourage adoption by people who currently do not have any security on their phone at all.

  • Pentagon to fund new “kill vehicle” for missile defense

    The Pentagon’s fiscal 2015 budget includes $8.5 billion in funding for missile defense programs. About $300 million will be used on a new kill vehicle and it support systems. A Pentagon official said that a new kill vehicle was needed because the current system suffered from “bad engineering” and has failed several tests.

  • Platform for operating systems would outwit cyber criminals

    As smartphone use surges, consumers are just beginning to realize their devices are not quite as secure as they thought. A Swedish research team is working on a way to secure mobile operating systems so that consumers can be confident that their data is protected.

  • Collecting digital user data without compromising privacy

    The statistical evaluation of digital user data is of vital importance for analyzing trends. It can also undermine users’ privacy. Computer scientists have now developed a novel cryptographic method that makes it possible to collect data and protect the privacy of the user at the same time.

  • Securing Industry 4.0

    An increasing number of unsecured, computer-guided production machinery and networks in production facilities are gradually evolving into gateways for data theft. New security technologies may directly shield the sensitive data that is kept there.

  • Energy Department suspends work on controversial plutonium reprocessing project

    The Obama administration has decided to put on hold its plans to complete construction on a South Carolina reprocessing facility which would convert nuclear weapon-grade plutonium into reactor fuel. The suspension of work on the project is part of the fiscal 2015 budget plan the administration unveiled Tuesday. The project has been hobbled by delays and massive cost-overruns, and experts says security and safety concerns have not been adequately addressed.

  • Experts call for a new organization to oversee grid’s cybersecurity

    In 2013, U.S. critical infrastructure companies reported about 260 cyberattacks on their facilities to the federal government. Of these attacks, 59 percent occurred in the energy sector. A new report proposes that energy companies should create an industry-led organization to deflect cyber threats to the electric grid. Modeled after the nuclear industry’s Institute of Nuclear Power Operations, the proposed organization, to be called the Institute for Electric Grid Cybersecurity, would oversee all the energy industry players that could compromise the electric grid if they came under a cyberattack.

  • Operator set to close three Illinois nuclear power plants

    Abundant natural gas and growing reliance on solar and wind energy have been steadily eroding the profit margins of nuclear energy. Last year operators have shut down four nuclear plants in the United States last year. Exelon Corporation, which operates six nuclear plants in Illinois, has notified Illinois state regulators that legislative actions may be necessary to keep half of its Illinois nuclear plants from closing, since current market forces make it impossible to continue the operation of the plants profitably.

  • What use are apps when your web infrastructure is underwater?

    By Nigel Linge

    This winter has seen unprecedented high winds and flooding resulting in widespread and in some cases, long-lasting power outages in the United Kingdom, particularly in the west of England. Time and time again, companies have advised their customers to go online to check their Web sites for the latest information. Some organizations have even created apps specifically designed to assist flood victims; others have established Facebook self-help groups. There is a fundamental problem here: There are two primary ways in which we gain access to the Web, via a landline and using a mobile connection. Within our homes the landline connects to a wireless router and also, for a lot of homes, a cordless telephone, both of which need electrical power to work. So, when the lights go out, your router and cordless phones are useless. The result is that at times of crisis, the customers in most need are often the ones with no access.

  • NIST’s voluntary cybersecurity framework may be regarded as de facto mandatory

    The National Institute of Standards and Technology’s (NIST) voluntary cybersecurity frameworkissued in February establishes best practices for companies that support critical infrastructure such as banking and energy. Experts now warn that recommendations included in the framework may be used by courts, regulators, and even consumers to hold institutions accountable for failures that could have been prevented if the cybersecurity framework had been fully implemented by the respective institution.

  • Employees exposed to radiation at nuclear waste disposal site

    Thirteen employees at the Waste Isolation Pilot Plant(WIPP),a nuclear waste burial site in New Mexico, have been exposed to  radioactive radiation after a leak in one of WIPP’s underground tunnels. Energy Department officials say it is too soon to determine the scope of health risks the employees will deal with. The employees inhaled plutonium and americium, both of which can irradiate the body’s internal organs with subatomic particles for a lifetime.