Esports, organized competitive video gaming, is changing how we engage in sports and education. Many high schools and higher ed institutions are developing esports programs as well as joining organizations like the Michigan High School Esports Federation (MIHSEF) and the…
Read More
From network servers or the cloud, to the tiniest thumb drive or solid-state disk - every school, library or organization that stores data needs cybersecurity - without exception. No one is immune to the risk of cyberattack, but firewalls help…
Read More
Merit Research is pleased to announce that data capturing malicious internet of things (IoT) activities, attributed to the Mirai botnet, is now being available to researchers and cybersecurity analysts. The data were captured at Merit's large network telescope (a network…
Read More
This report was written by Michalis Kallitsis and Abhishek Balaji Radhakrishnan. In the last quarter of 2016 we were introduced to new types of devastating Distributed Denial of Service (DDoS) attacks, namely attacks based on vulnerable or unsecured Internet-of-Things (IoT)…
Read More
With the rise of internet-connected devices and applications, data interchange has become inevitable. It is important for these communications to happen in a secure [2], yet efficient manner keeping in mind resource bottlenecks -- network, processor, and disk resources. [visibility…
Read More
The Internet, as a global system of interconnected networks, carries an extensive array of information resources and services. Its fundamental design principles have made it a robust, widely accessible and essentially indispensable utility. On the other hand, the heterogeneity and…
Read More
The modernized electric grid, the smart grid, integrates two-way communication technologies across power generation, transmission and distribution to deliver electricity efficiently, securely and cost-effectively. Its advanced metering infrastructure (AMI), now expanding to customer premises, allows for real-time pricing and demand…
Read More
Finding adequate data for network and cybersecurity research, student education and staff training is a challenging task. Researchers and other data seekers usually do not have access to the data source in order to collect the data themselves or lack…
Read More
Reprinted from PC World The few blocks of Internet addresses yet to be allocated under the old IPv4 protocol seem to be home to some "hotspots" of unwanted traffic that anyone who gets the addresses would have to pay for,…
Read More
Reprinted from The Register Researchers probing a previously unused swath of internet addresses say they've stumbled onto the net's most blighted neighborhoods, with at least four times as much pollution as any they've ever seen. The huge chuck of more…
Read More