News Archives
Marshall, WVSU receive funds to establish Cyber Security Center for Critical Infrastructure
December 16, 2022 · ICS
Source: Marshall, WVSU receive funds to establish Cyber Security Center for Critical Infrastructure – Marshall University News Marshall University and West Virginia State University have received a $1.5 million grant from the U.S. Department of Education to establish Cyber Security Centers for Critical Infrastructure at both institutions. The funds will be used to address the
Marshall team scores within top 1% of teams at National Cyber League Fall 2022 competition
December 5, 2022 · Students
Summarized from: Marshall team scores within top 1% of teams at National Cyber League Fall 2022 competition – Marshall University News by OpenAI’s ChatGPT Marshall University’s Institute for Cyber Security’s cyber forensics and security team ranked 28th out of 3,926 teams in the National Cyber League’s Fall 2022 competition, putting them in the top 0.71%
Password app LastPass hit by cybersecurity breach but says data remains safe
December 1, 2022 · Threat Advisory
Source: Password app LastPass hit by cybersecurity breach but says data remains safe | Cybercrime | The Guardian Password manager LastPass has told customers that some of their information has been accessed in a cybersecurity breach, but says passwords remain safe. LastPass is one of several password managers in the market that aims to reduce the reuse of
Attack of drones: airborne cybersecurity nightmare
November 24, 2022 · CyberSec
Published by: https://cybernews.com/security/drones-hack-airborne-cybersecurity-nightmare/ Once a niche technology, drones are about to explode in terms of market growth and enterprise adoption. Naturally, threat actors follow the trend and exploit the technology for surveillance, payload delivery, kinetic operations, and even diversion. There exists a class of tiny and highly maneuverable devices that introduce a variety of cybersecurity
The Cybersecurity Packet Control Simulator: CSPCS
October 11, 2022 · Publications
Summary: Games have been used as a learning tool for centuries. Through game-based learning, students actively learn and practice the right way to do things. A project team at Marshall University created a web-based application to visually represent networking and cybersecurity concepts by using “gamification” techniques such as linear levels and visualization. The goal of
A Machine Learning-Based Automatic Feedback System to Teach Cybersecurity Principles to K-12 and College Students
October 11, 2022 · Publications
Summary: Feedback is an essential part of education to help students understand and learn from their mistakes. However, while students learn new content, there is mostly no live person to provide feedback, especially in a virtual environment. Therefore, there are many software for automated code reviews to provide feedback to programming language learners. However, there
Random Partition Based Adaptive Distributed Kernelized SVM for Big Data
September 5, 2022 · Publications
Summary: In this paper, we present a distributed classification technique for big data by efficiently using distributed storage architecture and data processing units of a cluster. While handling such large data, the existing approaches consider specific data partitioning techniques which demand complete data be processed before partitioning. This leads to an excessive overhead of high
Student Loan Breach Exposes 2.5M Records
August 31, 2022 · Threat Advisory
Source: Student Loan Breach Exposes 2.5M Records | Threatpost EdFinancial and the Oklahoma Student Loan Authority (OSLA) are notifying over 2.5 million loanees that their personal data was exposed in a data breach. The target of the breach was Nelnet Servicing, the Lincoln, Neb.-based servicing system and web portal provider for OSLA and EdFinancial, according to a breach
Validation of forensic tools and methods: A primer for the digital forensics examiner
July 11, 2022 · Publications
Summary: Real-world laboratory use controlled internal tests utilizing scientific principles, and peer review should be leveraged in a proper validation test plan of digital and multimedia forensic tools and methods. As the field of digital and multimedia forensics continues to grow and evolve as a science, the importance of proper scientific validation of tools and
Forensic Analysis of the Snapchat iOS App with Spectacles-Synced Artifacts
July 10, 2022 · Publications
Summary: The Spectacles wearable smart glasses device from Snapchat records snaps and videos for the Snapchat service. A Spectacles device can sync data with a paired smartphone and upload recorded content to a user’s online account. However, extracting and analyzing data from a Snapchat app is challenging due to the disappearing nature of the media.