text-only page produced automatically by LIFT Text Transcoder Skip all navigation and go to page contentSkip top navigation and go to directorate navigationSkip top navigation and go to page navigation
National Science Foundation Home National Science Foundation - Social, Behavioral & Economic Sciences (SBE)
SBE Office of Multidisciplinary Activities (SMA)
design element
SMA Home
About SMA
Funding Opportunities
Career Opportunities
View SMA Staff
SBE Organizations
Behavioral and Cognitive Sciences (BCS)
National Center for Science and Engineering Statistics (NCSES)
Social and Economic Sciences (SES)
SBE Office of Multidisciplinary Activities (SMA)
Proposals and Awards
Proposal and Award Policies and Procedures Guide
Proposal Preparation and Submission
bullet Grant Proposal Guide
  bullet Grants.gov Application Guide
Award and Administration
bullet Award and Administration Guide
Award Conditions
Merit Review
NSF Outreach
Policy Office
Other Site Features
Special Reports
Research Overviews
Multimedia Gallery
Classroom Resources
NSF-Wide Investments

Email this pagePrint this page
Secure and Trustworthy Cyberspace - News

Showing: 1-29 of 29 | Search News

screenshot of cybersecurity special report New special report highlights NSF-funded cybersecurity research and education
Released October 30, 2015
Press Release
computing graphic Researchers find vulnerabilities in use of certificates for Web security
Released October 28, 2015
News From the Field
sunlight shining through clouds New tool expands tracking of personal data on the Web
Released October 9, 2015
News From the Field
Visualization of the routing paths of the Internet NSF awards $74.5 million to support interdisciplinary cybersecurity research
Released October 7, 2015
Press Release
illustration showing a computer and people Theoretical computer science provides answers to data privacy problem
Released October 7, 2015
Press Release
SafePay 'SafePay': First antifraud system to use existing credit card readers
Released September 21, 2015
News From the Field
security lock console background Researchers tackle issues surrounding security tools for software developers
Released August 24, 2015
News From the Field
graphic showing model of a half-million biomarkers related to a type of brain cancer Limiting 'false discoveries'
Released August 6, 2015
Press Release
Aaron Roth New algorithm aimed at combating science's reproducibility problem
Released August 6, 2015
News From the Field
image of people working with different electronics Computer security tools for journalists lacking in a post-Snowden world
Released July 22, 2015
News From the Field
Nest thermostat How a new cloud computing system could turn anyone into a tech entrepreneur
Released June 12, 2015
News From the Field
computing grahic Brain's reaction to certain words could replace passwords
Released June 2, 2015
News From the Field
screenshot from a video game Researchers help video gamers play in the cloud without guzzling gigabytes
Released May 20, 2015
News From the Field
Raven II pegboard UW researchers hack a teleoperated surgical robot to reveal security flaws
Released May 7, 2015
News From the Field
screen shot of a daily message, or privacy nudge CMU study finds location sharing by apps prompts privacy action
Released March 23, 2015
News From the Field
researcher measures electromagnetic emissions Researchers work to counter a new class of coffee shop hackers
Released January 8, 2015
News From the Field
a smartphone with the Rutgers app Rutgers engineers create smartphone app to cut risk of power outages
Released November 14, 2014
News From the Field
the three devices the researchers examined Wireless devices used by casual pilots vulnerable to hacking, computer scientists find
Released November 10, 2014
News From the Field
illustartion showing a fingerprint and computer circuits Leading researchers to discuss privacy and security in a connected age
Released October 28, 2014
Media Advisory
a tablet displaying a voting screen Rice team sets sights on better voting machine
Released October 27, 2014
News From the Field
computing graphic New framework would facilitate use of new Android security modules
Released August 20, 2014
News From the Field
image of a cars dashboard with a GPS system Rutgers researchers show how fast you drive might reveal exactly where you are going
Released August 11, 2014
News From the Field
image of a fingerprint, computer parts and sequence of numbers Expanding the breadth and impact of cybersecurity and privacy research
Released July 31, 2014
Press Release
Daphne Yao New proactive approach unveiled to detect malware in networked computers and data
Released June 4, 2014
News From the Field
squiggly lines on a tablet Are squiggly lines the future of password security?
Released June 2, 2014
News From the Field
computing graphic Carnegie Mellon, Microsoft Research automate privacy compliance for big data systems
Released May 21, 2014
News From the Field
bitcoins Using stolen computer processing cycles to mine Bitcoin
Released February 26, 2014
News From the Field
Lorrie Cranor, Noah Smith and Norman Sadeh Carnegie Mellon leads NSF project to help people understand Web privacy policies
Released August 20, 2013
News From the Field
News thumbnail Researchers Identify Ways to Exploit "Cloud Browsers" for Large-scale, Anonymous Computing
Released November 28, 2012
News From the Field
Showing: 1-29 of 29

Email this pagePrint this page
Back to Top of page