C4ISRNET The use of 3-D printing in the military is becoming more commonplace, and as a result experts are emphasizing the importance of treating 3-D printers like the hackable machines they are. While a 3-D printer’s capability for experimental on-site manufacturing is far more futuristic than a traditional Wi-Fi enabled printer, the hardware is as...
Author: Emerald Knox (Emerald Knox)
Scientists trace ransomware payments across the globe
Futurity New research brings the murky ecosystem of ransomware payments into focus. Ransomware attacks, which encrypt and hold a computer user’s files hostage in exchange for payment, extort millions of dollars from individuals each month and comprise one of the fastest-growing forms of cyber attack. … Damon McCoy, assistant professor of computer science and engineering...
Ransomware payments, blockchain and cryptoexchanges
Enterprise Times The murky ecosystem of ransomware payments comes into focus in new research led by Damon McCoy, an assistant professor of computer science and engineering at the NYU Tandon School of Engineering. … Amongst the most striking findings are: the discovery that South Koreans are disproportionately impacted by ransomware campaigns. … Most ransomware operators...
More than $16 Million Ransomware Payments Have Been Made in the Past 2 Years
Researchers from the NYU Tandon School of Engineering have studied ransomware payments learning that $16 million in ransomware payments have been tracked in the past two years by researchers with South Korea paying about $2.5 million as the country has been hard hit by the impact of ransomware. … ‘Ransomware operators ultimately direct bitcoin to...
Which Russia hack? Part 1
Carbonite – Breach (podcast series) Damon McCoy, assistant professor of computer science and engineering at NYU Tandon at 19:18. … In this episode of Breach, we attempt to connect the dots between the Yahoo security breach, the DNC hack and efforts to undermine the U.S. presidential election on social media. And while we didn’t find...
How to Protect Today’s Highly Computerized Cars from Hackers (video)
Interview with Justin Cappos, associate professor of Computer Science and Engineering at NYU Tandon, at 7:50. “Certainly as these systems get more and more complex there are more and more opportunities for hackers,” said Cappos. “It’s not clear whether having cars that drive themselves or have advanced safety systems are more at risk or less...
Opening Arguments Begin In AT&T And Time Warner Merger Case
The telephone and Internet giant AT&T wants to buy the media conglomerate Time Warner. President Trump has opposed this $85 billion deal, and the U.S. Justice Department is in federal court to try and stop it. The opening arguments are scheduled to begin this week…. [Center for Cybersecurity Co-Chair Randy] Milch says a judgment against AT&T...
Sensing the Chinese Diaspora: How Mobile Apps Can Provide Insights into Global Migration Flows
Minhui Xue, Alexandru Grigoras, Heather Lee and Keith Ross Many countries today have “country-centric mobile apps” which are mobile apps that are primarily used by residents of a specific country. Many of these country-centric apps also include a location-based service which takes advantage of the smartphone’s API access to the smartphone’s current GPS location. In this paper, we investigate...
Randy Milch, CCS Co-Chair and Judi Germano, CCS Senior Fellow to speak at PCCE Cybersecurity Conference
On behalf of the NYU School of Law Program on Corporate Compliance and Enforcement (PCCE), we would like to invite you to our upcoming conference, Global Cyber Threats: Corporate and Governmental Challenges to Protecting Private Data on April 6, 2018 at the Lester Pollack Colloquium Room, 9th Floor, Furman Hall, 245 Sullivan Street, New York,...
Optimal Dynamic Contract for Spectrum Reservation in Mission-Critical UNB-IoT Systems
Muhammad Junaid Farooq and Quanyan Zhu Spectrum reservation is emerging as one of the potential solutions to cater for the communication needs of massive number of wireless Internet of Things (IoT) devices with reliability constraints particularly in mission-critical scenarios. In most mission-critical systems, the true utility of a reservation may not be completely known ahead...