Saffet Vatansever, Ahmet Emer Dirik and Nasir Memon Electrical network frequency (ENF) instantaneously fluctuates around its nominal value (50/60 Hz) due to a continuous disparity between generated power and consumed power. Consequently, luminous intensity of a mains-powered light source varies depending on ENF fluctuations in the grid network. Variations in the luminance over time can...
Author: Emerald Knox (Emerald Knox)
Backpage and Bitcoin: Uncovering Human Traffickers
Rebecca S. Portnoff, Danny Yuxing Huang, Periwinkle Doerfler, Sadia Afroz and Damon McCoy Sites for online classified ads selling sex are widely used by human traffickers to support their pernicious business. The sheer quantity of ads makes manual exploration and analysis unscalable. In addition, discerning whether an ad is advertising a trafficked victim or a independent sex...
Israel is 5th Nation to Host Student Cyber Security Contest
Israel will be the fifth country to host the final rounds of the world’s biggest student-run cybersecurity competition, Cyber Security Awareness Week (CSAW), on November 16 and 17 at Ben-Gurion University of the Negev in Beersheva. CSAW was founded 14 years ago by the New York University Tandon School of Engineering and last year its...
New Research Could Help Reveal Who is Buying Online Trafficking Ads
A U.S. researcher says she has developed automated ways to identify links between online sex trafficking ads and the digital currency Bitcoin, techniques that may help locate children being sold for sex. … Having automated style and time stamp analyses to identify sex ads by authors and Bitcoin owners is significant, said Damon McCoy, a...
Locky Ransomware Returns with New IKARUSdilapidated Phishing Campaign
Comodo researchers recently uncovered a new ransomware campaign that launched on August 9, targeting tens of thousands of victims with a simple email delivering just an attachment and no text. … At Black Hat USA 2017 last month, researchers presented the results of a study by Google, Chainalysis, UC San Diego and the NYU Tandon...
Blockchain AI Researchers Link Specific Bitcoin Wallets to Sex Workers
Damon McCoy, an NYU Tandon assistant professor of computer science and engineering and one of the paper’s co-authors, explained that combining these techniques to identify sex ads by both author and Bitcoin owner represents a considerable advancement in assisting law enforcement and nonprofit organizations. “There are hundreds of thousands of these ads placed every year,...
Follow the Bitcoin to Find Victims of Human Trafficking
A team of university researchers has devised the first automated techniques to identify ads potentially tied to human trafficking rings and link them to public information from Bitcoin — the primary payment method for online sex ads. This is the first step toward developing a suite of freely available tools to help police and nonprofit...
Security features embedded in computer aided design (CAD) solid models for additive manufacturing
Fei Chen, Gary Mac, and Nikhil Gupta The additive manufacturing (AM) process chain relies heavily on cloud based resources and software programs that are connected to the internet. Cybersecurity has become a major concern for cloud based resources. While network security is important and is the responsibility of the information technology departments of corporations, a...
Researchers from NYU Abu Dhabi's Center for Cyber Security Have Developed an Unhackable Computer Chip
Landmark achievements in IT security are happening at NYU Abu Dhabi [Center for Cyber Security]. For the first time, researchers developed a computer chip with security implemented at the lowest possible level, the hardware level. “Logic-locked” chips can’t be hacked or copied, providing future users with new guarantees of security for their devices. (Video)
Google Rolls Out Important Update for Gmail on iOS – Here’s Why You Should Download It
The update fixes a major security loophole which was discovered earlier this year that allowed hackers to send users an email with a Google Doc attachment, which contained a phishing malware. … “This is a very serious situation for anybody who is infected because the victims have their accounts controlled by a malicious party,” said...