In this episode, FIN Chairman Juan Zarate hosts a discussion with FIN Senior Adviser Zachary Goldman on the current state of cyber sanctions, cybercrime, and the convergence of cyber security and the anti-money laundering system.
Author: Emerald Knox (Emerald Knox)
Protecting additive manufacturing’s digital thread
According to National Transportation Safety Board (NTSB) data, counterfeit aircraft components have contributed to almost two dozen crashes since 2010…While continuously available verification enables operators and installers to weed-out illegitimate lookalike components, researchers at NYU’s Tandon School of Engineering are working on a technique to foil a 3D manufacturer or counterfeiter using stolen designs.
Turning High School Students into Cyber Sleuths
The women-only CS4CS class is part of a larger program at the Tandon school called STEMNow, which this summer is bringing more than 700 middle- and high-school students and 130 teachers to the Downtown Brooklyn campus for deep dives into the STEM subjects (science, technology, engineering and math). STEMNow puts a particular emphasis on diversity...
How to protect the power grid from low-budget cyberattacks
Cyberattacks against power grids and other critical infrastructure systems have long been considered a threat limited to nation-states due to the sophistication and resources necessary to mount them. … Michail Maniatakos, a research professor at the NYU Tandon School of Engineering and an assistant professor of electrical and computer engineering at NYU Abu Dhabi, detailed...
Adaptive and Resilient Revenue Maximizing Resource Allocation and Pricing in Cloud Computing Environments
Muhammad Junaid Farooq, Quanyan Zhu Cloud computing is becoming an essential component of modern computer and communication systems. The available resources at the cloud such as computing nodes, storage, databases, etc. are often packaged in the form of virtual machines (VMs) to be used by remotely located client applications for computational tasks. However, the cloud...
NYU Security Researchers at Black Hat Reveal How to Protect the Power Grid from Low-budget Attacks
…The researchers are part of the small and increasingly influential group of cybersecurity researchers at NYU exploring hardware trustworthiness and educating experts worldwide about their findings. Under the aegis of the NYU Center for Cybersecurity, faculty and student researchers at NYU Abu Dhabi and NYU Tandon are recognized as leaders in research on secure chip...
Ransomware Cost Surpasses $25 Million Mark
Companies and individuals have paid more than $25 million over the past two years to try to get their computer data back from hackers who hijacked it. This is according to new research by Google about the phenomenon….The research, conducted by Google, Chainalysis, University of California at San Diego, and New York University’s Tandon School of...
Russian Arrested for Allegedly Operating $4 Billion Bitcoin Crime Website
BTC-e, one of the most cryptic crypto exchanges, has been ‘under maintenance’ for a day now, which has led many of its users to express fears that the platform has been hacked. … The American newspaper quoted Damon McCoy, a New York University [Tandon School of Engineering] computer science and engineering professor, who said: “It’s...
Former Homeland Security Adviser Lisa Monaco on fighting ISIS on social media
Former Homeland Security Adviser Lisa Monaco on fighting ISIS on social media.
Optimal Timing in Dynamic and Robust Attacker Engagement During Advanced Persistent Threats
Jeffrey Pawlick, Thi Thu Hang Nguyen, Quanyan Zhu Advanced persistent threats (APTs) are stealthy attacks which make use of social engineering and deception to give adversaries insider access to networked systems. Against APTs, active defense technologies aim to create and exploit information asymmetry for defenders. In this paper, we study a scenario in which a...