Author: Emerald Knox (Emerald Knox)

Home / Emerald Knox
Post

Cyber Security R&D Showcase Coming in July

The 2017 Cyber Security R&D Showcase and Technical Workshop is scheduled for 11-13 July at Washington, D.C.’s Mayflower Hotel. This annual technology showcase event is expected to draw 1,000 government, industry and academia cybersecurity professionals from the United States and abroad over three days. The conference’s highlight is the 11 July R&D Showcase, during which...

Post

Nightly Business Report – May 9, 2017

… There were some reports last week that Apple was having a bit of trouble with key feature in its next iPhone: the fingerprint reader. But there may be other problems with these sensors. New research found that the way smart phones read fingerprints could make them vulnerable to hackers. [interview with Nasir Memon at...

Post

Phishing, Hacks And Better Online Security

… This hour On Point, the Google email attack, an how to protect yourself from online scams, plunder, identity theft. Guests: Justin Cappos, assistant professor in systems and security at the New York University Computer Science and Engineering Department [at 21:10].

Post

Spam Campaign Targets Google Users with Malicious Link

Alphabet Inc warned its users to beware of emails from known contacts asking them to click on a link to Google Docs after a large number of people turned to social media to complain that their accounts had been hacked. Google said on Wednesday that it had taken steps to protect users from the attacks...

Post

Google Docs Users Hit by Phishing Scam

The scam claimed to come from Google Docs – a service that allows people to share and edit documents online. Users who clicked a link and followed instructions, risked giving the hackers access to their email accounts … “This is a very serious situation for anybody who is infected because the victims have their accounts...

Post

Gmail Users Warned of Phishing Email With Malicious Link

Alphabet Inc. warned its users to beware of emails from known contacts asking them to click on a link to Google Docs after a large number of people turned to social media to complain that their accounts had been hacked…’This is a very serious situation for anybody who is infected because the victims have their...

Post

On the Difficulty of Inserting Trojans in Reversible Computing Architectures

Xiaotong Cui, Samah Saeed, Alwin Zulehner, Robert Wille, Rolf Drechsler, Kaijie Wu and Ramesh Karri Fabrication-less design houses outsource their designs to 3rd party foundries to lower fabrication cost. However, this creates opportunities for a rogue in the foundry to introduce hardware Trojans, which stay inactive most of the time and cause unintended consequences to...

Post

Proactive Population-Risk Based Defense Against Denial of Cyber-Physical Service Attacks

Jeffrey Pawlick and Quanyan Zhu —While the Internet of things (IoT) promises to improve areas such as energy efficiency, health care, and transportation, it is highly vulnerable to cyberattacks. In particular, DDoS attacks work by overflowing the bandwidth of a server. But many IoT devices form part of cyber-physical systems (CPS). Therefore, they can be...

Post

NYU Sophomores Stumble Upon IT Hack

Two Tandon students from the Offensive Security, Incident Response and Internet Security Laboratory have discovered a vulnerability in the NYU Print Service that would allow black hats — individuals who use their extensive computer knowledge to breach internet security — to take full control of any computer, as long as it is connected to the...