Author: Emerald Knox (Emerald Knox)

Home / Emerald Knox
Post

WikiLeaks Says it Will Work with Tech Firms to Defeat CIA Hacking

WikiLeaks will work with technology companies to help defend them against the CIA’s hacking tools, WikiLeaks founder Julian Assange said. … Justin Cappos, a computer security professor in New York University’s Tandon School of Engineering, said any group that had this information first — whether it was WikiLeaks or a government agency — should have...

Post

Remote field device fingerprinting using device-specific modbus information

Anastasis Keliris and Michail Maniatakos Device fingerprinting can provide useful information for vulnerability assessment and penetration testing, and can also facilitate the reconnaissance phase of a malicious campaign. This information becomes critical when the target devices are deployed in industrial environments, given the potential impact of cyber-attacks on critical infrastructure devices. In this paper, we...

Post

Renters and Sellers Beware of Scammers

If you are trying to sell your home, don’t be surprised if someone comes knocking at your door and asks if it’s for rent… That’s because scammers are stealing house for sale listings and putting them up on Craigslist as rentals. (Article based on research by Professor Damon McCoy)

Post

Vice President Mike Pence used an AOL email account as governor – and was hacked

Vice President Mike Pence used a private email account that was later compromised while serving as governor of Indiana, his office confirmed on Thursday…”The fact that these emails are stored in a private AOL account is crazy to me,” Justin Cappos, a computer security professor at New York University’s Tandon School of Engineering, told Indy...

Post

Secure and Reconfigurable Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT)

Muhammad Junaid Farooq and Quanyan Zhu This work aims to build the theoretical foundations of designing secure and reconfigurable IoBT networks. Leveraging the theories of stochastic geometry and mathematical epidemiology, we develop an integrated framework to study the communication of mission-critical data among different types of network devices and consequently design the network in a...

Post

Mike Pence Used His AOL Email For Official Business as Indiana's Governor—And It Got Hacked

Vice President Mike Pence routinely used a private email address to conduct political affairs as governor of Indiana, according to the Indianapolis Star….“It’s one thing to have an AOL account and use it to send birthday cards to grandkids,’ said Justin Cappos, a computer security professor at New York University’s Tandon School of Engineering. ‘But...

Post

The World’s Biggest Cyber Security Games Expand to Europe

The world’s largest student-run set of cyber security games, founded 14 years ago by the New York University Tandon School of Engineering, will expand this year to Europe, where it will be hosted by Grenoble INP – Esisar. Based in Valence, France, Esisar is one of six engineering schools of the Grenoble Institute of Technology...

Post

Innovative Events and Training Reshape Cybersecurity Education

When Nasir Memon, a computer science and engineering professor at New York University, was first starting his cybersecurity program, he wanted to offer more hands-on experiences for his students. “I always thought cybersecurity was not a topic you talk about, but where you learn by doing things,” says Memon. So he organized a cybersecurity awareness...