The collection, storage, use, and disclosure of consumer data are hot topics in the legal, regulatory, and legislative communities.
Category: <span>CCS News</span>
How Biometric Authentication Poses New Challenges to Our Security and Privacy
Nasir Memon The use of biometric data—an individual’s measurable physical and behavioral characteristics—isn’t new. Government and law enforcement agencies have long used it. … Using biometric data to access our personal devices is increasing as a way to get around the limitations of the commonly used password-based mechanism: it’s easier, more convenient, and (theoretically) more...
America's Online Enemies
From election meddling and economic espionage to financial fraud and personal identity theft, it’s becoming clear that cybersecurity is increasingly central to every aspect of the way we live. Both state-sponsored cyber-spies and transnational organized crime groups pose urgent threats online to our nation’s critical infrastructure, our security, and our fundamental values in a democratic...
Malcolm Turnbull faces Silicon Valley fight on encryption
If Malcolm Turnbull presses forward on threats to force technology companies to better cooperate on countering terrorism — by unlocking secret encrypted messages and data belonging to suspected violent plotters — the Prime Minister can expect a heated tussle with America’s powerful Silicon Valley.
Guide to the top college and university cyber security degree programs
The shortage of cybersecurity professionals is well documented, and this lack of expertise can keep organizations from bolstering their security programs…NYU Tandon School of Engineering offers a master’s degree in cyber security, and the program is rooted in the belief that theory and research must translate into real-world solutions, says Nasir Memon, professor of computer...
Booted: An Analysis of a Payment Intervention on a DDoS-for-Hire Service
Ryan Brunt, Prakhar Pandey and Damon McCoy. Distributed Denial of Service (DDoS) attacks have become a growing threat that, to a large extent, have become commoditized by DDoS-for-hire, or “booter”, services. In this case study, we analyze leaked fine-grain “ground truth” data from a larger booter service, VDoS, which earned over $597,000 over two years...
ATS Is Integrating The Uptane Security Framework For Over-the-air Software Updates To Connected Vehicles
Features Prof. Justin Cappos ATS Advanced Telematic Systems is the first European company integrating the Uptane security framework into its OTA solutions: OTA Plus and ATS Garage. Uptane is a joint research initiative between NYU’s Tandon School of Engineering, the Southwest Research Institute, and the University of Michigan Transport Research Center, working to develop a...
Cybersecurity Experts Discuss the Perfect Storm – A Convergence of Internet of Things, Cloud, and Security
With the increasing adoption of the Internet of Things (IoT), concerns are growing about security, particularly hardware security, which is an integral part of the IoT framework. Security threats permeated the discussion at the eighth installment of NYU Tandon School of Engineering’s Sloan Lecture Series on April 25, which brought together world-class academics and industry...
It's time to assess the potential for terrorist use of cryptocurrencies
Bank derisking and irrational state by state licensing help create the conditions for criminals and terrorists to abuse cryptocurrency networks.
The Trump Administration’s Early (Appropriate) Focus on Botnets
President Donald Trump’s Executive Order on Cybersecurity, concentrating as it does on things largely within the authority of the executive branch, is a reasonable early approach to a very complicated public policy challenge. Its three components focus on preparatory steps to harmonize and modernize the federal government’s information technology (IT), better protect critical infrastructure, and improve...