Smartwatches have quickly gone from sci-fi to commonplace, and it’s easy to see why. … Experts are looking for ways to make smartwatch security stronger and more convenient—including locking in particular—so keep an eye out for new and easier ways to protect yourself from others getting access to the data on your smartwatch. [Articles cites...
Category: Press Highlights
Apple's Touch ID Is Probably Doomed, And That's OK
When the iPhone X eventually arrives in November it will come loaded with a futuristic camera module that, if all goes right, should let you securely open your phone with little more than a glance. … “Fingerprint scanners have been around a long time,” Nasir Memon, a computer scientist with a focus on cyber security...
NYU Tandon’s IllusionPIN Combats Shoulder-Surfing
Researchers at the NYU Tandon School of Engineering recently developed a new technology that combats shoulder-surfing, a spying technique in which personal information such as PINs, passwords and other personal data are obtained by looking over someone’s shoulder or standing next to them. … The project was headed by Tandon professor Nasir Memon, with help...
New Locky Variant ‘IKARUSdilapidated’ Strikes Again
A second wave of the Locky ransomware variant called IKARUSdilapidated has been identified by security experts. … Locky is notorious for its effectiveness and profitability. Over the past two years, Locky has extorted more than $7.8 million in payments from victims, according a recent study by Google, Chainalysis, UC San Diego, and the NYU Tandon...
Millions That Ransomware Victims Paid Revealed
Sufferers of ransomware attacks have gave more than $25 Million in ransom money for the period of past 2 Years. This was revealed in a survey carried out by scientists from Chainalysis, Google, NYU Tandon School of Engineering, and UC San Diego. The scientists made a complete picture of the ransomware bionetwork by keeping an...
A Look into the Cybersecurity Issues of 3D Printing
3D printing is pervasive across many industries from medical to automotive to aviation to tech and more. But are there security risks associated with 3D printing? Can 3D printers be hacked? Hari Sreenivasan discusses the cybersecurity issues of 3D printing with Nikhil Gupta, Associate Professor of Mechanical Engineering at New York University.
AI Training Algorithms Susceptible to Backdoors, Manipulation
Three researchers from New York University (NYU) have published a paper this week describing a method that an attacker could use to poison deep learning-based artificial intelligence (AI) algorithms. Researchers based their attack on a common practice in the AI community where research teams and companies alike outsource AI training operations using on-demand Machine-Learning-as-a-Service (MLaaS)...
The 5 Coolest Things on Earth This Week
“IllusionPIN,” a new technology developed by researchers at New York University’s Tandon School of Engineering, can automatically shield the screen of an ATM, smartphone or other electronic device. While the user is able to clearly see the information displayed on the device, anyone more than a few feet away sees something completely different. … “Our...
Even Artificial Neural Networks Can Have Exploitable ‘Backdoors’
Malicious actors can design that behavior to emerge only in response to a very specific, secret signal, as in the case of Garg’s Post-it. Such “backdoors” could be a problem for companies that want to outsource work on neural networks to third parties, or build products on top of freely available neural networks available online....
The Latest Use for Bitcoin? Fighting Sex Trafficking
Computer science researchers at the University of California, Berkeley have developed new tools to identify sex trafficking rings, making them easier for law enforcement to target and prosecute. Those efforts have been stymied, according to the researchers’ report, by the vast quantity of ads for sex posted to websites like Backpage.com, only a portion of...