The Internet is awash with images and videos that may hold national security and intelligence value, but the task of teasing out real images from altered ones is formidable. Even off-the-shelf editing tools can trick digital forensics experts. Nasir Memon, professor of computer science and engineering at the New York University Tandon School of Engineering,...
Category: Press Highlights
MasterCard Exec, Others Urge Flexible Cybersecurity Regime
During a panel at a Women Leaders in Cybersecurity symposium hosted by New York University‘s Center of Cybersecurity, executives from MasterCard Inc. and Goldman Sachs Group Inc., as well as former government officials who are now in the private sector, explored the complex regulatory landscape that faces business when it comes to cybersecurity.
N.S.A. Suspect Is a Hoarder. But a Leaker? Investigators Aren’t Sure.
On a half-dozen occasions in the last three years, top-secret information has leaked from the National Security Agency and appeared on the web. Government analysts concluded with alarm that the documents, including intercepted communications from Europe and Japan and the computer code for the N.S.A.’s hacking tools, had not come from the huge collection taken...
Diversity, one key to solving cybersecurity job gap
The benefits of having a diverse cyber workforce were pounded home on October 4 by CISOs, government officials and academics during the IBM/International Consortium of Minority Cybersecurity Professionals (ICMCP) Town Hall.
10 Questions: Raj De's career has taken him from 9/11 Commission to White House to NSA
Nearly 20 years ago, a young Harvard Law School student named Raj De sat in his mentor’s office and explained why he’d decided to bypass BigLaw for the Department of Justice. The older lawyer understood completely. “You should always go where the action is,” he counseled. De took this advice—and then some. Leadership roles at...
Yahoo whodunnit: Mystery surrounds hackers behind massive breach
A week after Yahoo said it was subjected to the worst data breach in history, details about who nabbed info on 500 million email accounts remain sketchy.
11 Signs Your Computer Is at Risk of Being Hacked
You lock your house. You keep your wallet out of plain view. You’re responsible with credit cards. You should treat your computer with the same caution, but even the most accountable people can make mistakes that make them susceptible to cybercriminals.
The lesson about email safety we can learn from Hillary Clinton and Colin Powell
This election year may well be the year of the email controversy. From Colin Powell’s emails to Hillary Clinton’s private server to the Democratic National Committee’s email leak to Donald Trump openly encouraging Russian hackers, it’s easy to see that even those with likely the tightest security measures in place are still victim to break-ins.
The Man Who Defends Hardware from Hackers: Siddharth Garg is One of the 10 Most Brilliant People of 2016
It might sound like the premise of a bad supervillain flick, but it’s all too feasible: Hackers can tweak a microchip so when a certain trigger occurs, it throws open the gates for attackers to commandeer—or destroy—the device in which that chip is embedded. All it takes is one saboteur at the factory, and you’ve...
White House under pressure to call out Moscow over hacking actions
There is a debate within the Obama administration over whether to publicly blame Russia for the hack of the Democratic National Committee or to wait for the FBI to complete its investigation — a delay that has frustrated some lawmakers and national security officials.