In today’s electronics industry, chips are designed by globally dispersed teams, outsourced for fabrication, packaging, and testing, and distributed via complex supply chains. In such a scenario, how can chip integrity be guaranteed against threats such as intellectual property (IP) theft, malicious modification, and counterfeiting? Siddharth Garg, assistant professor of electrical and computer engineering at...
Category: <span>Press Highlights</span>
Hold that Yak: NYU Researchers Discover Clues for Identifying Yik Yak Users on College Campuses
Experiments by researchers at the NYU Tandon School of Engineering and NYU Shanghai have successfully cracked the veil of anonymity in Yik Yak, an ostensibly anonymous social media application.
Does My Eye Deceive Me? Not With These Digital Forensics Tools
The Internet is awash with images and videos that may hold national security and intelligence value, but the task of teasing out real images from altered ones is formidable. Even off-the-shelf editing tools can trick digital forensics experts. Nasir Memon, professor of computer science and engineering at the New York University Tandon School of Engineering,...
MasterCard Exec, Others Urge Flexible Cybersecurity Regime
During a panel at a Women Leaders in Cybersecurity symposium hosted by New York University‘s Center of Cybersecurity, executives from MasterCard Inc. and Goldman Sachs Group Inc., as well as former government officials who are now in the private sector, explored the complex regulatory landscape that faces business when it comes to cybersecurity.
N.S.A. Suspect Is a Hoarder. But a Leaker? Investigators Aren’t Sure.
On a half-dozen occasions in the last three years, top-secret information has leaked from the National Security Agency and appeared on the web. Government analysts concluded with alarm that the documents, including intercepted communications from Europe and Japan and the computer code for the N.S.A.’s hacking tools, had not come from the huge collection taken...
Diversity, one key to solving cybersecurity job gap
The benefits of having a diverse cyber workforce were pounded home on October 4 by CISOs, government officials and academics during the IBM/International Consortium of Minority Cybersecurity Professionals (ICMCP) Town Hall.
10 Questions: Raj De's career has taken him from 9/11 Commission to White House to NSA
Nearly 20 years ago, a young Harvard Law School student named Raj De sat in his mentor’s office and explained why he’d decided to bypass BigLaw for the Department of Justice. The older lawyer understood completely. “You should always go where the action is,” he counseled. De took this advice—and then some. Leadership roles at...
Yahoo whodunnit: Mystery surrounds hackers behind massive breach
A week after Yahoo said it was subjected to the worst data breach in history, details about who nabbed info on 500 million email accounts remain sketchy.
11 Signs Your Computer Is at Risk of Being Hacked
You lock your house. You keep your wallet out of plain view. You’re responsible with credit cards. You should treat your computer with the same caution, but even the most accountable people can make mistakes that make them susceptible to cybercriminals.
The lesson about email safety we can learn from Hillary Clinton and Colin Powell
This election year may well be the year of the email controversy. From Colin Powell’s emails to Hillary Clinton’s private server to the Democratic National Committee’s email leak to Donald Trump openly encouraging Russian hackers, it’s easy to see that even those with likely the tightest security measures in place are still victim to break-ins.