Category: Press Highlights

Home / Press Highlights
Post

Does My Eye Deceive Me? Not With These Digital Forensics Tools

The Internet is awash with images and videos that may hold national security and intelligence value, but the task of teasing out real images from  altered ones is formidable. Even off-the-shelf editing tools can trick digital forensics experts. Nasir Memon, professor of computer science and engineering at the New York University Tandon School of Engineering,...

Post

MasterCard Exec, Others Urge Flexible Cybersecurity Regime

During a panel at a Women Leaders in Cybersecurity symposium hosted by New York University‘s Center of Cybersecurity, executives from MasterCard Inc. and Goldman Sachs Group Inc., as well as former government officials who are now in the private sector, explored the complex regulatory landscape that faces business when it comes to cybersecurity.

Post

N.S.A. Suspect Is a Hoarder. But a Leaker? Investigators Aren’t Sure.

On a half-dozen occasions in the last three years, top-secret information has leaked from the National Security Agency and appeared on the web. Government analysts concluded with alarm that the documents, including intercepted communications from Europe and Japan and the computer code for the N.S.A.’s hacking tools, had not come from the huge collection taken...

Post

10 Questions: Raj De's career has taken him from 9/11 Commission to White House to NSA

Nearly 20 years ago, a young Harvard Law School student named Raj De sat in his mentor’s office and explained why he’d decided to bypass BigLaw for the Department of Justice. The older lawyer understood completely. “You should always go where the action is,” he counseled. De took this advice—and then some. Leadership roles at...

Post

11 Signs Your Computer Is at Risk of Being Hacked

You lock your house. You keep your wallet out of plain view. You’re responsible with credit cards. You should treat your computer with the same caution, but even the most accountable people can make mistakes that make them susceptible to cybercriminals.

Post

The lesson about email safety we can learn from Hillary Clinton and Colin Powell

This election year may well be the year of the email controversy. From Colin Powell’s emails to Hillary Clinton’s private server to the Democratic National Committee’s email leak to Donald Trump openly encouraging Russian hackers, it’s easy to see that even those with likely the tightest security measures in place are still victim to break-ins.

Post

The Man Who Defends Hardware from Hackers: Siddharth Garg is One of the 10 Most Brilliant People of 2016

It might sound like the premise of a bad supervillain flick, but it’s all too feasible: Hackers can tweak a microchip so when a certain trigger occurs, it throws open the gates for attackers to commandeer—or destroy—the device in which that chip is embedded. All it takes is one saboteur at the factory, and you’ve...