Cybersecurity News and Insights

Latest News

April 25, 2017

What is 5G NR?

“While listening to the many excellent technical 5G presentations at the Brooklyn 5G Summit held at NYU Tandon School of Engineering and co-hosted by NYU WIRELESS and Nokia this year, I heard the term 5G NR mentioned. For those of you who are not familiar with 5G NR, it refers to 5G New Radio. Qualcomm commented […]

April 25, 2017

You Really Should Read An App’s Service Terms

“When you install an app on your phone, do you read the terms of service agreement? Probably not. When computer science and engineering professor Justin Cappos of the NYU Tandon School of Engineering describes himself as “pretty paranoid” he not only means he does read those terms-of-service agreements but also often refrains from downloading apps […]

April 18, 2017

Five Years Out: Jeramie Scott ’12 discusses his career in privacy and national security law

“Five years after graduating from law school, Jeramie Scott ’12 serves as national security counsel at the Electronic Privacy Information Center (EPIC) and works on some of today’s most pressing privacy issues. He has helped EPIC file high-profile amicus briefs in the US Supreme Court on issues concerning government surveillance. This has included an amicus […]

April 17, 2017

Former counterterrorism adviser: There are bound to be more cyberattacks

“Chicago (CNN)Russia’s successful incursion into the 2016 presidential election has opened a new, menacing phase in cyberwarfare and is a harbinger of attacks to come, says President Barack Obama’s former top counterterrorism adviser. “We in the United States have … crossed into a new threshold where we have state actors and others trying to use […]

April 10, 2017

That Fingerprint Sensor on Your Phone Is Not as Safe as You Think

“SAN FRANCISCO — Fingerprint sensors have turned modern smartphones into miracles of convenience. A touch of a finger unlocks the phone — no password required. With services like Apple Pay or Android Pay, a fingerprint can buy a bag of groceries, a new laptop or even a $1 million vintage Aston Martin. And pressing a […]

April 4, 2017

Gorsuch’s writings borrow from other authors

“Oxford’s academic guidance for plagiarism states that “paraphrasing the work of others by altering a few words and changing their order, or by closely following the structure of their argument, is plagiarism if you do not give due acknowledgement to the author whose work you are using.” Christopher Sprigman, a New York University law professor […]

March 28, 2017

Days After London Terror Attack, the UK Government Is Already Going After WhatsApp’s Encryption

“After the horrifying terror attack in London last week, the familiar debate over government access to encrypted communications has reared its head again.  This time, Britain’s home secretary Amber Rudd—who deals with security, terrorism, and policing, among other things—pointed the finger of blame at companies that make encrypted communications possible. “We need to make sure […]

March 16, 2017

Quick Take: Zachary Goldman on the US indictment of Russians allegedly behind Yahoo hack

“In a March 15 indictment, the US Department of Justice alleged that two Russian spies working with two criminal conspirators were behind a massive hack that stole data on 500 million Yahoo accounts in 2014. According to the charges, the defendants used some of that stolen information to access to the contents of email accounts […]

January 23, 2017

Randal Milch to Join NYTECH Panel on Data Security

NY Tech Alliance logo

Data Security: Protecting Your Customers and Your Company In Dangerous Times Date: Tuesday, January 24th Time: 6:00 PM Location: 1375 Broadway, 23rd Floor

January 6, 2017

Inside Cyber Security Awareness Week

Shortly after Election Day, before the interference of Russian hackers became front-page news, a group of thirty-one high-school students gathered at N.Y.U.’s Tandon School of Engineering, in Brooklyn, for Cyber Security Awareness Week. Their mission: to solve a murder mystery involving a fictional Presidential race by analyzing digital “evidence” of security breaches.

1 14 15 16