- Nasir Memon, a professor at the Polytechnic Institute of New York University, talks about biometric password technology. He speaks with Cory Johnson on Bloomberg Television's "Bloomberg West."
- Passwords are a pain to remember. What if a quick wiggle of five fingers on a screen could log you in instead? Or speaking a simple phrase? Neither idea is far-fetched. Computer scientists in Brooklyn are training their iPads to recognize their owners by the touch of their fingers as they make a caressing gesture. Banks are already using software that recognizes your voice, supplementing the standard PIN. And after years of predicting its demise, security researchers are renewing their efforts to supplement and perhaps one day obliterate the old-fashioned password.
- The eighth Cyber Security Awareness Week brought together high school hackers in pursuit of a noble goal. The kids filling the room in the above picture are computer hackers. They work their way into computer systems much the same way some might hear about bad guys doing it on the news. The difference is that these hackers are actually the good guys, and the systems they're breaking into are simulated as part of a competition for the eighth Cyber Security Awareness Week at the Polytechnic Institute of New York University.“We have everything from high school students who are learning about forensics so they can tell you if your credit card information was stolen off your computer, how a hacker got in or how an attacker compromised a website. Also, everything from graduate students who are designing new hardware to make it more secure to do things,” said Justin Cappos of NYU-Poly. “There are seven different events all located with this, and there are thousands of people from around the world. This is going and taking people interested in this putting them in a communal environment where they can all pool their resources and learn from each other.”
- Clancy is intimately familiar with the in’s and out’s of cyber hacking attacks. As managing director and Corporate Information Security Officer at the Depository Trust and Clearing Corporation (DTCC), Clancy’s job is to pay attention to how crooks use virtual highways to steal data and assets and stay a step ahead. Today that means much more than loading up some anti-virus software and patching an operating system. Yet before tossing out anti-virus software as insufficient, reps should note that malware mass software programs designed to hit operating systems without any target in mind were still behind 49 percent of breaches in 2010, according to Verizon. In other words? An attack can come from anywhere.
It’s easy enough to accidentally delete cherished digital photographs. One wrong click of a button can wipe them out. Now, new software is smart enough to find and reassemble fragmented digital photographs, even when the directions for locating them have been deleted. The program was devised by the computer scientist Nasir Memon, a professor at the Polytechnic Institute of New York University in Brooklyn.