• Pentagon-Funded Games Would Crowdsource Weapons Testing - January 19, 2012

    The Pentagon plans to fork over $32 million to develop "fun to play" computer games that can refine the way weapons systems are tested to ensure they are free from software errors and security bugs, according to a Defense Department solicitation. The goal is to create puzzles that are "intuitively understandable by ordinary people" and could be solved on laptops, smartphones, tablets and consoles. The games' solutions will be collected into a database and used to improve methods for analyzing software, according to the draft request for proposals put out by the military's venture capital and research arm, the Defense Advanced Research Projects Agency. . . .If players know a game is mapped to a weapons system's software, there's the alarming possibility that they could rig its results. "They could collude and play the game to show there are no security problems," said Nasir Memon, director of the Information Systems and Internet Security Laboratory at the Polytechnic Institute of New York University. "How can you trust results from that?"
  • Banks Unite To Battle Online Theft - Wall Street Journal: January 10, 2012

    Rising cybersecurity threats are pushing big banks to do something that doesn't come naturally for these secrecy-steeped institutions: share information with one another.This month, security officials from Wall Street financial firms, including Morgan Stanley and Goldman Sachs Group Inc., are expected to meet with researchers from the Polytechnic Institute of New York University to discuss the creation of a new type of center that would sift through mountains of bank data to detect potential attacks, people familiar with the situation said.
  • NYU’s Nasir Memon On Biometric Password Technology - Bloomberg West TV: Jan 6, 2012

  • Nasir Memon, a professor at the Polytechnic Institute of New York University, talks about biometric password technology. He speaks with Cory Johnson on Bloomberg Television's "Bloomberg West."
  • 8th Annual Cyber Security Awareness Week Held at NYU-Poly - NY1-TV

    CSAW was featured on NY1, with interviews with professor Justin Cappos and keynote speaker Don Proctor of Cisco.
  • CSAW Attracts Top Security Hackers and Professionals - News 12 TV

    Focus on high school students taking part in CSAW at NYU-Poly with an interview with Justin Cappos.
  • Logging In With a Touch or a Phrase (Anything but a Password) - New York Times: December 23, 2011

  • Passwords are a pain to remember. What if a quick wiggle of five fingers on a screen could log you in instead? Or speaking a simple phrase? Neither idea is far-fetched. Computer scientists in Brooklyn are training their iPads to recognize their owners by the touch of their fingers as they make a caressing gesture. Banks are already using software that recognizes your voice, supplementing the standard PIN. And after years of predicting its demise, security researchers are renewing their efforts to supplement and perhaps one day obliterate the old-fashioned password.
  • I-Den Touch Featured On Brooklyn 12 News

    Professor Nasir Memon and his students demonstrate their app, the I-Den Touch, a program capable of recognizing a user's unique hand gestures and body movements and translating those into a physical passcode for wireless devices
  • Young Hackers Gather For Cyber Security Awareness Week - November 19, 2011

  • The eighth Cyber Security Awareness Week brought together high school hackers in pursuit of a noble goal. The kids filling the room in the above picture are computer hackers. They work their way into computer systems much the same way some might hear about bad guys doing it on the news. The difference is that these hackers are actually the good guys, and the systems they're breaking into are simulated as part of a competition for the eighth Cyber Security Awareness Week at the Polytechnic Institute of New York University.“We have everything from high school students who are learning about forensics so they can tell you if your credit card information was stolen off your computer, how a hacker got in or how an attacker compromised a website. Also, everything from graduate students who are designing new hardware to make it more secure to do things,” said Justin Cappos of NYU-Poly. “There are seven different events all located with this, and there are thousands of people from around the world. This is going and taking people interested in this putting them in a communal environment where they can all pool their resources and learn from each other.”
  • The Mobile Security Show - AT & T Tech Channel: November 16, 2011

    Taped on November 16, 2011, on the campus of the Polytechnic Institute of New York University in Brooklyn, New York, this episode of the Mobile Security Show, "Dealing With Exploitable Mobile Device Vulnerabilities", featured guest panelists Edward Amoroso, Martin Roesch, Uma Chandrashekhar and NYU-Poly's Justin Cappos.
  • Top Young Hackers Converge in Brooklyn

    Detectives on their first day on the job with the NYU-Poly Cyber Crime Division were confronted with a gruesome celebrity murder. The star of the hit reality show “ISIS Shore” named Snooki, coincidentally was found dead in the auditorium, and her lover Dan Guido was seen speeding away down Bridge Street towards the “ISIS Shore” house. Just as investigators arrived at the house, it exploded in a ball of fire. When the debris settled the only clues left were an Android smart phone, a desktop computer, a hard drive, a USB drive, a server and a broken biometric door lock.
  • Gesture-Based Login Apps For Ipad And Iphone Aim To Banish Passwords From Touchscreens - November 10, 2011

    The screen on Apple’s tablets or smartphones can pick up subtle identifying gestures as unique as a signature on a check. So why, when we log into those devices or use them to verify our identity to apps and Web services, do we still have to pretend we’re using a primitive keyboard? According to a group of researchers at New York University’s Polytechnic Institute, we don’t. For the last few years, they’ve been working on gesture-based systems for logging into those devices and their apps that they hope can abolish cumbersome passwords and make logging in nearly as simple as the finger swipe that unlocks iOS gadgets and far harder to crack than Android’s nine-point pattern authentication. With a multitouch gesture system that captures enough variables unique to users like hand size, finger placement, and speed of movement; they say they’re getting close.
  • Your Phone Company is Selling Personal Data - CNN Money: November 1, 2011

    Your phone company knows where you live, what websites you visit, what apps you download, what videos you like to watch, and even where you are. Now, some have begun selling that valuable information to the highest bidder. In mid-October, Verizon Wireless changed its privacy policy to allow the company to record customers' location data and Web browsing history, combine it with other personal information like age and gender, aggregate it with millions of other customers' data, and sell it on an anonymous basis. "At the end of the day, we're getting to a situation where customers are the products that these wireless companies are selling," said Nasir Memon, a professor of computer science at New York University's Polytechnic Institute. "They're creating a playground to attract people and sell them to advertisers. People are their new business."
  • Cyber-hackers: faster, better equipped than you - May 27, 2011

  • Clancy is intimately familiar with the in’s and out’s of cyber hacking attacks. As managing director and Corporate Information Security Officer at the Depository Trust and Clearing Corporation (DTCC), Clancy’s job is to pay attention to how crooks use virtual highways to steal data and assets and stay a step ahead. Today that means much more than loading up some anti-virus software and patching an operating system. Yet before tossing out anti-virus software as insufficient, reps should note that malware mass software programs designed to hit operating systems without any target in mind were still behind 49 percent of breaches in 2010, according to Verizon. In other words? An attack can come from anywhere.
  • SmartCarving Technique Aces Data Recovery

  • Forensic tool will advance data recovery - 07 May, 2010

    New computer forensic tools will make it possible to recover more data from corrupted hard drives so long as the missing files haven't been overwritten. Tools designed to harvest images from disks even after they have been deleted from the file system can be adapted to seek other file formats including Word documents, says Nasir Memon, a professor at the Polytechnic Institute of New York University.In research that he hasn't yet published, Memon says will show that techniques used to cull images can be adapted to find text files, a capability that would be attractive to businesses trying to salvage data that may be fragmented and dispersed across a corrupted drive.
  • A New Way to Detect Digital Child Pornography - April 14, 2010

    The fight against child pornography could be getting a new high-tech tool. To help law enforcement with the task of analyzing a suspected child pornographer's computer, new software developed by a computer science professor Nasir Memon at the Polytechnic Institute of New York University brings deleted photographs back from the computer's trash and searches them for potentially explicit images of children and differentiates them from images of adult. "It uses machine-learning algorithms to distinguish child from not-child," said Nasir Memon who created the program with his students.
  • Interview on Isignon- iphone application - March 30, 2010

    Prof. Memon did an interview about his iPhone application called iSignOn. It took place over the phone, and it lasted about 18 minutes. You can listen to the interview on the link provided and learn how the technology behind the app works.
  • Photo Forensics Tool Reconstructs Erased Data - November 18, 2009

    A group from NYU-Poly creates Adroit Photo Forensics 2009, technology that helps solve crimes such as child pornography quickly and efficiently. Professor Nasir Memon, a cyber-security expert and head of the Information Systems and Internet Security (ISIS) Lab at Polytechnic Institute of New York University, and his students have come up with a technology solution called Adroit Photo Forensics 2009, which that can reconstruct erased or scattered data. Adroit uses a patent-pending “SmartCarving” technology, developed at NYU-Poly, to find and recover these image files.
  • Software capable of reassembling deleted photos - TG Daily: March 2, 2009

    With ever advancing technology, it is now possible for software to find and reassemble photos which have been fragmented, even if the directions for locating the files have been deleted. Nasir Memon, a professor at the Polytechnic Institute of New York University, and also a computer scientist, has developed the software. The software uses a sophisticated file carving technique, which restores the contents of a file after the identifying information which goes with it has either been lost or removed.
  • Sleuthing Software Can Reassemble Deleted Photos - The New York Times: February 28, 2009

    It’s easy enough to accidentally delete cherished digital photographs. One wrong click of a button can wipe them out. Now, new software is smart enough to find and reassemble fragmented digital photographs, even when the directions for locating them have been deleted. The program was devised by the computer scientist Nasir Memon, a professor at the Polytechnic Institute of New York University in Brooklyn.

  • Bogus analysis led to terror alert in Dec. 2003 - NBC News: June 27, 2005

    As discredited as the CIA's interpretation now is, experts say steganography is a valid subject for CIA analysis, and could be used by terrorists to hide data in files on the Web, in still photographs or in broadcast television images. "Steganography," says professor Nasir Memon of Polytechnic Universityin Brooklyn, N.Y., "is the art, if you will, of secret writing. And when two parties want to talk to each other and not let anybody know they are indeed communicating, they would use steganography." Memon is an expert in "steganalysis" — using sophisticated software to locate hidden messages. He says such analysis is valuable but not always reliable, because there are many "false positives." In general, he says, "it's not something I would bet the farm on because there is a significant chance that it could be wrong."