Take 5: How to protect your passwords

Not using the same pass­word for every­thing is among sev­eral tips North­eastern cyber­se­cu­rity expert Wil Robertson sug­gests to help Internet users guard their per­sonal infor­ma­tion online.

Data mining in a complex world

The real world is an enor­mously com­plex net­work in which every­thing is inter­con­nected. Assis­tant pro­fessor of com­puter and infor­ma­tion sci­ence Yizhou Sun develops data-​​mining algo­rithms that take advan­tage of that complexity.

Sinister code-​​breakers, beware

The research of Daniel Wichs, a new assis­tant pro­fessor in the Col­lege of Com­puter and Infor­ma­tion Sci­ence, focuses on how cryp­tog­raphy can con­tinue pro­tecting per­sonal data in an evolving dig­ital age.

3Qs: Is a potential Facebook hack on the horizon?

The hacker group Anony­mous recently announced through a YouTube video that it plans to “kill” Face­book on Nov. 5 for sup­pos­edly abusing the pri­vacy of its users. We asked Engin Kirda, the Sy and Laurie Stern­berg Inter­dis­ci­pli­nary Endowed Pro­fessor for Infor­ma­tion Assur­ance — with joint appoint­ments in Northeastern’s Col­lege of Com­puter and Infor­ma­tion Sci­ence and Depart­ment of Elec­trical and Com­puter Engi­neering — to dis­cuss the poten­tial impli­ca­tions of the hack and the motives behind hacking groups such as Anonymous.

Nurturing a seed of discovery

Net­work sci­en­tists at North­eastern col­lab­o­rate on first large-​​scale map of a plant’s pro­tein net­work, which could one day help treat human disease.