Northeastern cybersecurity expert Engin Kirda and his colleagues have produced groundbreaking research that sheds light on targeted attacks, which represent the growing majority of cyberespionage worldwide taking place today.
With support from the National Science Foundation, cryptography expert Daniel Wichs, an assistant professor in the College of Computer and Information Science, will work as part of a multi-university team to develop better encryption techniques to improve cloud security.
Northeastern mobile systems expert David Choffnes says data brokering, in which the data we share online is bought and sold by third parties, has blossomed into a viable industry and is the reason many popular apps are free. But he says the average user knows little about how their personal information is shared.
Dave Choffnes, an assistant professor in the College of Computer and Information Science, is developing programs that incentivize smartphone users to share their data in order to improve the mobile Internet experience while still protecting their privacy.
Not using the same password for everything is among several tips Northeastern cybersecurity expert Wil Robertson suggests to help Internet users guard their personal information online.
Crowdsourced social media platforms such as Facebook and Yelp are increasingly being infiltrated by fake accounts and reviews that cloud the legitimacy of some online rating systems. Assistant professor Christo Wilson dubbed this phenomenon “crowdturfing,” and he’s determined to make these systems more secure.
Associate professor and cybersecurity expert Engin Kirda discusses the data security breach at Target last week that affected up to 40 million customers and how cyberattacks have evolved in recent years.
This post was written by assistant professor Wil Robertson. We are in the midst of an explosive proliferation of computing devices. Once confined to the domain of massive, expensive mainframes […]
Electrical and computer engineering professor David Kaeli is working with the Heterogeneous Systems Architecture Foundation to establish new standards for inter-device communications.
Professor and cybersecurity expert Wil Robertson discusses the impact of new measures the Obama administration is reportedly taking to combat cyberattacks and the challenges federal officials face in recruiting cyberspecialists.
Earlier this month, more than 1000 teams across the globe tried to hack their way to a spot at the biggest cybersecurity education conference around. Fifteen teams were finalists, earning […]
Students in the information assurance program will receive training in both the technical sciences and the humanities through a scholarship program.