Congressman tours Northeastern’s Kostas Research Institute for Homeland Security

U.S. Rep. Seth Moulton received a com­pre­hen­sive overview of Northeastern’s robust port­folio of secu­rity research on Thursday after­noon and under­scored the impor­tance of pro­viding research funding in this area.

Research, entrepreneurship at Northeastern celebrated at RISE:2015

Stu­dents and fac­ulty across many dis­ci­plines pre­sented their schol­arly research, inno­v­a­tive thinking, and entre­pre­neurial endeavors at the annual expo, where many young researchers were hon­ored with pres­ti­gious awards.

Looking ahead: Cybersecurity in 2015

U.S. busi­nesses suf­fered a score of data breaches in 2014. Here, William Robertson, an assis­tant pro­fessor and web secu­rity expert, explains what we can expect from cyber­se­cu­rity in the new year.

Researchers aim to thwart targeted cyberattacks

North­eastern cyber­se­cu­rity expert Engin Kirda and his col­leagues have pro­duced ground­breaking research that sheds light on tar­geted attacks, which rep­re­sent the growing majority of cyberes­pi­onage world­wide taking place today.

How to secure the cloud

With sup­port from the National Sci­ence Foun­da­tion, cryp­tog­raphy expert Daniel Wichs, an assis­tant pro­fessor in the Col­lege of Com­puter and Infor­ma­tion Sci­ence, will work as part of a multi-​​university team to develop better encryp­tion tech­niques to improve cloud security.

3Qs: Who’s got your digital dossier?

North­eastern mobile sys­tems expert David Choffnes says data bro­kering, in which the data we share online is bought and sold by third par­ties, has blos­somed into a viable industry and is the reason many pop­ular apps are free. But he says the average user knows little about how their per­sonal infor­ma­tion is shared.

New tools to get your smartphone up to speed

Dave Choffnes, an assis­tant pro­fessor in the Col­lege of Com­puter and Infor­ma­tion Sci­ence, is devel­oping pro­grams that incen­tivize smart­phone users to share their data in order to improve the mobile Internet expe­ri­ence while still pro­tecting their privacy.

Take 5: How to protect your passwords

Not using the same pass­word for every­thing is among sev­eral tips North­eastern cyber­se­cu­rity expert Wil Robertson sug­gests to help Internet users guard their per­sonal infor­ma­tion online.

3Qs: When Web reviews aren’t what they seem

Crowd­sourced social media plat­forms such as Face­book and Yelp are increas­ingly being infil­trated by fake accounts and reviews that cloud the legit­i­macy of some online rating sys­tems. Assis­tant pro­fessor Christo Wilson dubbed this phe­nom­enon “crowd­turfing,” and he’s deter­mined to make these sys­tems more secure.

3Qs: Target’s security breach

Asso­ciate pro­fessor and cyber­se­cu­rity expert Engin Kirda dis­cusses the data secu­rity breach at Target last week that affected up to 40 mil­lion cus­tomers and how cyber­at­tacks have evolved in recent years.