Students in the information assurance program will receive training in both the technical sciences and the humanities through a scholarship program.
Engin Kirda, the Sy and Laurie Sternberg Interdisciplinary Associate Professor for Information Assurance, developed new software for detecting and containing malicious webcrawlers.
Assistant professor and cybersecurity expert Wil Robertson explains the growing threat of hackers targeting American military and infrastructure.
Themis Papageorge, an associate clinical professor of computer and information science, examines the cybersecurity threat posed by al-Qaida and Anonymous, a global group of hackers.
Cybersecurity curriculum will prepare select students for highly specialized jobs that investigate cybercrimes.
As part of a Monday afternoon lecture on cybersecurity, Engin Kirda was installed as the inaugural Sy and Laurie Sternberg Associate Professor for Information Assurance.
The cybersecurity threat represents one of the nation’s most serious economic and national security challenges, said Stephen Flynn, the founding co-director of Northeastern’s George J. Kostas Research Institute for Homeland […]
Yesterday I was the victim of a cyber attack, which sucked. But it also meant I got to watch science happening in real time. First of all, cyber-security is a big topic […]
Most of us have a cell phone these days. Most of them are “smart” But as they get even smarter, turning into not just our datebooks and GPS devices but also […]
Last weekend, Northeastern students competed against industry professionals and peers from 11 other schools in the Northeast Regional Collegiate Cyber Defense Competition.
In late April, a hacker crippled Sony’s PlayStation Network by stealing the names, home addresses and perhaps even the credit card numbers of some 70 million subscribers, who play and download games through the online service. Here, professor Engin Kirda assesses the impact of the attack.
Internet attacks offer intriguing research challenges for new professor, who will look at the user’s role in creating vulnerabilities