News

A New Center and New Solutions

With digital data now essential to almost every facet of our lives, from our personal finances and healthcare to our jobs, cyber security is becoming ever more crucial and has evolved into a multidisciplinary field that requires cooperation among...

Searching for Big Insights from Online Reviews

There is no question that data are big: 2.5 quintillion new bytes are added every day from our keyboards, sensors, entertainment, and medical scans, to name but a few. Data scientists have begun refining tools to encourage civilians to join them in...

Renter Beware: Study Finds Craigslist Catches Barely Half of Scam Rental Listings

Apartment hunters in big cities know the drill: They spot a listing for a well-priced, attractive place and make an inquiry, only to be met with demands for an instant credit check or an upfront fee to access the full listing. Savvier home hunters...

Big-Data Visualization Experts Make Using Scatter Plots Easier for Today’s Researchers

Scatter plots—which use horizontal and vertical axes to plot data points and display how much one variable is affected by another—have long been employed by researchers in various fields, but the era of Big Data, especially high-...

Verification Code or Cyber Attack?

Two-factor authentication is a computer security measure used by major online service providers to protect the identify of users in the event of a password loss. The process is familiar: When a password is forgotten, the site sends an SMS text...

NYU Researcher’s “Time Machine” for Analyzing Computer Code Honored By R&D Magazine

Computer security researchers face a major hurdle in studying software systems: Once a piece of code runs, that precise execution, along with its flaws and vulnerabilities, is gone forever. Studying whole operating systems, web browsers, or embedded...

When The United Nations Puts a Call Out to Data Pros...

Recently, Atefeh Riazi, the Chief Information Technology Officer for the U.N. issued a public appeal. “I invite the global community of data scientists to partner with the United Nations in our mandate to harness the power of data analytics...

Discovering Cybersecurity with Goldman Sachs’ Women Professionals

It is no secret that the tech industry suffers from an acute shortage of women workers, and this survey, commissioned recently by the National Cyber Security Alliance, suggests why: “62 percent of men and three quarters of women globally...

World’s Largest Student Security Contest Names Top Cyber Sleuths, Hackers, and Researchers

Students from high schools through doctoral programs throughout America and beyond competed in the largest student-run security games November 12-14, 2015 in the final round of the 12th annual New York University Cyber Security Awareness Week (NYU...

Internet Pioneer Vint Cerf Talks Cybersecurity on Web 3.0

Vinton G. Cerf has been called many things over the course of his long career: father of the Internet, pioneer, living legend. . . but November 4, 2015 just might have marked the first time he was called a rock star and likened to the Beatles and...