In the Media

Boffins Design Security Chip to Spot Hidden Hardware Trojans in Processors

Scientists at the NYU Tandon School of Engineering have designed a new form of application-specific integrated circuit (ASIC) designed to spot hidden vulnerabilities deep within a processor' s design.  Very few people run their own chip fabrication plants these days. Most processors are...

Self-Checking Chip Hunts Out its Own Defects, Signs of Sabotage

In a bid to mitigate risks from malicious circuitry, researchers have designed a chip solution which comprises an embedded moduel to verify calculations and an external module to validate initial proofs.  Concerned with the opportunities for bad actors to manipulate circuitry along the chip...

Researchers Design Chip that Identifies Defects, Monitors Performance

A team of researchers has designed a new solution to malicious circuitry in device chips. The team's chip contains an embedded module that monitors its own computations and flags defects before attackers can sabotage devices.  The embedded module proves its own calculations are correct,...

The Science of Diffusion and the Spread of Public Policy

Most of us think of diffusion in the context of its scientific definition as the process whereby particles of liquids, gases or solids intermingle and in dissolved substances move from a region of higher to one of lower concentration. However, it also applies to the spread of policies between and...

How Adware Invades Your Computer and Steals Your Personal Data

It's happened to everyone: You go to download some kind of new software, and before you do, a long list of terms and conditions in tiny font pops up. You don't read a word and hit "agree." What you might not realize is that along with the program you think you're getting, you...

City Dangles $1 Million to School with Best 'Smart Gun' Design

Brooklyn Borough President Eric Adams thinks that gun technology needs an upgrade, and he's offered up more than $1 million from his budget to help make it happen. "Smart guns" are weapons that can only by fired by an authorized user. At a Tuesday press conference, Adams reiterated a...

Evidence Mounts that NSA Computer Code was Stolen

Analysis of the cyber weapons that hackers say they extracted from the top secret National Security Agency has left a key team of outside experts increasingly certain that the files came from the NSA. The Russia-based Kaspersky Lab, which has been at the forefront into research of NSA techniques,...

How the U.S. Will Respond to the Likely NSA Hack

One of the NSA’s most vaunted teams lost top-secret cyberweapons to a group of unknown hackers. The question now is, what comes next? Early Saturday morning, a group called the Shadow Brokers posted what they claimed to be data stolen from the NSA’s Equation Group, a team of American...

Alleged NSA Data Dump Contains Hacking Tools Rarely Seen

A stolen cache of files that may belong to the National Security Agency contains genuine hacking tools that not only work, but show a level of sophistication rarely seen, according to security researchers. That includes malware that can infect a device’s firmware and can persist even if the...

Borough President Eric Adams Asks Students to Design Smarter Guns

Brooklyn Borough President Eric Adams wants students to use their design skills to keep Brooklyn safe. Yesterday, he challenged local colleges and universities to come up with proposals for smarter guns — a gun, for example, that could only be operated by one specific person. “As a...