In the Media

Intimate Stories and Live Actors Show Just How Beautiful VR Can Be

Hollywood is doing its best to figure out virtual reality, often with less than compelling results. But a small group of VR producers at this year’s Tribeca Film Festival have successfully innovated their way through experimental territory that big studios have not yet dared to tread, using...

Deliberate Mistakes Could Be the Key to Protecting 3D Printed Parts from Theft

As previously reported on 3D Printing Industry, the protection of intellectual property (IP) in CAD files is a chief concern, not only for independent designers, but for companies seeking security over digital assets. As a solution to design theft, a research team at the New York University Tandon...

Secret Flaws Keep 3D-Printing Safe From Hackers

Researchers have discovered ways for manufacturers using 3D printing to embed hidden flaws in files to thwart intellectual property theft. But since the global supply chain for 3D printing, also called additive manufacturing (AM), requires companies to share computer aided design (CAD) files within...

Deliberately Embedding Flaws in 3-D Printed Objects to Prevent Hacking

The market for additive manufacturing, more commonly referred to as 3-D printing, is set to grow nearly 26 percent this year to more than $5 billion, according to research firm Wohlers Associates. Yet despite this booming market for additive manufacturing, the process still generally relies on...

WannaCry Ransomware Attack Illustrates Need for Evolution in Cybersecurity Norms

Individuals and institutions affected by the WannaCry ransomware attack face a Hobson’s choice — the malicious software (malware) encrypts a user’s documents while the decryption keys remain in the hands of the cybercriminals. Victims of the attack can either pay the hackers...

New Hacking Threats: Vulnerabilities and Sophisticated Ransomware

A massive cyberattack that struck 300,000 computers in 150 countries earlier this month has begun to slow, but experts warn there is more to come — including the ability to hack fingerprint readers.  "It is going to get worse before it gets better because we've becoming more...

NYU Lecturer, Allan Goldstein, Draws from Personal Connection to Break Down Barriers Through Disabilities Course

“What the typical students get is that we’re all people first, that we all want the same thing which is work and love," Allan Goldstein said. There’s no message more important than this for Allan Goldstein, a senior lecturer at NYU. “We’re breaking down...

FCC Upends Licensing Process for 5G Research

The growing demand for faster, more robust wireless service from consumers, smart city integrators and internet-of-things manufacturers is spurring the need for the next generation of wireless connectivity-- or 5G.  To make it easier to experiment with new technologies and services in the...

FOX23 Investigates: Safety of Fingerprint Scans on Phones

A thumbprint may seem simpler and more secure than a passcode or password.  But one of the nation's top computer scientists says he has discovered a security flaw with the kind of fingerprint identification technology often used to lock cellphones. We traveled to New York University to...

Ted Tours the Brooklyn 5G Summit Expo Floor (Video)

Take a whirlwind tour through the Expo floor of the 2017 Brooklyn 5G Summit. Ted Rappaport, Founding Director of NYU WIRELESS, checks out summit exhibits including the Enigma encryption machine from WWII Germany.  (See more...)