Khoury News
Filter your search
Showing 9 of 1572 results
-
-
Current Students
CCIS Students attend exclusive Google Crash Course
- March 17, 2017
By Christian Stafford Several Northeastern students had the recent honor of attending the Google Machine Learning Crash Course at Google’s Cambridge office. “The crash course was a two-day interactive exploration […] -
Current Students
CCIS undergraduate and graduate students’ research showcased at NU Talk 2017
- March 17, 2017
By Christian Stafford Three Northeastern students – representing the college of Computer and Information Science and the Bouvé College of Health Sciences, presented their research on various topics at this […] -
Co-ops lead to a job in the fashion industry
- March 17, 2017
By Julia Renner The only way a product can reach a consumer “is if there’s an entire life cycle of technology behind it,” says Theresa Aristarco, who graduated from Northeastern […] -
-
General The Wall Street Journal
The big security mistakes companies make when buying tech
- March 16, 2017
Companies are expected to spend more than $3 trillion on workplace technology this year, buying everything from traditional servers to augmented-reality glasses. For many, those purchases will make them more efficient, more innovative—and more vulnerable to attacks on their information security. -
General TechRepublic
Wikileaks’ CIA hacks: Apple says it’s already fixed many of the flaws mentioned
- March 15, 2017
If the leaked documents are verified, it could have major security implications for Apple, Samsung, Microsoft, and all other tech companies. However, it's not exactly a surprise that these devices are able to be hacked, said Engin Kirda, professor of computer science at Northeastern University. -
General News at Northeastern
Decoding wiretapping technology
- March 10, 2017
While the legal framework for justifying and ordering a wiretap is complex and multilayered, professor Guevara Noubir, an expert in the privacy, security, and robustness of network systems in the College of Computer and Information Science, said that “from a technological perspective, wiretapping has always been feasible and rather easy.” -
General Bleeping Computer
Over a third of websites use outdated and vulnerable JavaScript libraries
- March 10, 2017
More than a third of the websites you visit online may include an outdated JavaScript library that's vulnerable to one or more security flaws. This is the conclusion of recent research carried out by a team of six scientists from the College of Computer and Information Science at Northeastern University, who scanned over 133,000 domains and found that 37% loaded outdated and insecure JavaScript libraries.
Showing 9 of 1572 results