Skip to content ↓

Topic

Cybersecurity

Download RSS feed: News Articles / In the Media / Audio

Displaying 46 - 60 of 104 news clips related to this topic.
Show:

The Washington Post

Washington Post reporter Martin Weil spotlights the work of Prof. Fernando Corbató, who “drastically expanded the usefulness of the computer and put its benefits at the reach of all.” Weil notes that Corbató, who died on July 12, “fostered the digital revolution by developing shared computer operating systems and also put his stamp on daily life by introducing the computer password.”

BBC News

Prof. Emeritus Fernando Corbató, a computer pioneer known for his work with time-sharing computing systems and for inventing the computer password, has died at 93, reports the BBC. “Our world would be very different without his research and that of his descendants,” said Prof. Fadel Adib. “He inspires in his work and his legacy."

New York Times

New York Times reporter Katie Hafner memorializes the life and work of Professor Emeritus Fernando Corbató, known for his work on computer time-sharing systems.  Hafner notes that Corbató’s work on “computer time-sharing in the 1960s helped pave the way for the personal computer, as well as the computer password.”

Forbes

Alumnus Tom Leighton, CEO and co-founder of Akamai, speaks with Forbes contributor Peter High about the company’s founding and his push towards making the company more focused on cybersecurity.

Fast Company

Fast Company reporter Katherine Schwab spotlights Duality, an MIT startup that is using homomorphic encryption to analyze encrypted data without decrypting it. Schwab explains that the “company’s technology could provide an actual solution to the data privacy problem by allowing companies to keep their data fully encrypted and still find patterns in it.”

Forbes

Forbes contributor Gil Press writes about MIT cybersecurity startup Duality Technologies, which is working on guaranteeing privacy and utility. Press explains that the company is using a cybersecurity technique called Homomorphic Encryption, which “allows for processing and analysis of the encrypted data without having the secret key.”

NBC Boston

Keri Pearlson, executive director of Cybersecurity at MIT Sloan, speaks with Ally Donnelly of NBC 10 about protecting your online privacy. “Your spouse, your family, your birthday, your hometown, your high school, your college, your degrees,” says Pearlson. “I think we have to assume our information is out there and take other steps to protect ourselves.”

NBC News

NBC News reporters Courtney McGee and Brenda Breslauer speak with MIT alumna Sherri Davidoff, a “white hat” hacker, who hacks into computer systems to help companies test their security. McGee and Breslauer write that Davidoff, “was one of the first female white-hat hackers in an industry still dominated by men.”

BBC News

Prof. Aleksander Madry and graduate student Anish Athalye speak with BBC News reporter Linda Geddes about how AI systems can be tricked into seeing or hearing things that aren’t actually there. “People are looking at it as a potential security issue as these systems are increasingly being deployed in the real world,” Athalye explains.

TechCrunch

MIT researchers have developed a way to prevent the theft of sensitive data hidden on a computer’s memory, writes TechCrunch’s Zack Whittaker. Storing sensitive data in different memory locations creates “clear boundaries for where sharing should and should not happen, so that programs with sensitive information can keep that data reasonably secure,” explains graduate student Vladimir Kiriansky.

Financial Times

Financial Times reporter Jemima Kelly reports that MIT researchers have developed a low-power chip that is hardwired to perform public-key encryption. Kelly writes that the chip is “potentially a game-changer for simple, low-powered products such as smart sensors used by industry to gauge things such as temperature and pressure, as well as health monitors.”

San Francisco Chronicle

CSAIL Postdoc Gregory Falco writes in the San Francisco Chronicle about the importance of cybersecurity for satellites that interact with cars, televisions, and the internet. With new technological advancements like CubeSats, “we need to understand more about the legacy infrastructure on which these new technologies rely,” Falco concludes.

Engadget

Engadget reporter Jon Fingas writes that MIT researchers have developed an encryption method that can secure sensitive data in neural networks without slowing machine learning systems. The method, notes Fingas, could “lead to more uses of internet-based neural networks for handling vital info, rather than forcing companies and institutions to either build expensive local equivalents or forget AI-based systems altogether.”

Science

At the International Conference on Machine Learning, MIT researchers demonstrated an adversarial attack, fooling an AI system into thinking a 3-D printed turtle was a rifle, reports Matthew Hutson for Science. Prof. Aleksander Madry explains that the ability to fool AI systems shows, “we need to rethink all of our machine learning pipeline to make it more robust.”

The Wall Street Journal

In an article for The Wall Street Journal, Prof. Stuart Madnick writes about how companies can reduce their risk of cyberattacks by improving cybersecurity training and education among employees. “It’s crucial that support and enthusiasm for increasing cybersafety be visible at every level of the organization, from top executives and middle management to the individual,” explains Madnick.