Skip to content

Data Privacy: Demystifying The GDPR

Editor’s Note: This post was a collaboration between graduate student Smirity Kaushik and assistant professor Yang Wang. Have you noticed that recently many companies such as Google, Spotify, and LinkedIn have sent emails or alerts notifying you about changes in their privacy policies? Why are they all doing that? Well, companies around the world are getting… Read the full article…


Inside InfoSec, The iSchool’s Information Security Club

In today’s technologically-based society, we rely heavily on information systems. Its usage is prominent in every industry and field in today’s society. The protection of information is pivotal for everyday functions. Since this information is of high importance, it needs protection and security. This need to learn, defend, and manage this information is what led… Read the full article…


The KRACK Attack and Lessons for IT Professionals

Earlier this year, wireless geeks celebrated the 20th birthday of Wi-Fi, the mobile networking technology we rely on every day for work and play. Whether you’re connected to Syracuse University’s AirOrange, your home network, or public hotspots, Wi-Fi is a mission-critical service, most of us can’t live without it. Until last week, we all thought… Read the full article…


The Rise of Ransomware: What Can Go Wrong?

What is Ransomware? Ransomware is a type of malicious software. It typically encrypts the victim’s data, effectively making it unusable unless a ransom is paid. In some cases, even if the ransom is paid, the decryption fails and the victim loses the data. Ransomware attacks are typically carried out using a Trojan style virus. Users… Read the full article…


Inclusive Privacy and Security with Prof. Yang Wang

Editor’s note: Professor Yang Wang brought his expertise to introduce inclusive privacy and security to the Syracuse University iSchool’s webinar series this spring. iSchool student and InfoSpace blogger Allison Leung asked Prof. Wang a few questions for those who are new to the topic of inclusive privacy. What do all professionals need to know about inclusive privacy… Read the full article…


Android Security: What Can Go Wrong?

What can go wrong if I order Pizza Hut from my Android device? Due to a well-publicized bug found in over 100 Android apps, when ordering Pizza Hut via the Android app the user’s password was exposed and easily could have been intercepted by a hacker. If you are like many people, you use the… Read the full article…


Amazon’s Alexa: What Can Go Wrong?

A blog Series on the risks associated with using “Internet of Things” smart devices by Michael Wangerin What’s the worst that can happen if I get an Amazon Echo (Alexa)? This is a question that will rapidly evolve over time. Amazon appears to continuously be developing new features for the product, as Farhad Manjoo reported… Read the full article…


Hacking, Defending, and a Gala: 3 Days at NECCDC 2016

After months of practice in preparation for the big competition, the Syracuse University National Collegiate Cyber Defense Competition Team, as a subset of the Information Security Club, was finally ready for the Northeast CCDC (NECCDC). Consisting of students from the School of Information Studies and the School of Engineering & Computer Science, the team members… Read the full article…