Link shortening services can reduce URLs to 10-30 characters. Be mindful of the fact that the link shortening process masks the true destination URL and shortened URLs are often used by scammers to trick users into clicking malicious links. Stay safe by verifying the destination of shortened URLs.
At Your Service
Learn to Spot a Phony
Phone scams are a type of social engineering scam in which someone seek to trick often busy recipients into disclosing sensitive information or providing seemingly harmless responses to questions. This article reviews some of the common phone scams and provides recommendations and best practices.
Spend Your Summer at ITP Camp
ITP Camp is a four-week evening and weekend program that offers professionals and students a chance to get their feet wet with cutting-edge technologies. The emphasis is on using technology to turn ideas into reality, and encouraging students to create physical representations of their ideas.
Building an ePortfolio with NYU Web Publishing
Their ePortfolio program at Gallatin allows students to document and digitally showcase their work and experiences and prepare for their senior colloquium. Gallatin envisioned a space where students could create a digital scrapbook of their achievements.
Phishing, Spear Phishing, and Whaling
Email has become the most common avenue for phishing scams, which use social engineering to take advantage of users. Variations of phishing, each with different characteristics, include spear phishing and whaling. Learn how to spot these emails and how you can avoid enabling them to steal your data.
Capturing a Face
Bjork has long been interested in the intersection of technology and nature. In June of 2016, Bjork appeared onstage at the Tokyo Miraikan Museum wearing a mask designed and printed by professor Neri Oxman at MIT’s Mediated Matter Lab based on 3D scans of Bjork done at NYU’s LaGuardia Studio.
Ransomware Scams
Ransomware tricks users into installing itself on their devices. Ransomware scams most commonly occur via email social engineering scams, a/k/a phishing scams. In ransomware attacks, malware encrypts a user’s files and requests ransom payment to unlock the files and restore encrypted content.
Under Lock and Passphrase
When it comes to passwords for your various online accounts and services, a best practice is to use a unique password for each. After all, if passwords are shared between accounts and one is compromised, it creates a security risk for other accounts with the same password. It can also be very difficult to remember increasing numbers of strong passwords, many of which are required to contain special characters and capitalized letters.
Creativity at the LaGuardia Co-op
The Laguardia Co-op is the flagship location of NYU’s three Student Technology Centers, located at the heart of the Washington Square campus. The Co-op facility is an experimental take on a traditional computer lab experience. With the tagline “Connect & Create,” students from different schools across NYU can use the Co-op collaborate as a group or work individually.
Figuring Out Fair Use with the Libraries
As NYU faculty work through the summer to prepare their course materials for the fall semester, it is important to keep in mind the ways in which fair use can be used to provide research materials to students.