Security

featured Security stories
Undocumented phone security

Undocumented immigrants’ privacy at risk online, on phones

When it comes to their smartphones, immigrants struggle to apply instinctive caution, according to a study by a team of University of Michigan researchers.|Short Read
Quantum security

Building a security standard for a post-quantum future

A large quantum computer could retroactively decrypt almost all internet communication ever recorded.|Medium Read
Abstract lines connecting in space

$6.25M MURI project will decode world’s most complex networks

New tools could fight crime, protect financial system|Medium Read
Facebook CEO Mark Zuckerberg seated at a table

Zuckerberg Capitol Hill testimony: Engineering experts offer comments

U-M profs weigh new business model, European-style regulation|Short Read
Halderman standing in front of voting machines

‘I hacked an election. So can the Russians.’

Professor Alex Halderman and the New York Times staged a mock election to demonstrate voting machine vulnerability. |Short Read
Exterior view of the Boulby site

Nuclear nonproliferation: U-M participates in project monitoring nuclear reactors from afar

Secret nuclear power reactors could be detected by capturing elusive antineutrinos.|Medium Read
Matt Bernhard

CSE PhD student Matt Bernhard on the Facebook data breach

In this video, CSE PhD Student Matt Bernhard weighs in on the matter Facebook data harvesting, such as that done by Cambridge Analytica.|Short Read

Sara Pozzi featured in nuclear nonproliferation podcast

Listen to Sara Pozzi and colleagues at Oregon State discuss nuclear nonproliferation today and technologies on the horizon.|Short Read

Can sound be used as a weapon? 4 questions answered

What happened to people inside the U.S. Embassy in Havana?|Short Read

Cuba ‘sonic attacks’: A covert accident?

‘We've demonstrated a scenario in which the harm might have been unintentional.’|Short Read

Internet-scanning U-M startup offers new approach to cybersecurity

Censys is the first commercially available internet-wide scanning tool. It helps IT experts to secure large networks with a constantly changing array of devices.|Medium Read

Cybersecurity in self-driving cars: U-M releases threat identification tool

Mcity report gives new insights into automated vehicle vulnerabilities|Medium Read