Cybersecurity

Catharine McGhan, Engineering 101 GSI, introduces students to C++ in a CAEN Lab in the Pierpont Commons on North Campus in Ann Arbor, MI on March 12, 2013. Photo: Joseph Xu

Fake news detector algorithm works better than a human

System sniffs out fakes up to 76 percent of the time.|Medium Read
A close up of a computer chip

Intel processor vulnerability could put millions of PCs at risk

Patches can provide protection.|Medium Read
Undocumented phone security

Undocumented immigrants’ privacy at risk online, on phones

When it comes to their smartphones, immigrants struggle to apply instinctive caution, according to a study by a team of University of Michigan researchers.|Short Read
Mingyan Liu

Mingyan Liu named 2018 Distinguished University Innovator

New approach to enhancing cybersecurity through predicting cyber exploits.|Short Read
Quantum security

Building a security standard for a post-quantum future

A large quantum computer could retroactively decrypt almost all internet communication ever recorded.|Medium Read
Women using a smartphone in the display and technology advances in stores.

Fragmented US privacy rules leave large data loopholes for Facebook and others

Florian Schaub, assistant EECS professor, conducts research on personal privacy.|Medium Read
Facebook CEO Mark Zuckerberg seated at a table

Zuckerberg Capitol Hill testimony: Engineering experts offer comments

U-M profs weigh new business model, European-style regulation|Short Read
Halderman standing in front of voting machines

‘I hacked an election. So can the Russians.’

Professor Alex Halderman and the New York Times staged a mock election to demonstrate voting machine vulnerability. |Short Read
Dr. Isaac Porche receives award

Inaugural ECE Willie Hobbs Moore Alumni Lecture: Dr. Isaac R. Porche III

Porche discussed the changing definition of war and how information is playing a greater role than ever.|Medium Read
traffic jam

Michigan researchers discover vulnerabilities in next-generation connected vehicle technology

The vulnerability allows an attacker to manipulate a new intelligent traffic control algorithm and cause severe traffic jams.|Short Read
Matt Bernhard

CSE PhD student Matt Bernhard on the Facebook data breach

In this video, CSE PhD Student Matt Bernhard weighs in on the matter Facebook data harvesting, such as that done by Cambridge Analytica.|Short Read

Can sound be used as a weapon? 4 questions answered

What happened to people inside the U.S. Embassy in Havana?|Short Read