Cybersecurity

More Cybersecurity News

Emotion recognition has a privacy problem – here’s how to fix it

Researchers have demonstrated the ability to “unlearn” sensitive identifying data from audio used to train machine learning models|Short Read

$1M grant to develop secure, high-capacity research network at U-M

The team will develop a secure, data-intensive network solution to effectively transport extremely high volumes of research network traffic.|Short Read
Voting machines at library

Not enough voters detecting ballot errors and potential hacks, study finds

Researchers carried out the first study on voter behavior with electronic assistive devices, found 93% missed incorrect ballots.|Short Read

New simulation laboratory and cybersecurity software installed at NERS

The software will be used to study methods of preventing cyberattacks on the instrumentation and control systems for nuclear power plants. |Medium Read

Researchers design new solution to widespread side-channel attacks

The proposal provides a chip-level safeguard against sensitive data being transmitted after it’s accessed.|Medium Read
Alex Halderman

How Let’s Encrypt doubled the percentage of secure websites in four years

A Q&A with J. Alex Halderman, who co-founded the nonprofit organization.|Medium Read
Laser on Google Home

A laser pointer could hack your voice-controlled virtual assistant

Researchers identified a vulnerability that allows a microphone to 'unwittingly listen to light as if it were sound'|Medium Read
Roya Ensafi, CSE Research Assistant Professor, uses her computing system, Censored Planet. Photo: Joseph Xu

How Russia’s online censorship could jeopardize internet freedom worldwide

The nation is using inexpensive commodity equipment to block 170K domains on more than 1K privately-owned ISPs.|Medium Read
Laser on Google Home

Researchers take control of Siri, Alexa, and Google Home with lasers

The newly discovered microphone vulnerability allows attackers to remotely inject inaudible and invisible commands into voice assistants using light.|Medium Read

Offensive vehicle security toolbox makes car hacking easier

The new system is designed to save security researchers time and effort spent reverse-engineering the message format of every vehicle they study.|Short Read
Conjure logo

New tool combats evolving internet censorship methods

Technology pioneered by Michigan researchers has made a promising advance toward widespread adoption|Short Read

Remote attack on temperature sensors threatens safety in incubators and industry

The researchers demonstrated that an adversary could remotely manipulate the temperature sensor measurements without tampering with the targeted system or triggering automatic temperature alarms.|Short Read