Cybersecurity

More Cybersecurity News
Matt Bernhard

CSE PhD student Matt Bernhard on the Facebook data breach

In this video, CSE PhD Student Matt Bernhard weighs in on the matter Facebook data harvesting, such as that done by Cambridge Analytica.|Short Read

Can sound be used as a weapon? 4 questions answered

What happened to people inside the U.S. Embassy in Havana?|Short Read

Cuba ‘sonic attacks’: A covert accident?

‘We've demonstrated a scenario in which the harm might have been unintentional.’|Short Read
Alex Halderman and two others talking in front of a computer screen

Internet-scanning U-M startup offers new approach to cybersecurity

Censys is the first commercially available internet-wide scanning tool. It helps IT experts to secure large networks with a constantly changing array of devices.|Medium Read
a graphic showing three cars connected through identification tech

Cybersecurity in self-driving cars: U-M releases threat identification tool

Mcity report gives new insights into automated vehicle vulnerabilities|Medium Read

Unhackable computer under development with $3.6M DARPA grant

The researchers say they're making an unsolvable puzzle: 'It's like if you're solving a Rubik's Cube and every time you blink, I rearrange it.'|Medium Read
Portrait of Porche

The art of cyber war with Isaac Porche

Porche shares the global state of cyber warfare, and how his time at Michigan led him to the front lines.|Long Read

An armed robber’s Supreme Court case could affect all Americans’ digital privacy for decades to come

How much can your cellphone reveal about where you go?|Medium Read
Prof. Kevin Fu

Kevin Fu Elected IEEE Fellow for Contributions to Embedded and Medical Device Security

Prof. Fu was named an IEEE Fellow, Class of 2018, "for contributions to embedded and medical device security."|Medium Read
Prof. Chris Peikert

Chris Peikert Receives TCC Test of Time Award for work in lattice cryptography

Prof. Peikert and his co-author received the award at the Fifteenth Theory of Cryptography Conference for their paper on efficient collision-resistant hashing on cyclic lattices.|Short Read

A plan for defending US manufacturers from cyberattacks

In The Hill, Sridhar Kota discusses how the manufacturing sector is increasingly interwoven with information technology and the Internet of Things. |Medium Read

Wearables to boost security of voice-based log-in

Sound is easy to spoof. New technology could help close this ‘open’ channel.|Medium Read