Cybersecurity

More Cybersecurity News
Portrait of Porche

The art of cyber war with Isaac Porche

Porche shares the global state of cyber warfare, and how his time at Michigan led him to the front lines.|Long Read

An armed robber’s Supreme Court case could affect all Americans’ digital privacy for decades to come

How much can your cellphone reveal about where you go?|Medium Read
Prof. Kevin Fu

Kevin Fu Elected IEEE Fellow for Contributions to Embedded and Medical Device Security

Prof. Fu was named an IEEE Fellow, Class of 2018, "for contributions to embedded and medical device security."|Medium Read
Prof. Chris Peikert

Chris Peikert Receives TCC Test of Time Award for work in lattice cryptography

Prof. Peikert and his co-author received the award at the Fifteenth Theory of Cryptography Conference for their paper on efficient collision-resistant hashing on cyclic lattices.|Short Read

A plan for defending US manufacturers from cyberattacks

In The Hill, Sridhar Kota discusses how the manufacturing sector is increasingly interwoven with information technology and the Internet of Things. |Medium Read

Wearables to boost security of voice-based log-in

Sound is easy to spoof. New technology could help close this ‘open’ channel.|Medium Read
Dr. S. Shankar Sastry speaks before an audience.

Technology innovation for the most pressing problems of society

S. Shankar Sastry, Dean and Roy W. Carlson Professor of Engineering at the University of California at Berkeley delivers the The 2017 Michael Korybalski Distinguished Lecture.|Short Read
Two people review information on a clipboard

Nobody reads privacy policies – here’s how to fix that

Florian Schaub discusses turning privacy notices into something useful for consumers.|Medium Read
Kevin Fu

Kevin Fu recognized with Regents’ Award for Distinguished Public Service

Kevin Fu has been recognized for informing policy makers and Congress about issues in computer security.|Medium Read

Manos Kapritsos and collaborators win USENIX security paper award

Their paper introduces a new programming language and tool called Vale that supports flexible, automated verification of high-performance assembly code.|Short Read

Prof. J. Alex Halderman testifies in front of senate intelligence committee on secure elections

His remarks focused on vulnerabilities in the US voting system and a policy agenda for securing the system against the threat of hacking.|Short Read
Key locks into a phone

Smartphone security hole

‘Open port’ backdoors are common.|Short Read