Skip to Main content Open mobile menu Close mobile menu
CSE PhD student Matt Bernhard on the Facebook data breach
  1. CSE PhD student Matt Bernhard on the Facebook data breach

    In this video, CSE PhD Student Matt Bernhard weighs in on the matter Facebook data harvesting, such as that done by Cambridge Analytica.

    The post CSE PhD student Matt Bernhard on the Facebook data breach appeared first on Michigan Engineering News.

  2. Cuba ‘sonic attacks’: A covert accident?

    ‘We’ve demonstrated a scenario in which the harm might have been unintentional.’

    The post Cuba ‘sonic attacks’: A covert accident? appeared first on Michigan Engineering News.

  3. Internet-scanning U-M startup offers new approach to cybersecurity

    Censys is the first commercially available internet-wide scanning tool. It helps IT experts to secure large networks with a constantly changing array of devices.

    The post Internet-scanning U-M startup offers new approach to cybersecurity appeared first on Michigan Engineering News.

  4. Cybersecurity in self-driving cars: U-M releases threat identification tool

    Mcity report gives new insights into automated vehicle vulnerabilities

    The post Cybersecurity in self-driving cars: U-M releases threat identification tool appeared first on Michigan Engineering News.

  5. Unhackable computer under development with $3.6M DARPA grant

    The researchers say they’re making an unsolvable puzzle: ‘It’s like if you’re solving a Rubik’s Cube and every time you blink, I rearrange it.’

    The post Unhackable computer under development with $3.6M DARPA grant appeared first on Michigan Engineering News.

  6. Technology innovation for the most pressing problems of society

    S. Shankar Sastry, Dean and Roy W. Carlson Professor of Engineering at the University of California at Berkeley delivers the The 2017 Michael Korybalski Distinguished Lecture.

    The post Technology innovation for the most pressing problems of society appeared first on Michigan Engineering News.

  7. Wearables to boost security of voice-based log-in

    Sound is easy to spoof. New technology could help close this ‘open’ channel.

    The post Wearables to boost security of voice-based log-in appeared first on Michigan Engineering News.

  8. Smartphone security hole

    ‘Open port’ backdoors are common.

    The post Smartphone security hole appeared first on Michigan Engineering News.

  9. Courage to Resist

    In the escalating struggle between the individual and the state, technology favors the powerful. That’s why this Michigan computer scientist and his team of researchers revel in righting the balance.

    The post Courage to Resist appeared first on Michigan Engineering News.

  10. Sonic cyber attacks show security holes in ubiquitous sensors

    Michigan Engineering researchers discuss and demonstrate the sound-based attacks they leveled at the accelerometers found in everyday electronics.

    The post Sonic cyber attacks show security holes in ubiquitous sensors appeared first on Michigan Engineering News.