News

"By a large majority," says Rich DeMillo (Computer Science), "the American public thinks that it’s not getting value for the tuition dollar. It thinks that universities are not doing a good job." DeMillo is director of the Center for 21st Century Universities and author of the new book, Abelard to Apple: The Fate of American Colleges and Universities. Source: Lawlor Review

Visit Website

Researchers led by Patrick Traynor (Computer Science) have shown how placing a phone on a desk could allow its accelerometer to detect the vibrations from key presses on a nearby keyboard and pick out words with an accuracy of up to 80%. Source: InformationWeek

Visit Website

The United States could soon face a "crash" of student loan defaults, says Rich DeMillo (Computer Science), director of the Center for 21st Century Universities. "Students are going to be coming out of school with diplomas and not necessarily able to recover the value they put into their degrees." (video) Source: Fox Business Channel

Visit Website

What broadband users need is a connectivity thermostat that they can use to better manage how they access their ISP’s pipes. At a recent conference Nick Feamster (Computer Science) described Project Bismark, an effort to help users manage their bandwidth caps and allocate broadband resources inside the home. Source: GigaOM

Visit Website

According to Patrick Traynor (Computer Science), a stranger's smartphone could potentially pick up data typed into a nearby laptop computer by using the phone's accelerometer to detect vibrations produced by typing. Source: Examiner

Visit Website

The attack using a smartphone's accelerometer attempts to predict keystrokes in pairs, says Patrick Traynor (Computer Science), using the distance between keys and their position on the keyboard as hints for a custom dictionary. As long as the word is longer than two letters, the system has a good chance of detecting what’s been pressed. Source: Gizmodo

Visit Website

How worried should you be that the phone sitting near your desktop is conspiring against you? Not too much--the chances of becoming a victim of this type of advanced attack are slim, for now. "This was really hard to do," said Patrick Traynor (Computer Science). "But could people do it if they really wanted to? We think yes." Source: MSNBC

Visit Website

In his presentation at this week's Open Network Summit in San Francisco, Nick Feamster (Computer Science) said the simplicity enabled by OpenFlow and software-defined networks can be used to make more powerful and easier-to-use network management tools. Source: Network World

Visit Website

You sit down at your desk, set down your mobile phone, boot your computer and then start work. Would it occur to you that a hacker might be using your smartphone as a spying device to track what you were typing? Source: ComputerWorld

Visit Website

As you logged into your favorite blog to write a comment this morning, think about where your smartphone was sitting. Was it next to your keyboard? If so, a hacker could have used it to track and decipher every word of your insightful anonymous commentary. Source: Popular Science

Visit Website