News

Georgia Tech student Vivian Stepp and faculty member Julie Champion will spend Friday, December 9, at the White House as part of the Obama Administration’s “Champions of Change” roundtable event.

Embedded smartphone software that logs users' keystokes, text messages and other data to send back to the carrier? "Not kosher," says Georgia Tech Information Security Center Director Mustaque Ahamad (Computer Science). Source: The New York Times

Visit Website

The College's Center for 21st Century Universities is taking the long view--as in, the next 100 years--of higher ed. "While technology is not the only enabler of change in higher education," says Director Rich DeMillo (Computer Science), "it is on the critical path to all foreseeable change." Source: Education-Portal.com

Visit Website

A new cyber security bill before the House of Representatives aimed at facilitating the sharing of information between government and the private sector addresses longstanding concerns that such sharing is a one-way street, says Paul Royal (Computer Science), adding that the government historically has been a "black hole of information." Source: Government Computer News

Visit Website

David Dagon (Computer Science) is co-author of a Sandia National Labs report arguing that the Stop Online Privacy Act currently before the House of Representatives could particularly hinder security improvements to the Internet's domain name system. Source: CNET

Visit Website

"Universities do not like to dwell on their value," writes Rich DeMillo (Computer Science), author of Abelard to Apple: The Fate of American Colleges and Universities. "There are many who try to cast any such discussion as the opening volley of a holy war between true academicians and infidels who would sacrifice noble pursuits for economic gain." Source: The Guardian

Visit Website

“Malicious functionality might do things like steal your credentials--we call it spyware,” says Jon Giffin (Computer Science). “It might spy on the password you are typing into a browser. It might ... turn on a microphone so your cell phone now becomes a bug that's transmitting an audio signal to the attacker." (video) Source: WAGA

Visit Website

“When people start attacking infrastructure, it creates the potential for a rogue version of the Internet,” says David Dagon (Computer Science), who assisted U.S. law enforcement in breaking up an Internet advertising scam originating out of Eastern Europe. Source: The New York Times

Visit Website

In the 2012 Emerging Cyber Threats Report, Georgia Tech researchers name three cyber attacks likely to be most prevalent in the coming year, targeting Internet search engines, smartphones and individual computers. Source: WYFF Greenville

Visit Website

ATLANTA – Nov. 8, 2011 – Researchers from the Georgia Tech College of Computing, working in partnership with the Centers for Disease Control and Prevention (CDC), have developed a digital data tracking system to assist low-resource clinical laboratories in developing countries. Source: Office of Communications