News

In the 2012 Emerging Cyber Threats Report, Georgia Tech researchers name three cyber attacks likely to be most prevalent in the coming year, targeting Internet search engines, smartphones and individual computers. Source: WYFF Greenville

Visit Website

ATLANTA – Nov. 8, 2011 – Researchers from the Georgia Tech College of Computing, working in partnership with the Centers for Disease Control and Prevention (CDC), have developed a digital data tracking system to assist low-resource clinical laboratories in developing countries. Source: Office of Communications

Technology is rapidly commoditizing the information that's disseminated in college courses, says Rich DeMillo (Computer Science). "If you can easily access a lecture in quantum mechanics from the best lecturer on quantum mechanics, how many other quantum mechanics lectures do you need?" It's the intellectual discussion of these facts where professors add value, he says. Source: The New York Times

Visit Website

"By a large majority," says Rich DeMillo (Computer Science), "the American public thinks that it’s not getting value for the tuition dollar. It thinks that universities are not doing a good job." DeMillo is director of the Center for 21st Century Universities and author of the new book, Abelard to Apple: The Fate of American Colleges and Universities. Source: Lawlor Review

Visit Website

Researchers led by Patrick Traynor (Computer Science) have shown how placing a phone on a desk could allow its accelerometer to detect the vibrations from key presses on a nearby keyboard and pick out words with an accuracy of up to 80%. Source: InformationWeek

Visit Website

The United States could soon face a "crash" of student loan defaults, says Rich DeMillo (Computer Science), director of the Center for 21st Century Universities. "Students are going to be coming out of school with diplomas and not necessarily able to recover the value they put into their degrees." (video) Source: Fox Business Channel

Visit Website

What broadband users need is a connectivity thermostat that they can use to better manage how they access their ISP’s pipes. At a recent conference Nick Feamster (Computer Science) described Project Bismark, an effort to help users manage their bandwidth caps and allocate broadband resources inside the home. Source: GigaOM

Visit Website

According to Patrick Traynor (Computer Science), a stranger's smartphone could potentially pick up data typed into a nearby laptop computer by using the phone's accelerometer to detect vibrations produced by typing. Source: Examiner

Visit Website

The attack using a smartphone's accelerometer attempts to predict keystrokes in pairs, says Patrick Traynor (Computer Science), using the distance between keys and their position on the keyboard as hints for a custom dictionary. As long as the word is longer than two letters, the system has a good chance of detecting what’s been pressed. Source: Gizmodo

Visit Website

How worried should you be that the phone sitting near your desktop is conspiring against you? Not too much--the chances of becoming a victim of this type of advanced attack are slim, for now. "This was really hard to do," said Patrick Traynor (Computer Science). "But could people do it if they really wanted to? We think yes." Source: MSNBC

Visit Website