Category Archives: Safe Computing

Visit the SafeComputing site for more information. Report a security incident. Subscribe to the Safe Computing RSS feed.

“Coded Bias” watch event; Join experts for panel discussion afterwards

You are invited to a free, on-demand screening of the documentary film Coded Bias—available anytime from April 8 to 14 and a panel discussion of the film April 15. Coded Bias explores the fallout from an MIT Media Lab researcher’s discovery that facial recognition does not identify dark-skinned faces and women’s faces accurately. The film follows her journey to push for the first legislation in the U.S. to govern against bias in the algorithms.

U-M rolls out new eco-friendly workstations

By | April 1, 2021

The Michigan IT Steerage Committee is happy to announce a new, high-end desktop workstation for use in both the academic and medical center environments across the university.  Introducing the Future Object-Oriented Laptop, a brand-new technology designed to be more “green”—sustainable, biodegradable, and using fewer heavy metals and less electricity to create and to operate—than contemporary workstations. Included in… Read More »

U-M computer chip wins against 500+ hackers

By | March 29, 2021

MORPHEUS technology from the University of Michigan emerged unscathed from a DARPA virtual hackathon. An “unhackable” computer chip lived up to its name in its first bug bounty competition, foiling over 500 cybersecurity researchers who were offered tens of thousands of dollars to analyze it and three other secure processor technologies for vulnerabilities. MORPHEUS, developed by computer science… Read More »

U-M professor appointed to FDA medical device security post

By | February 10, 2021

There’s a good chance that your life will at some point depend on a piece of computer software. Lines of code drive pacemakers, insulin pumps, hospital imaging machines and just about every other electronic medical device that’s manufactured today. But where there’s software, there are hackers. And a steady stream of hospital ransomware attacks and other malicious activities… Read More »