Tag Archives: cybersecurity

Better protection for U-M networks

ITS began implementing components of a greatly enhanced network security threat detection and mitigation system in late June. This approach combines cutting edge technologies, open source tools, and U-M’s MITN threat intelligence framework to provide a security solution that scales across U-M networks. It will allow ITS to:  Detect and mitigate network threats across more U-M networks.  Extend… Read More »

Reveal short URLs, use them with caution

Shortened URLs, such as those from bit.ly and goo.gl, make it easy to type in a web address quickly but hard to tell where your web browser will actually take you. Before clicking a shortened URL, check for the full URL. Most URL shorteners—including those used at U-M—include a preview feature. In addition, there are several URL checkers… Read More »

Dearborn to offer masters program in cybersecurity

By | June 24, 2019

Just two years after starting its bachelors in cybersecurity, UM-Dearborn is already adding a masters program. Associate Professor of Computer and Information Science Di Ma says the fall debut of the M.S. in Cybersecurity and Information Assurance is being driven by student demand and the metro region’s big growth in the field — which saw a 400-percent spike in job… Read More »

Beware of tech support scams

Have you ever seen a pop-up on your computer or received an unsolicited call urging you to contact “tech support?” Scammers sometimes impersonate IT support staff and claim something is wrong with your computer. They offer to help fix the problem—for a fee—but instead may steal your personal information or infect your computer with malicious software. This can… Read More »

Tips for writing emails that don’t look phishy

You have an important university email to send, but how do you craft it so it looks like the official, trustworthy, communication it is? In other words, how do you keep people from thinking it is a phish? Email users are rightfully suspicious of unsolicited email, but that can sometimes cause them to ignore or delete your important,… Read More »

Teams practice IT security incident investigation

U-M staff members, and a number of other IT security pros from Domino’s, and Washtenaw Community College, honed their IT security investigation skills at a March 27 Boss of the SOC (Security Operations Center) event held at U-M and sponsored by the U-M Information Assurance office and Splunk. Working in teams of four to five, participants assumed the… Read More »

IA finds and fixes Shibboleth vulnerability

Imagine not being able to log in to your U-M GMail and Calendar—or Box at U-M, Canvas, and more. That might have been a risk if an attacker had exploited a previously unknown Shibboleth vulnerability. Within minutes, the attacker could have broadly disrupted logins at U-M and across higher education. Thankfully, that didn’t happen. While doing a routine… Read More »

Report: Top universities in U.S. targeted by Chinese hackers

By | March 14, 2019

U-M CIO Ravi Pendse was quoted in a recent article about how new cybersecurity intelligence suggests that Chinese hackers are ramping up their efforts to steal military research secrets from U.S. universities. According to a report in “The Wall Street Journal,” Chinese hackers targeted institutions and researchers with expertise in undersea technology as part of a coordinated cybercampaign… Read More »

Election security: Halderman recommends actions to ensure integrity of U.S. systems

By | March 6, 2019

J. Alex Halderman, a U-M professor of computer science and engineering, testified on February 27 in front of the US House Appropriations Subcommittee on Financial Service and General Government, urging lawmakers to approve additional funding for election cybersecurity prior to the upcoming 2020 elections. Halderman described the need as critical, citing two years of investigation by Congress and… Read More »

Cryptocurrency mining risks and U-M restrictions

You may not use U-M resources—computers, networks, electricity—for cryptocurrency mining. Such use violates university policy and puts U-M services and data, and your personal accounts and devices, at risk. The Responsible Use of Information Resources (SPG 601.07) policy states that U-M resources may not be used “for personal commercial purposes or for personal financial or other gain.” The… Read More »

Protecting medical devices from cybersecurity threats

Medical devices capable of transmitting health information and connecting to Michigan Medicine’s networks offer improvements to the effective delivery of patient care, but they also may introduce privacy and security concerns. Michigan Medicine’s Information Assurance (IA) program has been raising awareness of these concerns and developing new approaches to address these vulnerabilities. As a major step, Michigan Medicine… Read More »

A secure future for US elections starts in the classroom

By | November 9, 2018

Voting machines have largely replaced paper ballots – but many of these machines are susceptible to errors, manipulation, or hacking, raising concerns about the integrity of election results. Professor J. Alex Halderman has been at the forefront of exposing vulnerabilities in electronic voting systems around the world. By pointing to root causes behind these shortcomings, he hopes to… Read More »

U-M experts figure prominently in election coverage

In the run-up to the 2018 midterm elections, concerns about hacking, transparency, and the influence of “fake news” on election outcomes garnered unprecedented coverage by news organizations. Both national and local media often reached out to U-M experts in cybersecurity, social media, and data analysis to provide perspective, interpret research, and explain the challenges of our current electoral… Read More »