Tag Archives: security

U-M updates protection agreement with Piazza

ITS Teaching and Learning, working in conjunction with the U-M Office of the Vice President and General Counsel; the Office of the Vice President for Information Technology and Chief Information Officer; and Procurement Services, has secured a new data protection agreement in December with the online collaboration Q&A platform Piazza Technologies. Piazza Q&A, which has been available for… Read More »

5 tips to avoid online tax fraud

By | January 28, 2017

Criminals can file fraudulent tax returns in your name—and steal your tax refund. Last year, several U-M employees were among the many nationwide who were victimized by tax fraud. This year, we are already seeing phishing scams targeting W-2s. Information and Infrastructure Assurance (IIA) offers the following five tips to help you avoid online tax fraud: Practice safe computing by… Read More »

What to do if your U-M account is compromised

By | January 11, 2017

Have you noticed messages in your sent folder that you didn’t send? Did your co-workers receive strange emails from you? If so, your U-M account might be compromised, and you should take action immediately. Change your UMICH (Level-1) password For instructions and tips, see Choosing and Changing a Secure UMICH Password. You should also set new security questions… Read More »

Cleared for take-off

By | January 7, 2017

A U-M alum is striving to take the turbulence out of getting passengers to their planes on time. Caryn Seidman-Becker is CEO of CLEAR, which helps airline passengers at participating airports confirm their identity through biometric scanning of either their fingertip or iris. Customers sign up with CLEAR in advance and have their identification digitally authenticated. Then they… Read More »

Securing the IoT

By | December 15, 2016

After recent attacks threw the rampant insecurities of internet-connected cameras, video recorders, and other gadgets into sharp relief, Washington lawmakers and officials are urging tech firms to do more to secure the Internet of Things. At a House Energy and Commerce subcommittee hearing last month, lawmakers said the attacks raised national security concerns and questions about the need… Read More »

How to hack a human

By | December 15, 2016

A recent article published in Communications of the ACM examines the chronology of medical device security. The paper is the result of an interdisciplinary project, known as Trustworthy Health and Wellness, which is funded by the National Science Foundation. Peter Honeyman, U-M research professor of computer science and engineering, collaborated on the article. Learn more.

Exploiting vehicle electronics

By | December 15, 2016

The networked electronics found in modern vehicles provide many useful and cool benefits, such as fuel savings, parking assist, and collision avoidance. Most of these features involve passing data among vehicle systems and human drivers. This connectivity also offers hackers new potential exploits. According to research presented last month by U-M researchers Kyong-Tak Cho and Kang Shin at… Read More »

Smart homes vulnerable

By | December 15, 2016

An interview exploring the technology underlying home device security and the Internet of Things (IoT) was recently broadcasted by CBC Radio. Atul Prakash, professor of electrical engineering and computer science, spoke about why many IoT devices are vulnerable. “The technology is relatively new,” said Prakash. “Hardware is probably a little bit ahead of the software at this point,… Read More »

Bugged bugs

By | November 1, 2016

When Mark Zuckerberg posted a picture of himself on Facebook last June, a sharp-eyed observer spotted a piece of tape covering his laptop’s camera. The irony didn’t go unnoticed. Even those of us who don’t control large corporations have reason to be concerned about the next frontiers in surveillance. For example, today many security cameras are easy to… Read More »

Disrupting Democracy: How Technology is Influencing Elections

By | November 1, 2016

Tuesday, November 1; 6:30–7:30 p.m.; Michigan League Ballroom. Both U.S. presidential candidates have shared their thoughts and concerns that foreign actors may be taking steps to influence or disrupt the election. Join U-M Professor Alex Halderman (Computer Science & Engineering, EECS) and Professor Walter Mebane (Political Science, Statistics, LSA) in a panel moderated by Doug Tribou (host of… Read More »

IT security training

By | November 1, 2016

Michigan IT staff have asked for IT security training, and implementation of U-M’s revised information security program, as outlined in the proposed revision to the U-M IT Security Policy, depends on knowledgeable staff. IIA has purchased a limited number of seats in several Merit training courses throughout the 2016-17 academic year. U-M’s Cyber Security Training by Merit Professional… Read More »