TRUST in the News

News items about the team for Research in Ubiquitous Secure Technology (TRUST)

Thursday, April 21, 2016

TRUST researcher Deirde Mulligan receives IAPP Privacy Leadership Award

›
TRUST researcher Deirdre Mulligan has been awarded the prestigious  IAPP Privacy Leadership Award for 2016, along with Professor Kenneth Ba...
Wednesday, November 25, 2015

Former TRUST REU Student Wins Silver Award in ACM Research Competition for Undergrads

›
Luther Martin, a NERSC Student Assistant via the UC Berkeley TRUST-REU program, won the silver award in the ACM Student Research Competit...
Tuesday, November 24, 2015

Former TRUST REU Student to Participate in FTC conference on Privacy and Technology

›
Ibrahim Altaweel, a participant in the TRUST Center’s 2014REU program , has been selected to present research at PrivacyCon , a conference ...
Tuesday, August 25, 2015

Stanford to Offer Course in CryptoCurrency

›
As part of its new graduate certificate program in cybersecurity, Stanford University is offering a course titled, “Crypto Currencies: Bit...
Wednesday, August 12, 2015

Summer Camp for Cybersecurity

›
High school students in the San Francisco Bay Area had a special opportunity to learn more about cybersecurity this summer, thanks to CYBEAR...
Tuesday, March 31, 2015

TRUST Researcher Dan Boneh to Receive 2014 ACM-Infosys Foundation Award

›
The Association for Computing Machinery (ACM) has named TRUST researcher Dan Boneh the recipient of the 2014 ACM-Infosys FoundationAwar...
Thursday, February 05, 2015

Have You Read Your Privacy Policy?

›
If you’re like most people, you probably haven’t read a word of the many privacy policies encountered online. And, as TRUST researche...
Thursday, December 04, 2014

San Jose State Designated Cyber Security Center of Excellence

›
TRUST Center partner institution San Jose State University was recently designated a National Center of Academic Excellence in Information...
Tuesday, November 25, 2014

Best Paper Award for TRUST Medical Informatics Research

›
The work of TRUST researchers at Vanderbilt University and their colleagues was recognized at the American Medical Informatics Association ...
Wednesday, September 24, 2014

Password Managers Pose Security Risk

›
Password managers may not be as effective as you think. While these tools provide convenience and (ostensibly) peace of mind, a recently rel...
Wednesday, July 16, 2014

Privacy Can Be Good for Business

›
These days, most consumers are not surprised to learn that their online browsing habits or personal cell phone usage are mined by companies ...
Tuesday, April 15, 2014

Is the Internet Our Friend?

›
Just how safe is the Internet? TRUST researcher Nicolas Christin  was one of the participants who explored this question in a debate and pa...
Friday, March 14, 2014

Few clues found in collapse of Mt. Gox bitcoin exchange

›
Despite online sleuthing and crowdsourcing, it is unlikely that those who suffered losses when bitcoin exchange Mt. Gox was hacked will be a...
Tuesday, December 17, 2013

SJSU Establishes Center for Cyber Security and Big Data Studies

›
TRUST partner institution San Jose State announced the establishment of a new  Center for Cyber Security and Big Data Studies , to be led ...
Thursday, November 14, 2013

Studying Wiretaps to Big Data - Cornell moves into the MOOC world

›
TRUST researcher Prof. Steve Wicker of Cornell University will be teaching one of Cornell's first Massive Open Online Courses (MOOC) b...
Thursday, October 17, 2013

Online Hackers Beware: GOTCHA!

›
Worried about the robustness of the ubiquitous CAPTCHA in preventing online attacks? TRUST researchers Jeremiah Blocki , Manuel Blum , and ...
Saturday, October 12, 2013

"Fingerprinting" of Mobile Devices

›
A team led by TRUST researcher and Stanford computer science Professor Dan Boneh has identified a method of effectively "fingerprint...
Thursday, October 03, 2013

Online privacy concerns growing

›
There's a privacy arms race under way online, a continuing struggle among consumers, Internet companies, advocates and policymakers to a...
Wednesday, October 02, 2013

Your Digital Trail: Private Company Access

›
As the second story in a four-part series examining one's digital trail and who potentially has access to it, NPR broadcast this episod...

Researchers explore underground market of Twitter spam and abuse

›
Data presented at the 22nd USENIX Security Symposium by researchers at ICSI (International Computer Science Institute)from a project explori...

Wiretap Extension Will Help Crooks & Terrorists

›
By extending the existing US wiretap laws to give federal agencies easier backdoor access to Internet Communications, the country's enem...
Monday, December 17, 2012

2013 Summer Program Applications Now Open

›
The TRUST REU is a nine-week summer residential program that offers rising juniors and seniors in computer science or electrical engineerin...
Wednesday, September 26, 2012

NSF Awards $10 Million Grant to ICSI and Collaborators to Study Human Element of Cybercrime

›
The International Computer Science Institute ( ICSI ), along with the University of California, San Diego and George Mason University have r...
Tuesday, June 12, 2012

Johannes Gerke of Cornell University wins IEEE Award

›
Johannes Gerke , computer science professor at Cornell University, is one of 14 prominent technologists to be honored at the IEEE Computer S...
Thursday, May 03, 2012

How Al Qaeda Hid Secrets in a Video

›
A May 1, 2012 Discovery News article, " How Al Qaeda Hid Secrets In a Porn Video " discusses using steganography to hide document...
Wednesday, April 18, 2012

Secretary Of Homeland Security Speaks At San Jose State

›
On April 16th, Professor and TRUST campus Principal Investigator at San Jose State University Sigurd Meldal participated in hosting a visit...
Saturday, February 25, 2012

Web Firms to Adopt 'No Track' Button.

›
Support for a do-not-track button by a coalition of Internet giants, including Google, has emerged as part of the White House's call for...
Saturday, January 21, 2012

Internet is still vulnerable to cyber-criminals

›
A January 21, 2012 San Francisco Chronicle article " Internet is still vulnerable to cyber-criminals " by James Temple discusses M...
Tuesday, December 13, 2011

Android apps and advertising: A bit too cozy

›
A Tech Republic blog entry " Android apps and advertising: A bit too cozy " features the research of TRUST Ph.D. student Adrienne ...
Monday, December 05, 2011

Carrier IQ cell phone monitor software is a nightmare

›
TRUST Professor Stephen Wicker was quoted in a NetworkWorld article, " Cornell Prof: Carrier IQ affair 'my worst nightmare' ...
Wednesday, October 05, 2011

White House Honors Cornell's Salman Avestimehr with PECASE

›
TRUST investigator and Cornell Professor Salman Avestimehr was named a recipient of the Presidential Early Career Award for Scientists and ...
Tuesday, August 09, 2011

"The Science of Cyber Security"

›
US News and World Report's article, " The Science of Cyber Security " by Marlene Cimons gives an overview of the Team for Res...

Erika Chin: "Seven ways to hang yourself with Google Android"

›
The research work of Erika Chin , an EECS graduate student studying smartphone security was featured in a Consumer Reports online magazine a...
Monday, June 13, 2011

Stanford's Dan Boneh Receives Dean's Award for Industry Education Innovation

›
TRUST researcher and Stanford University Professor Dan Boneh was awarded the School of Engineering Dean's Award for Industry Education ...
Friday, June 10, 2011

TRUST Researchers to Lead Intel Security Center

›
Intel Labs announced the creation of the Intel Science and Technology Center for Secure Computing (ISTCSC) to be led by UC Berkeley with pa...
Friday, June 03, 2011

Audio Captchas defeated

›
Stanford Professor John Mitchell , postdoctoral research Elie Bursztein and their colleagues have developed a way to defeat the audio versi...
Friday, April 22, 2011

Stephen Wicker on iOS user privacy

›
Professor Stephen Wicker was quoted in Network World's article " Cornell prof warns iPhone, iPad users: "We're selling ou...
Saturday, February 26, 2011

Doug Tygar on the LinkedIn outage in China

›
Bloomberg's February 25, 2011 article " LinkedIn Service Is Restored in Beijing After `Jasmine' 24-Hour Disruption " discu...
Wednesday, February 23, 2011

Cornell's Hakim Weatherspoon Awarded Sloan Fellowship

›
TRUST investigator and Cornell University Prof. Hakim Weatherspoon was named a recipient of the 2011 Sloan Research Fellowship of the Alfr...
Tuesday, January 18, 2011

Car Theft by Antenna

›
According to new research to be presented at the Network and Distributed System Security Symposium next month in San Diego, California, car...
Friday, January 07, 2011

Commerce announces new shop to oversee online security

›
NextGov.com's article " Commerce announces new shop to oversee online security " covers Commerce Secretary Gary Locke's ...
Tuesday, November 16, 2010

White House Honors Vanderbilt's Bradley Malin

›
TRUST investigator and Vanderbilt University Professor Bradley Malin was named a recipient of the Presidential Early Career Award for Scien...
Thursday, October 21, 2010

"Fabric" To Weave Security into Code

›
Cornell computer science faculty, Fred Schneider and Andrew Meyers are developing a new computer platform, dubbed Fabric , that offers a wa...
Wednesday, September 29, 2010

UC Berkeley's Dawn Song Awarded MacArthur Fellowship

›
TRUST researcher and UC Berkeley Professor Dawn Song was named a 2010 MacArthur Fellow by the John D. and Catherine T. MacArthur Foundatio...
Tuesday, September 21, 2010

TRUST Autumn 2010 Conference: Nov. 10-11, 2010

›
The next TRUST Conference will be held November 10-11, 2010 at the Jen-Hsun Huang Engineering Center on the campus of Stanford University ....
Monday, September 20, 2010

WSJ: "J.P. Morgan Wrestles Web Snarl

›
UC Berkeley Professor Doug Tygar was quoted in a September 15, 2010 Wall Street Journal website article, " J.P. Morgan Wrestles Web Sn...
Wednesday, August 18, 2010

UC Berkeley's Pamela Samuelson wins IP3 Award

›
UC Berkeley Law Professor and renowned scholar Pamela Samuelson is one of four winners of this year's IP3 Award from the Washington-bas...
Tuesday, August 10, 2010

Web add-ons compromise 'private browsing'

›
A study by Dan Boneh of Stanford University claims that many browser add-ons or website security measures stop the 'private browsing...
Monday, June 28, 2010

Patents seen as low priority for software firms

›
Tom Abate's San Francisco Chronicle article, " Patents seen as low priority for software firms " discusses the paper written b...
Monday, May 31, 2010

Vanderbilt medical researchers, engineers play major role in new national center established to secure the privacy of electronic health information

›
The Vanderbilt University News Network released an article on Friday announcing the $15 million awarded to create a new center for health in...
Thursday, May 20, 2010

Andrew Myers net radio interview: "Build security into applications"

›
Cornell Associate Professor Andrew Myers was interviewed on FederalNewsRadio about " Build security into applications ": "Hi...
Tuesday, April 13, 2010

Keeping Medical Data Private

›
Researchers at Vanderbilt University have developed an algorithm that simultaneously protects privacy of patients while allowing medical rec...
Monday, April 12, 2010

Loose Clicks Sink Ships

›
Since it is possible to analyze audio recordings of keystrokes, computer scientists have been able to reconstruct accurate transcripts of wh...
Friday, April 09, 2010

"How Lenders Overlook the Warning Signs of ID Theft"

›
Brad Stone's NY Times Blog entry " How Lenders Overlook the Warning Signs of ID Theft " discusses Chris Hoofnagle's paper...
Thursday, April 01, 2010

'MULE' Prototype Uses Location for Authentication

›
Researchers at CMU (Carnegie Mellon University) have constructed a location-based encryption model for protecting data in lost or stolen lap...
Tuesday, February 09, 2010

Security flaw exposed on Home Shopping Network

›
When a possible security flaw exposing customers of a large television shopping network to credit card fraud was encountered by a user, ABC...
›
Home
View web version

Contributors

  • Carolyn Winter
  • Christopher Brooks
  • Larry Rohrbough
  • Mary Stewart
  • Unknown
Powered by Blogger.