Skip to main content
Email Print Share

Filter News by News Type and Research Area. Get News Updates by Email or by RSS.

Trustworthy Computing - News

Showing: 1-28 of 28

image of a person wearing a smartwatch July 6, 2016
Your smartwatch is giving away your ATM PIN
News From the Field
privacy assistant app July 6, 2016
It's automatic: CMU smartphone app manages your privacy preferences
News From the Field
a person wearing a smart watch July 6, 2016
Did your smart watch & fitness tracker just give away your PIN?
News From the Field
image of electrical grids February 29, 2016
Device 'fingerprints' could help protect power grid, other industrial systems
News From the Field
student texting in the classroom July 7, 2015
Smartphones may be detrimental to learning process
News From the Field
screenshot from a video game May 20, 2015
Researchers help video gamers play in the cloud without guzzling gigabytes
News From the Field
the three devices the researchers examined November 10, 2014
Wireless devices used by casual pilots vulnerable to hacking, computer scientists find
News From the Field
Daphne Yao June 4, 2014
New proactive approach unveiled to detect malware in networked computers and data
News From the Field
computing graphic May 21, 2014
Carnegie Mellon, Microsoft Research automate privacy compliance for big data systems
News From the Field
computing graphic March 19, 2014
Parents should try to find middle ground to keep teens safe online
News From the Field
bitcoins February 26, 2014
Using stolen computer processing cycles to mine Bitcoin
News From the Field
image of an inkblot November 7, 2013
Carnegie Mellon researchers use inkblots to improve security of online passwords
News From the Field
computing graphic October 30, 2012
New Tool Aims to Ensure Software Security Policies Reflect User Needs
News From the Field
researchers playing the game they created July 24, 2012
"Control-alt-hack" Game Lets Players Try Their Hand at Computer Security
News From the Field
new data-encoding scheme June 7, 2012
Rice, UCLA Slash Energy Needs for Next-generation Memory
News From the Field
a map showing Pittsburgh's Livehoods May 1, 2012
Carnegie Mellon Researchers Create Dynamic View of City Based on Foursquare Check-in Data
News From the Field
computing graphic March 19, 2012
Study: Including Ads in Mobile Apps Poses Privacy, Security Risks
News From the Field
computing graphic November 30, 2011
Researchers Find Some Smartphone Models More Vulnerable to Attack
News From the Field
images showing the results of a YouProve analysis November 3, 2011
Android Add-on Monitors Eyewitness Mobile Media Reports
News From the Field
Peng Ning October 5, 2011
New Technique Offers Enhanced Security for Sensitive Data in Cloud Computing
News From the Field
image of an android phone April 13, 2011
Researchers Create Privacy Mode to Help Secure Android Smartphones
News From the Field
computing graphic November 29, 2010
NC State and IBM Researchers Discover New Way to Patch Holes in the 'Cloud'
News From the Field
Wenke Lee October 6, 2010
BLADE Software Eliminates 'Drive-by Downloads' From Malicious Websites
News From the Field
computing graphic September 21, 2010
New Research Improves Ability To Detect Malware in Cloud-Computing Systems
News From the Field
computing graphic September 21, 2010
New Research Improves Ability to Detect Malware in Cloud-computing Systems
News From the Field
computing graphic May 17, 2010
Software Tool Helps Tap Into the Power of Graphics Processing
News From the Field
smart phone February 22, 2010
Smart Phones Expose Users to Clever Attacks
News From the Field
computing graphic October 8, 2009
Household Robots Do Not Protect Users' Security and Privacy, Researchers Say
News From the Field
Showing: 1-28 of 28