Vision Statement


Emerging Cyber Threats Report for 2014 Emerging Cyber Threats Report for 2014 PDF

Emerging Cyber Threats Report for 2013 Emerging Cyber Threats Report for 2012 PDF

Emerging Cyber Threats Report for 2012 Emerging Cyber Threats Report for 2012 PDF


Latest NEws

Apple fixing bug that allows fake charging stations to hack iPhones

Apple Inc's next software update for its iPhones and iPads will fix a security flaw that allows hackers to engage in spying and cyber crimes when the victim connects the device to a fake charging station, the company said on Wednesday.

Apple said the issue had been fixed in the latest beta of iOS 7, which has already been released to software developers.

"We would like to thank the researchers for their valuable input," Apple spokesman Tom Neumayr said. [Read more] Jim Finkle, Reuters, 07-31-13

How crooks and legit services exploit mobile devices

In this heady environment, Apple has won praise from the security community for insisting that any new iOS app pass a rigid review to gain approval for distribution via its tightly controlled Apple Store. It's generally not possible to install non-approved apps on an iPhone or iPad without "jail breaking" the device to access the operating system software.

However, Lau and GTISC associate director Paul Royal on Wednesday disclosed a way anyone can pose as a developer and finagle Apple's app-approval process to install a malicious application on non jail-broken iOS devices. [Read more] Byron Acohido, USA TODAY, 08-01-13

» past news articles


Upcoming Events

Georgia Tech Cyber Security Summit

Martin Hellman

November 6, 2013

9:30 am – 12:15 pm

Continental breakfast starting at 8:30 am
GTRI Conference Center
250 14th Street NW, Atlanta, GA 30318

Keynote Address by Martin Hellman
Professor Emeritus, Stanford University
Inventor, Public Key Cryptography

GT CSS Website
GT CSS Registration




GTISC, Intel Work to Improve Security Education

December 3, 2012

Intel logoMembers of the Georgia Tech Information Security Center have recently teamed up with Intel Labs University Collaborations Office to improve cyber security education. With the help of multiple gifts from Intel, faculty at GTISC have begun work that incorporates security concepts throughout the general undergraduate Computer Science curriculum. This work has led to pilots that augment the Fall 2012 CS1301, CS2110, and CS2340 classes with security-specific content. GTISC sincerely appreciates Intel's contributions and commitment to cyber security education.

Intel CPU Donation

September 24, 2012

Earlier this month, GTISC received a donation of high-performance, multi-core E7-4870 processors from Intel. These processors will be used to conduct large-scale, virtualization-based malware analysis research, which can yield threat intelligence on the many thousands of malware samples GTISC collects each day. Previous malware research performed using Intel processors has produced intelligence that lead to the takedown of large botnets and the arrest of the criminal operators behind them. GTISC thanks Intel for its generous donation.

New GTISC Director

August 15, 2012

Wenke Lee has been named director of the Georgia Tech Information Security Center (GTISC). Lee, whose appointment became effective August 13, is a professor in the School of Computer Science and has been at Georgia Tech since 2001. He earned his Ph.D. in computer science from Columbia University in 1999 and taught at North Carolina State for two years before coming to Atlanta. Among Lee's awards and honors are an NSF CAREER Award in 2002 and the College of Computing's Outstanding Senior Faculty Research Award in 2009, and he has published more than 100 scholarly articles.


PAST Events

GTISC Faculty/Student Open House

September 18, 2013
3:00 pm – 4:00 pm
Third Floor, Klaus Advanced Computing Building
GTISC Common Area

GTISC Spring 2013 Security Forum

April 18, 2013
9:30 am – 3:00 pm
First Floor, Klaus Advanced Computing Building
266 Ferst Drive, Atlanta, GA 30332-0765

Event Schedule
9:30 am - 10:00 am Opening Remarks
10:00 am - 12:00 pm Short Talks on Security Research
1:30 pm - 3:00 pm Security Research Demos

» archived events