Past News Articles
Spam wars clog the Internet
Experts say the attack isn't very sophisticated, but the mess points to a weakness in the architecture of the Internet: when you type a web address into your device, the name goes to a kind of electronic phone book that looks up the computer it needs to find.
"Some of those 'phone books' are open for anybody to use," says Paul Royal, a research scientist at the College of Computing at Georgia Tech. "Unfortunately that means that attackers can abuse those 'phone books' by asking a question in a way that generates a very large response and targets a victim of their choice."[Read more about the spam wars] David Brancaccio, Marketplace, 03-28-13
Georgia Tech Lists Top Cyber-Threats for 2013
As both consumers and businesses are becoming more reliant on smart phones and tablet computers, those mobile devices are creating new opportunities for cyber criminals.
That's just one of the findings of a recent Georgia Tech reportlooking at potential threats to cyber-security in 2013. [Read and listen] Jim Burress, WABE, 11-18-12
Delta ticket scam targets unsuspecting
"As websites make it easier for shoppers and travelers to get just about anything, thieves are taking advantage of it by closing in with phony websites that resemble the real thing.
This scam has opened a gateway for scams that Internet experts call a 'billion dollar shadow industry.' At the top of the list, the Atlanta based Delta Airlines." [Read more about this scam] Bill Liss, www.11alive.com, 10-09-12
The Latest Threat: A Virus Made Just for You
"[Paul] Royal and his colleagues at Georgia Tech show that a form of copy protection called host identity-based encryption can encrypt critical parts of a malware program with keys based on information gleaned from a victim's system, thereby making it even harder to analyze the specimen on a different machine." [Read more about the technique] Robert Lemos, Technology Review, 07-24-12
Computer Scientists Break Security Token Key in Record Time
"Computer scientists say they have now figured out how to extract that key from a widely used RSA electronic token in as little as 13 minutes."[Read more about the study] Somini Sengupta, The New York Times Blog, 06-25-12
Malware 'Licensing' Could Sytmie Automated Analysis
"While the Flashback Trojan has garnered its share of digital ink for its assault on the Mac OS X operating system, security researchers and computer scientists fear a different aspect of the malware -- its ability to lock itself to a specific infected system." [Read more about the encrypted malware] Robert Lemos, Dark Reading, 05-22-12
Pindrop Security fleshes out $1M seed investment details
Pindrop Security, an Atlanta startup that ambitiously aims to reinvent Caller ID, has raised $1 million from a bevy of West Coast investors including Andreessen Horowitz, Sigma Partners, and a venture firm led by former eBay COO Maynard Webb. [Read more about the investment] Urvasksh Karkaria, Atlanta Business Chronicle, 05-01-12
Company develops telephone line "fingerprint" detector
Researchers at Pindrop, a new security company, have developed technology that can read telephone line “fingerprints” to prevent fraud and identify a caller. [Read more about Pindrop's technlogy] Homeland Security Newswire, 03-06-12
Phone Call 'Line Noise' Could Expose Thieves
Just as people's voices betray hints of the region they originate from, so, it turns out, do phone calls. Handsets, telephone exchanges, and other call-routing infrastructure imprint subtle and almost unique fingerprints onto the audio of any phone call, a phenomenon that security company Pindrop hopes to use to prevent fraudsters from using stolen credit cards over the phone. [Read more about Pindrop's software] Tom Simonite, Technology Review, 02-29-12
Your Data Has Probably Already Been Stolen
“Many of the cyber security experts agree that the bad guys do have a lot of data,” says Mustaque Ahamad, director of the Georgia Institute of Technology’s Information Security Center. “But for them to actually profit from that is a little harder than stealing it.” [Read more about the risks] Matt Brownell, MainStreet, 01-30-12
Pindrop Security: Georgia Tech Spinoff Secures Silicon Valley Funding for Phone Security Technology
"A startup company based on technology developed at Georgia Tech offers a solution to that challenge, and is quickly gaining traction from investors, financial services companies and the security industry. Using “acoustic fingerprint” detection techniques developed in the Georgia Tech Information Security Center (GTISC), Pindrop Security says it can restore trust to the telephone network and help stem the tide of phone fraud." [Read more about PinDrop Security] PressZoom, 01-25-12
Silicon Valley VCs invest in Pindrop
Andreessen Horowitz, a Silicon Valley venture firm that's invested in Facebook, Groupon and Twitter, is betting on an Atlanta startup that ambitiously aims to reinvent Caller ID. Pindrop Security has developed technology that hopes to stem the growing problem of phone fraud. The Internet and free software tools have made it easy for criminals to spoof Caller ID and pretend to be whoever they like... Every phone call has an acoustic "fingerprint" that can identify the location of the caller, and the type of device being used. Pindrop has developed an algorithm that can flag fraudulent callers by reading the audio fingerprint... Pindrop's technology, based on research developed at the Georgia Tech Information Security Center, listens for key indicators in a call to detect the device used, type of service, and country of origin. [Read more] Urvaksh Karkaria, Atlanta Business Journal, 01-06-12
Domains explosion fuels internet expansion
"Is the Internet running out of real estate?" A paper co-written by GTISC's David Dagon explains how the Web's domain-name service relies on a dwindling number of IP addresses to assign "space" in the virtual world. [Read more about the paper] NewLegalReview, 01-04-12
More web users aimed to thwart prying eyes
"As people live more of their lives online, from shopping on websites to socializing on Facebook, more and more of their personal habits can be tracked and translated into profit, said Mustaque Ahamad, director of the Georgia Tech Information Security Center. Although companies that track such information say they are serving web consumers by helping them receive ads tailored to their personal interests, he said, "many privacy-conscious people take issue with someone tracking their online activities without their consent."" [Read more about tracking online behavior] Craig Schneider, Atlanta Journal Constitution, 01-04-12
The Georgia Tech Cyber Security Threats Report and (sp)iPhone paper are listed as two of 10 Highlights for Georgia Tech in 2011
Your employees are the biggest threat to your data
"Expect emerging cyber threats in 2012 to include links to malicious websites appearing higher on search engines’ results, attacks against mobile Web applications and browsers and more stolen private data sold to legitimate businesses for marketing." [Read more about these threats] Sarah Mueller, Jacksonville Business Journal, 12-09-11
GTISC Board Member, Dmitri Alperovitch, Appointed to CounterTack's Board of Directors
CounterTack, the industry's first and only provider of in-progress cyber attack intelligence and response solutions, today announced the appointment of industry veterans Dmitri Alperovitch and Alex Doll to its Board of Directors. [Read more about Alperovitch's appointment and CounterTack] PR Newswire, 12-06-11
Cyber bill strong on info sharing, light on privacy protections
"The Cyber Intelligence Sharing and Protection Act of 2011 (HR 3523) was introduced Nov. 30 by committee Chairman Mike Rogers (R-Mich.) and Ranking Member Dutch Ruppersberger (D-Md.) and would require the intelligence community to establish procedures for sharing classified cybersecurity intelligence with the private sector, and would provide incentives for private entities to share information with the government." William Jackson: Government Computer News, 12-01-11 and Redmondmag.com, 12-02-11
Programmer Raises Concerns About Phone-Monitoring Software
GTISC's Mustaque Ahamad was quoted in this New York Times' article about data-collection software embedded on cellphones. Brian X. Chen, New York Times, 12-01-11 [Read the entire article]
Interactive SlideShow on Threats Reports
Click here to review the slideshow on 2012 Cyber Threats Reports. ITBusinessEdge
Sandia Labs: SOPA will 'negatively impact' U.S. cybersecurity
"Leonard Napolitano, Sandia's director of computer sciences and information systems, warned in a letter that the legislation is "unlikely to be effective" and will "negatively impact U.S. and global cybersecurity and Internet functionality."" Declan McCullah, CNET, 11/17/11 [Read more about the letter from Sandia Labs]
GTISC Helps FBI Bust One of the Largest Cyber Scams
"Six men, all in their 20s and early 30s, are under arrest in Estonia for what the United States attorney’s office in New York called “a massive and sophisticated Internet fraud scheme.” A Russian suspect in the case remains at large." Somini Segupta and Jenna Wortham, New York Times, 11-09-11 [Read New York Times article]
Media Coverage for Cyber Security Summit and Threats Reports
New Cyber Threats Expected in 2012, WABE/NPR - 10/11
Cellphones Will Become a Way to Attack Otherwise Protected Devices: Report, IDG News Service (Network World, Computerworld, ITWorld.com, CIO Magazine, PC Advisor, PC World, InfoWorld) - 10/11-12
Cyber Threats to Expect in Coming Year, Insurance Journal - 10/11
Smartphones Present Growing Security Problems on Campus, Report Says, Chronicle of Higher Education - 10/12
Cybersecurity Threats to Increase in 2012, Consumer Affairs - 10/12
Can Charging Cell Phone Take Down an IT System?, GovInfoSecurity.com - 10/12
Cyber Threats to Increase in 2012: Report, Times of India (Economic Times, Daily News & Analysis, Financial Express, Indian Express) - 10/12
Report: Mobile Attacks a Top Cyber Threat in 2012, Federal News Radio - 10/12
Cyber Threats Forecast for 2012, ContinuityCentral.com - 10/12
Mobile Phone Security, 11Alive (no clip available online) - 10/13
Next Big Target for ‘Cyber Attacks’: Smartphones, WTHR - NBC13 (Indianapolis) - 10/13
Smartphone Web Browsers Could Become Major Attack Vector, Security Researchers Warn, Ars Technica - 10/14
Enterprises Need to Focus on Data, Enterprise Culture, CSO Online (InfoWorld) - 10/14
Cybersecurity Threats to Pick up Steam in 2012, Scientific American - 10/15
College: Could Smartphones Put Your Cyber Security at Risk, Metro (New York & other major markets) - 10/17
Researchers Outline Hurdles for Mobile Security, Redmondmag.com - 10/18
Charging Smartphones via USB Could Infect Your PC, iTWire - 10/18
Firefox, Opera Improve their Android Strategies for Mobile Browsing, Android Apps Appolicious - 10/18
Rise in Mobile Browsing Drives Firefox, Opera to Upgrade Android User Interface, TMCNet.com - 10/18
Search Poisoning the Latest in Cyber Threats, Royal Gazette (Bermuda) - 10/19
Press Release pick-up: Dark Reading, RedOrbit, Newswise, Community Central, R&D Magazine, ScienceDaily, ECNmag.com
GTISC and Cyber Threats Report Cited in WYFF News 5 Report
[View the news report "Internet Attacks You Can Expect Next Year"] 11-08-11, Greenville, SC
2012 Cyber Threats Report Cited in The Financial Times's article "Regulation: Lawmakers Asked to Step Into Digital Age"
"US cybersecurity experts say that tough regulations are needed to encourage companies to work harder to protect the data of their customers. However, they fear that government gridlock is allowing the issue to languish." Alan Rappeport, The Financial Times, 11-01-11 [Read the article]
GTISC alum, Dmitri Alperovitch Speaks to Council on Foreign Relations
Help BISMark win the FCC Open Internet Apps Competition!
BISMark is the Broadband Internet Service BenchMARK. It is a project led by Georgia Tech and the University of Napoli to develop an OpenWRT-based platform for performing measurements of ISP performance, as well as traffic inside the home. You can use BISMark to measure the performance of their ISP, visualize and monitor traffic patterns from your users and devices inside your home network, and manage your usage caps. [ VOTE ] or [ SIGN UP FOR A BISMark ROUTER ]
InformationWeek, in conjunction with DarkReading, releases asecurity report on "Small Businesses, Big Losses: How SMBs Can Fight Cybercrime"
06-22-11 [Download report]
Damballa® FirstAlert Detects Cyber Threats Weeks Before the Malware is Ever Discovered
Damballa® Labs, the research and cyber intelligence arm of Damballa Inc., today announced Damballa® FirstAlert, a cyber threat early warning system that provides enterprise security teams with the earliest possible protection against cyber attacks. Business Wire, 06/20/11 [Read more about the warning
Company commercializing GTISC Research" PinDrop Security
TAG and the Georgia Research Alliance hosted the finals for the 2011 GRA/TAG Business Launch Competition at IBM this week. Congratulations to this year's winner, PinDrop Security, who received a big check for $50,000 and more than $150,000 in suite-of-services.
PinDrop joins winners from the past six years who have generated more than $20 million in post-competition investment. [more information]
Transcript for Jon Giffin
GTISC faculty, Nick Feamster, and student, Vytautas Valancius, demonstrated new technology to give network traffic control to services running on cloud platforms like Amazon EC2 at the GENI engineering conference in San Juan, Puerto Rico.
Georgia Tech Experts Gives Tips Safeguarding Against Data Theft
"Nick Feamster, assistant professor at Georgia Tech's College of Computing and researcher at the Georgia Tech Information Security Center offers his expertise on the Epsilon data breach and what users and custodians can do to protect their data." Georgia Tech Digital Lounge, 04-08-11 [View tips on how to minimize the damage a data breach]
Data Breach Impacts Millions
"New details in a potential security breach impacting millions of customers from all of these popular stores and companies.. . .there are reports that the security breach is opening a window into what companies do with the e-mail addresses that you provide them. . . It's impossible to say how many people were affected, but an assistant professor at Georgia Tech's College of Computing science says the members may be in the millions and says if you received an e-mail, you should be on alert for targeting fishing scammers. They know, for example, that you've done business with, say, Walgreens or with Chase or Citicorps, and they can send a spam e-mail that appears to come from one of those organizations. You might be more vulnerable now because you recognize this as a trusted brand." CNN, 04-05-11 [View the segment]
Banks, retailers warn customers of data breach
"Bob Moon: Do you do business with any of these companies: Capital One, Citibank, Marriott, the Home Shopping Network, Walgreens or TiVo? Check your inbox today, and there's likely to be an apology, along with a warning, that your email address may have been compromised … Julian says cyber theft is now a multi-billion dollar business. It's also very bad for business, says Georgia Tech's Nick Feamster. The breach could raise doubts about any online marketing campaign. Nick Feamster: Companies spend tens of billions of dollars trying to protect against this type of incident." Stacey Vanek-Smith, Marketplace, 04-04-11 [Read more about data breach]
Georgia Tech to pursue 'transparent Internet' with $1 million Google Focused Research Award
"What if Internet users could click a button and determine whether their service was being artificially slowed down? Or if the government were censoring their content? In the name of Internet transparency, a team of Georgia Tech researchers will use a $1 million Google Research Focused Award to provide Internet users around the world with just those kinds of tools." Michael Terrazas, 03-22-11 [Read more]
TIA, Georgia Institute of Technology Sign MOU to Collaborate on Smart Device Standards Development
The Telecommunications Industry Association (TIA) and Georgia Tech Applied Research Corporation (GTARC) announced today that they have signed a Memorandum of Understanding (MOU) to explore collaborative standards development opportunities of mutual interest involving research, testing, and outreach in the area of global information and communications infrastructure. Investor's Business Daily, 02-22-11 [Read more about this collaboration]
Dr. Carl A. Gunter will visit GTISC and the Health Services Institute, Wednesday, March 9, 2011. Details to follow
GTISC PhD grad and 2010 Summit Panelist, Colonel Greg Conti, research is covered in The New York Times' article, "Service Members Face New Threat: Identity Theft"
Matt Richtel, 12-06-10 [Read the entire article]
Images from GTISC Open House
[View Photos] 08-31-10
Nick Feamster has been selected as this year's recipient of the ACM Sigcomm Rising Star Award
The award recognizes the research program that Nick has undertaken and his "outstanding research contributions to the field of communication networks during the early part of his career." 11-10-10
Technology said to thwart voice phishing scams
"Researchers at Georgia Tech say they have identified a digital fingerprint hidden within voice signals that can reveal fraud and thwart voice phishing scams." EE|Times, 10-25-10 [Read more about Georgia Tech's voice authentication technology]
NYU-Poly Contest Unearths Wealth of Cyber Security Research by Students
"Forty-six students, representing all the top university cyber security research groups, competed for the prestigious AT&T Award for Best Applied Security Research Paper in NYU-Poly's Seventh Annual CSAW challenges. To enter, every one already leapt a high academic bar: All were previously accepted by a scholarly conference or journal." PRNewswire, 10-21-10 [Read more about finalist Abhinav Srivastava]
New Tool Blocks Downloads From Malicious Sites
"Science Daily Headlines reports that a new tool has been developed (funded by the National Science Foundation, US Army Research Office and US Office of Naval Research) to prevent 'drive-by downloads' whereby simply visiting a website, malware can be silently installed on a computer to steal a user's identity and other personal information, launch denial-of-service attacks, or participate in botnet activity. The software called Blade — short for Block All Drive-By Download Exploits — is browser-independent and designed to eliminate all drive-by malware installation threats by tracking how users interact with their browsers to distinguish downloads that received user authorization from those that do not." Hugh Pickens, Slashdot.com, 10-09-10 [Read more about BLADE]
A new way of beating the web's censors
"A censor can block a message he mistrusts, even if he cannot read it, thus putting the onus on the recipient to justify both the message and the fact it is encrypted. A well-crafted steganographic message, though, will never come to the censors' attention in the first place. Which is the purpose of Collage, a system devised by Nick Feamster and his colleagues at the Georgia Institute of Technology." The Economist, 10-12-10 [Read more about steganography and Collage]
Online medical data open to attack
"If you think the latest security threats to social media sites like Twitter and LinkedIn are bad, just wait until attackers set their sights on your home, or your hospital. While hackers attacking your Facebook site may be annoying, it's not hazardous to your health the way an attack that infects the computer that controls your X-ray or MRI machine might be." Mustaque Ahamad and Paul Judge, AJC, 10-07-10 [Read more]
Cable Provider Issues Bad Bot Alerts
"Information Security Center at Georgia Tech estimates the number of bot-infected computers to be in the tens to hundreds of millions." Leslie Meredith, TechNewsDaily, 10-01-10 [Read more about the new service that will include "bot" alerts]
Comcast to Protect Customer’s Computers From Malware
"Comcast is expanding a test of a service that will monitor for signs of botnets, a particularly threatening form of malware that can invade its customer’s computers. It appears to be the first provider in the United States to do this." Roy Furchgott, New York Times, 09-30-10 [Read more about this service]
Cyber-Terror: The New Nukes?
While security experts know what Stuxnet is designed to do, Conficker is still the reigning mystery of the cyberworld because no one knows why it’s there or what it’s going to do. Trevor Butterworth, The Daily Beast, 09-27-10 [Read more]
Georgia Tech and Mobile Active Defense Announce Innovation Alliance for Mobile Security
"Mobile Application Development (M.A.D.) Partners, LLC, and Georgia Tech Information Security Center (GTISC) have just completed their industry alliance partnership on mobile security research and the company will serve on the GTISC Industry Advisory Board." e-releases, 09-27-10 [Read more about the partnership]
GTISC Professor, Nick Feamster, has been named one of the 2010 TR35 as selected by MIT’s Technology Review
Feamster's recognition is based on his work in network operations and security, particularly SNARE (Spatio-temporal Network-level Automated Reputation Engine), an email filter that detects spammers based on their sending behavior. [Read more about Technology Review's 2010 Young Innovators Under 35]
Is cyberwar lawful?
"The answer is probably not -- at least an unprovoked attack -- based on extensive new legal research appearing in an upcoming issue of the British journal INFO. The research describes a 150-year-old series of Geneva Conventions relating to cyberwar. However, a precise answer to the question is impossible because no one has actually defined the term "cyberwar" and reaching broad agreement on a definition seems problematic at best." Column by Past GTISC Advisory Board Member, Tony Rutowski, ComputerWorld, 08/08/10 [Read more about the research]
'Viruses Are Winning': Malware Threat Outpaces Antivirus Software
"For the last 20 years, hackers and antivirus software programmers have played a cat-and-mouse game over computer security. Whenever one side would innovate, the other would catch up. And for most of that time, the conflict remained a benign contest between tech savvy vandals looking for street cred and the professional programmers trained to counter them." Stuart Fox, TechNewsDaily, 08/02/10 [Read more]
Notorious Kraken botnet rises from the ashes
"The Kraken botnet, believed by many to be the single biggest zombie network until it was dismantled last year, is staging a comeback that has claimed almost 320,000 PCs, a security researcher said.
GTISC Assistant Professor Nick Feamster, Sloan Fellow and Presidential Early Career Recipient, involved in "new weapon in Internet censorship arms race"
"Trying to get out in front of what they call a censorship arms race, a team of researchers has come up with technology that lets users exchange messages through heavily censored networks in countries such as China and North Korea in hidden channels via user-generated content sites such as Twitter or Flickr." Layer 8 by Michael Cooney, NetworkWorld, 07/09/10 [Read more about Collage]
CoC Dean Zvi Galil and GTISC Director, Mustaque Ahamad, is pleased to announce Patrick Traynor is the recipient of the NSF Faculty Early Career Development Award
GTISC Professor, Patrick Traynor, received an NSF Faculty Early Career Development (CAREER) award. According to NSF, "This is the most prestigious awards in support of junior faculty who exemplify the role of teacher-scholars through outstanding research, excellent education and the integration of education and research within the context of the mission of their organizations." His proposal is titled, "CAREER: Protecting User Data on Lost, Stolen and Damaged Mobile Phones." 07-13-10
Kraken botnet re-emerges 318,000 nodes strong
"Kraken, a large and difficult-to-detect botnet that peaked in 2008 and was dismantled by early 2009, is back, and anti-virus solutions are struggling to detect it, according to researchers at Georgia Tech Information Security Center." Angela Moscaritolo, SC Magazine, 06-30-10 [Read more about the Kraken botnet]
Since April, this son-of-Kraken botnet has infected an estimated 318,058 machines - about half as big as the original Kraken was at its height in the middle of 2008, according to Paul Royal, a research scientist at the Georgia Tech Information Security Center." Dan Goodin, The Register, 06-29-10 [Read the entire article on the Register]
Kraken Botnet Making A Resurgence, Researcher Says
"The Kraken botnet - one of the Internet's largest and most difficult to detect in 2008 - is rearing its ugly head again. In fact, the old security nemesis - which was reported dismantled last year - has compromised more than 318,000 systems, nearly half of the 650,000-node size it achieved at its peak in 2008, according to Paul Royal, research scientist at the Georgia Tech Information Security Center (GTISC), a leading authority on botnet research." Tim Wilson, DarkReading, 06-24-10 [Read more about the Kraken Botnet]
Mariposa Botnet Creators May Not Face Imprisonment
"According to Luis Corrons (Technical Director at Panda Security), the culprits behind the notorious 'Mariposa botnet' are unlikely to be punished over the crimes they committed. Corrons in a joint action with the Spanish Guardia Civil, the Federal Bureau of Investigation and other groups worked to spot and bring down Mariposa during December 2009, as reported by V3 on June 2, 2010." Spamfighter News, 06-11-10 [Read the entire article]
Delegation Observes Challenges to Electronic Voting Technologies in Philippines
The Carter Center deployed a limited observation mission to observe the use of voting technology to the Philippines’ May 10 election as part of its Democratic Election Standards project, which includes addressing the challenges of observing electronic voting technologies as a core component. The Carter Center, 05-14-10 [Read more on how GTISC was involved]
Security Experts: Hackers Could Target Pacemakers
Professors Say FDA Should Step Up Security Measures on Medical Devices. - Lauren Cox, ABC News Medical Unit, 05-01-10 [Read more]
Insight on Mobile Phone Viruses & Other Malware
"In late 2008 the Georgia Tech Information Security Center predicted that malware directed at mobile phones would become the next major cyber threat. Experts say market fragmentation is the main reason a catastrophic threat has not (yet) materialized."Tech Guru, 04-29-10 [Read the entire article]
Innovative Smartphone Technology Streamlines Election Observation Process
"The Carter Center, long at the forefront of the election observation field, is working with students at Georgia Tech University to take the field forward again – using smartphone technology to streamline the observation process and compile the findings of observers in a fast, efficient, and transparent way." - Deborah Hakes, The Carter Center, 03-25-10 [Read the entire article]
Malware-infected memory cards affect up to 3,000 Vodafone HTC Magic Android smartphones
"Late last year, the Mariposa Working Group (comprised of Defence Intelligence, the Georgia Tech Information Security Center, Panda Security, and other international security experts and law enforcement agencies) worked together to bring down what is considered to be the largest botnet in history." - David Gonzales, Unwired View, 03-20-10 [Read more about how there may still be Mariposa-infected computers out there]
GTISC Professor Jon Giffin comments on threats posted online via social-networking sites
The Internet "makes it easier for unskilled vandals to hide behind anonymity," said Jon Giffin, an assistant professor of the School of Computer Science at the Georgia Institute of Technology in Atlanta. "It's just the modern equivalent of someone calling in a bomb scare," Giffin said. The schools "have to take it seriously just in case it is an actual threat." - Patrick Condon, TwinCities.com, 03-11-10 [Read more about the Minneapolis school lockdown]
Is chasing cybercrooks worth it?
"Mustaque Ahamad, director of the Georgia Tech Information Security Center, which helped track down the arrested men, said preventing viruses from infecting computers was the old model for fighting this type of Internet crime. Today, going after the "bad guys" is the better long-term option, he said."
- John D. Sutter, CNN, 03-05-10 [Read the entire article]
Another Botnet Gets Dismantled, But This Time With Arrests
"A team made up of law enforcement officials in Spain, the FBI, Panda Security, Defence Intelligence, and Georgia Tech cut off the so-called Mariposa botnet's command and control infrastructure in one day in December, ultimately leading to the arrest of the alleged head botmaster and two of his partners earlier this month by Spanish authorities." Information Week; Kelly Jackson Higgins, Dark Reading, 03-05-10 (From the March 1, 2010 issue) [Read the entire article]
Authorities bust 3 in infection of 13M computers
"Authorities have smashed one of the world's biggest networks of virus-infected computers, a data vacuum that stole credit cards and online banking credentials from as many as 12.7 million poisoned PCs." Jordan Robertson, AP Technology Writer, Yahoo! News, 03-02-10 [Read the entire article]
House Approves S&T Legislation to Improve Cybersecurity R&D by Overwhelming Majority
Professor Sy Goodman, Co-Director of GTISC was involved in S&T legislation. [Read more about the Cybersecurity Enhancement Act]
Distance Learning Master of Science in Information Security Application Deadline Extended
application deadline for the program – specifically for the Distance
Learning option – has been extended to April 15, 2010. Applicants are
encouraged to apply early, as the selection process will start in
More information about the program | View program video
Georgia Tech Creates New Online Master's Degree in Information Security
"The College of Computing today announced the creation of a new Master of Science in Information Security available online in a distance learning format, a flexible degree option for working information security professionals who want more than industry certification." 11/17/09 [Read entire press release]
Researchers Work to Improve Mobile Device & Cellular Network Security
Patrick Traynor and Jonathon Giffin recently received a three-year $450,000 grant from the National Science Foundation to develop tools that improve the security of mobile devices and the telecommunications networks on which they operate. 11/10/09 [Read more about their research focus] and the DarkReading article]
Dmitri Alperovitch interviewed by Fox News' Neil Cavuto about the FAA Computer Glitch and cyber security
GT researchers work to secure cellphones
"Two Georgia Tech professors have received a three-year $450,000 grant from the National Science Foundation to develop tools that improve the security of mobile devices and the networks on which they operate." Urvaksh Karkaria, Atlanta Business Chronicle, 11/10/09 [Read more about the methods being developed]
GTISC congratulates Wenke Lee and Ling Liu on their promotion to full professor
GTISC co-hosted two meetings with NSF in Arlington, VA
Tuesday, July 28, 2009 - Security Driven Architecture Workshop
Wednesday, July 29, 2009 - Future Internet Information Meeting
Georgia Tech to Lead Fight Against Cell Phone Hackers
"As the computing power of mobile phones increases--and competition begins to winnow down the variety of operating systems--they will become more and more attractive to hackers. Now is the time to begin shoring up defenses, say assistant professors Jon Giffin and Patrick Traynor of Computer Science." Ben Mayer, 11Alive.com, 07/14/09 [Read more about GT's plans to fight against cell phone hackers]
Cybersecurity Bottleneck: Few PhDs
As part of his June 10 testimony before the U.S. House of Representatives' Science and Technology Committee and Research and Science Education Subcommittee, Professor Sy Goodman, joint with Computer Science and the Sam Nunn School of International Affairs, said one threat is a dearth of cybersecurity professors who can train tomorrow's security specialists. Eric Chabrow, GovInfoSecurity, 06/12/09 [Read more about the June 10 testimony]
Goodman Warns of Cyber Threats in Hill Testimony
On June 10, Professor Sy Goodman, joint with the School of Computer Science and the Sam Nunn School of International Affairs, briefed the U.S. House of Representatives' Science and Technology Committee and Research and Science Education Subcommittee during its hearing on "Cyber Security R&D." Georgia Tech College of Computing, Office of Communication, 06/10/09 [Read more about Professor Goodman's testimony]
Obama to Appoint Cybersecurity Czar
GTISC Director Mustaque Ahamad "was heartened by what the initiative could mean for his team. With more than 100 graduate students and 20 professors, the center is one of the nation’s biggest schools for cybersecurity research." Ellen Nakashima, The Washington Post, 05/30/09
[Read the article]
4 Free Cellphone Apps to Help Manage Your Money
"Most apps act almost like a shortcut on your desktop PC, says Patrick Traynor of the Georgia Tech Information Security Center, which studies threats to..." Kelli B. Grant, Smartmoney.com, 05/27/09
[Read the SmartMoney article]
Device Fingerprinting Defends Against Online Fraud
GTISC botnet statistic mentioned in this article on online fraud. Linda Musthaler, Network World, 04/20/09 [Read the Network World article]
Cell Phones Will Thrive in Africa, but Security Will Be A Problem
Sy Goodman spoke at the Marconi Society symposium. "As cell phones become more technologically advanced, they will become the top tech platform for the large majority of the world, according to Goodman." Larry Greenemeir, 60-Second Science Blog, 04/17/09 [Read the entire Scientific American article]
The Impact of the Conficker Virus
GTISC professor, Dr. Jon Giffin, gives insight on the Conficker worm on 11Alive. 04/03/09 [View interview from 11Alive]
Research Paper on Botnet-Based Scam Hosting wins Best Paper Award
"Dynamics of Online Scam Hosting Infrastructure", a paper by Maria
Konte and Nick Feamster at Georgia Tech, and Jaeyeon Jung at Intel
Research, that studies the infrastructure that scammers use to host phishing and scam attacks on the Internet has won the Best Paper award at Passive and Active Measurement Conference. The paper will be presented April 3, 2009 in Seoul, Korea. [Link to paper]
The Internet Is Infected
"Tonight on 60 Minutes Lesley Stahl will be reporting on computer viruses and botntets that propagate on the Internet and infect PCs, which enable their creators to do all types of evil things via remote command and control." Lance Weatherby, Food of Good, 03/29/09 [Read the article and view the 60 Minutes segment]
Fight Malware on the Phone
"As smartphones become more common, the threat of mobile malware is becoming real." Robert Vamosi, PC World, 02/26/09 [Read the entire article featuring the 2009 Cyber Threats Report at WashingtonPost.com]
Lumension Extends Data Protection for Mobile Devices
"To help enterprises effectively protect the confidentiality and security of their data on their endpoints and mobile devices, Lumension, Inc. announced it is extending data protection for Windows mobile devices." TMCnet.com, 02/24/09 [Read the entire article]
New Symbian Mobile Malware in the Wild
"A new worm targeting mobile devices running Nokia's Symbian OS is spreading in China in a unique way: through malicious links contained in text messages." Angela Moscaritolo, SC magazine UK, 02/23/09 [Read more about the SymbOS/Yxes.A!worm]
For A Poisoned Internet, No Quick Fix
Six months after revealing a crippling cybersecurity weakness, Dan Kaminsky says the world's systems remain largely unpatched. Researchers led by computer science Ph.D. student David Dagon have assembled a model, globally mapping out vulnerabilities and attacks that occurred between August 2008 and January 2009 because of a crippling cybersecurity weakness. Andy Greenberg, Forbes.com, 02/19/09 [Read the entire Forbes article]
GTISC Industry Advisory Board member, Tony Rutkowski, was made the Rapporteur for Cybersecurity by the Plenary of the International Telecommunication Union - Telecommunications Standardization (ITU-T) Study Group 17 (Security) meeting at Geneva
Tony Rutkowski was made the Rapporteur for Cybersecurity by the Plenary of the International Telecommunication Union - Telecommunications Standardization (ITU-T) Study Group 17 (Security) meeting at Geneva. This venue is the principal global intergovernmental-industry body for collaboration on worldwide cybersecurity standards. Rapporteurs typically are appointed for four years to lead participants from governments and industry around the world in study, dialogue, and preparation of technical standards to meet cybersecurity needs, including liaison with other cybersecurity forums. The ubiquitous security standard for PKI, X.509, is a well-known example of the work. He will be the senior representative from the U.S. involved in this work, and assisted by Associate Rapporteur experts from Korea's national ETRI institute and Japan's National Institute of Information and Communications Technology. 02/11/09
GTISC Faculty Selected as One of Five "Luminaries of 2008"
Sy Goodman was selected as one of 5 "Luminaries of 2008" by Secure Computing Magazine. The same issue refers to the GTISC "Emerging Cyber Threats Report of 2009."
Global Initiatives to Secure Cyberspace: An Emerging Landscape
Recent MS InfoSec graduate Michael Portnoy, together with advisor Sy Goodman from the Center for International Strategy, Technology, and Policy (CISTP) and GTISC, published on December 04, 2008 a comprehensive research study on the emerging ecosystem of international, regional, and non-governmental organizations working to address the global issue of cyber security. Global Initiatives to Secure Cyberspace: An Emerging Landscape, a collaborative effort by students in both the College of Computing and the Sam Nunn School of International Affairs, is now available for purchase online or in hardcover. A corresponding catalog database is also being maintained by the authors.
GTISC Faculty, Nick Feamster, Honored by the White House
Nick Feamster has been recognized as one of the nation’s top young scientists with a Presidential Early Career Award for Scientists and Engineers (PECASE). The ceremony was held December 19, 2008 at the White House. This Presidential Award is the highest honor bestowed by the U.S. government on scientists and engineers beginning their careers. Georgia Tech News Release, 12/19/08 [Read entire article on Feamster's achievement | View video and photos from the ceremony]
GTISC report cited in The Chronicle of Higher Learning article "Top 10 Threats to Computer Systems Include Professors and Students"
"The Georgia Tech Information Security Center estimates that 15 percent of online computers worldwide are part of botnets: millions of computers infected with malicious code that lets attackers turn them into "zombies" for their own evil electronic deeds (botnets are often used to send spam). That's up from 10 percent a year ago."
Jeff Young, The Chronicle of Higher Learning, 12/19/08, Section: Information Technology, Volume 55, Issue 17, Page A9 [Read "Top 10 Threats to Computer Systems Include Professors and Students"]
GTISC cited in New York Times' article "Thieves Winning Online War, Maybe Even in Your Computer"
John Markoff, NYTimes.com, 12/05/08 [Read "Thieves Winning Online War, Maybe Even in Your Computer"]
Goodman Published in NATO Book on Cyber Terrorism
Seymour E. Goodman, a joint professor in the School of Computer Science and the Sam Nunn School of International Affairs, contributed an invited chapter to a NATO book that appeared in October. “Critical Information Infrastructure Protection” was included in Responses to Cyber Terrorism, part of the NATO Science for Peace and Security Series E: Human and Societal Dynamics, vol. 34. The book was published by IOS Press in Amsterdam.
The Compiler-New for the CoC Community, Issue 29 | December 2008
GTISC professor quoted two in Forbes.com articles, Metadata: An Invisible CAPTCHA and Robots In Disguise
GTISC's ongoing efforts in e-Democracy
As part of GTISC's ongoing efforts in the realm of e-Democracy (specifically in the area of trustworthy elections), we have a partnership with the Carter Center in the area of observation of electronic elections. This video describes an election observation console developed at Georgia Tech based on requirements from the Carter Center.
Emerging cyberthreats for 2009
Linda Musthaler, Network World, 11/17/2008 [Read the Network World's article on the GTISC cyber threats report]
New attack targeting Windows Mobile phones
"Attacks on Google's Android and Apple's iPhone have made headlines recently but now Windows Mobile phones are the latest target. The latest wave is a Windows CE/Mobile polymorphic "companion" virus, according to a McAfee Avert Labs blog post on Thursday."
Angela Moscaritolo, SC Magazine, November 13, 2008 [Read the SC Magazine article, New attack targeting Windows Mobile phones]
Video Demo of ALPACA: A Lightweight Platform for Analyzing Claim Acceptability
GTISC researchers are working on a platform/data interchange format, user interface, and prototype implementation called ALPACA. ALPACA is a distributed user-centric framework for organizing, simplifying, and viewing claims and their supporting evidence, with an emphasis on evaluating the credibility of claims based on individual users' previous assumptions. The initial efforts are focused on helping users understand the validity and provenance of claims made in online discussions.
Watch the ALPACA video demo
SecureWorks' CTO to Participate on Panel at Georgia Institute of Technology's Security Summit
"Jon Ramsey, chief technology officer for SecureWorks, will serve as a panelist at Georgia Tech Information Security Center’s (GTISC) upcoming Security Summit on Wednesday, October 15th." [Read the entire press release ]
Paul Judge to Chair GTISC Advisory Board
Security for Telecommunications Networks, co-written by GTISC Faculty, Patrick Traynor, has been made available by the publisher.
Description: "Telecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, well over three billion people across the globe rely upon these systems, as their primary means of connecting to the world around them. However, such systems have not received the same security focus and evaluation as IP networks such as the Internet. Security for Telecommunications Networks creates a jumping-off place for new researchers in the field of secure telecommunications networks. This volume explores known vulnerabilities, emerging threats and the open questions posited by network evolution." More information about Traynor's book.
Internet Security: Online security companies prosper in Atlanta. Area ranks with Silicon Valley and Isreal as one of the three hubs for start-up businesses
GTISC professor, Jonathon Giffin, goes "war driving" with CNN's Brooke Baldwin to show vulnerable wireless access points.
CNN, August 8, 2008 [Watch the entire "How Hackers Target Wi-fi" video on cnn.com]
CoC Researcher, David Dagon, Warns of Major Internet Flaw
Ashley Phillips, ABC News, July 31, 2008 [Read the entire "Web Flaw Leaves Personal Info in the Open" article on abcnews.com]
GTISC PhD Student Quoted in Wall Street Journal
Chris Rouland, Chief Technology Officer of ISS, featured in "People in Business" AJC article
UP CLOSE / CHRIS ROULAND, chief technology officer, IBM's Internet Security Systems: Fighting virtual worms that steal
Web security firm born at Tech has its hands full keeping computers as free of viruses as possible. Kristi Swartz, ajc.com, June 1, 2008 [Read the entire People in Business article on ajc.com]
GTISC professor, Nick Feamster, invited to present at the Brazilian Symposium on Computer Networks and Distrubuted Systems
GTISC professor Nick Feamster was invited to present a 3-hour tutorial at the 26th Brazilian Symposium on Computer Networks and Distributed Systems held in Rio de Janeiro, Brazil from May 26 - 30th, 2008
Careful with that Call
"It’s only a matter of time until IP telephony is hit by spam and malware, experts say" by William Jackson, Government Computer News, May 5, 2008 [Read more about IP telephony]
CoC Faculty Member Testifies Before Congressional Committee
Professor Seymour (Sy) Goodman testified April 1 before the House Armed Services Committee’s Subcommittee on Terrorism, Unconventional Threats and Capabilities. [Read more about Goodman's congressional committee] [pdf]
Q&A with Ling Liu at University of Illinois-Chicago Distinguished Lecture
by Ryan Mark, Medill Reports, April 30, 2008 [Read more about Liu's Q&A and lecture ]
Kraken Spawns a Clash of the Titans
by Brian Krebs, Washingtonpost.com, April 8, 2008 [Read more about Kraken]
GTISC Professor Nick Feamster featured in Technology Review article, Defending Laptops from Zombie Attacks
Technology Review Published by MIT, March 21, 2008 [Read more]
Computing Assistant Professors Nick Feamster and Adam Kalai Win Sloan Fellowships
Two School of Computer Science faculty members, Nick Feamster in the Networking and Telecommunications Group and GTISC, and Adam Kalai in the Theory Group and ARC ThinkTank, have been awarded the prestigious Alfred P. Sloan fellowships for 2008. [Read more about the Sloan Fellowship winnters]
Cisco Security Advisory Based on GTISC Research
Cisco article, February 13, 2008 [Read more about the security advisory]
Symposium on Computation and Journalism
Feb 22-23, 2008,
Georgia Institute of Technology, Atlanta, GA;
Keynotes: Khrishna Bharat (Google) and Michael Skiloer (MPR)
Hosted by GVU Center at Georgia Tech [More Information]
Prototype software sniffs out, disrupts botnets
Researchers this week detailed a prototype system to identify and eradicate botnets in the wild. NetworkWorld Community Blog, February 15, 2008 [Read more]
Use of Rogue DNS Servers on Rise
Mendacious machines controlled by hackers that reroute Internet traffic from infected computers to fraudulent Web sites are increasingly being used to launch attacks, according to a paper published this week by researchers with the Georgia Institute of Technology and Google Inc. By Jordan Robertson, Associated Press, February 14, 2008 [Read Article]
Phishing Attacks Could Be Undetectable
Companies and users are at serious risk from a loophole in the the Domain Name System (DNS) that could make financial scams such as phishing attacks practically undetectable, according to a study presented this week by researchers from Georgia Tech and Google. By Matthew Broersma, TechWorld, February 12, 2008 [Read Article]
GTISC Faculty Comments on Encryption
GTISC Professor Jonathon Giffin comments on password and computer encryption. By Ashley Phillips and Scott Michels, ABC News.com, February 11, 2008 [Read Article]
SANS Flags Browsers, Botnets as Top Security 'Menaces'
SANS Institute revealed its list of the top menaces facing IT in the coming year. By David Nagel, Campus Technology, January 17, 2008 [Read Article]
GTISC Director Featured in Wall Street Journal Article, "Web Sites to Keep You On Budget"
GTISC Director Mustaque Ahamad gives safety advice on online money management tools. Wall Street Journal, January 13, 2008 [Read Article]
Recent GTISC Professor Published Articles
Herbert S. Lin, Alfred Z. Spector, Peter G. Neumann, Seymour E. Goodman, "Toward a Safer and More Secure Cyberspace," Inside Risks, Comm. of the ACM, Vol. 50, No. 10, October 2007, 128.
S. E. Goodman, Robert Ramer, "Identify and Mitigate the Risks of Global IT Outsourcing," Editorial Preface, The Journal of Global Information Technology Management (JGITM), Vol. 10, No. 4, October 2007, 1-6.
Seymour E. Goodman, Rob Ramer, "Global Sourcing of IT Services and Information Security: Prudence Before Playing," Comm. of the American Association for Information Systems (CAIS), Vol, 20, December 2007, 812-823.
GTISC Researchers mentioned in Spam Research Projects
GTISC researchers listed as part of a dozen research projects underway that focus on new technology and techniques to stop spam. By Cara Garretson, Network World, November 20, 2007 [Read Article]
New Free Full Text Book: Toward a Safer and More Secure Cyberspace
Sources/Authors: Seymour E. Goodman and Herbert S. Lin, Editors, Committee on Improving Cybersecurity Research in the United States, National Research Council [The National Academies Press, Read This Free Online]
Report: Hackers to Target Web 2.0, Mobile, RFID Technologies in '08
October 10, 2007 - The coming year will see hackers set their sights on users of Web 2.0, mobile and RFID technologies due to the vast potential for financial gain each represents, according to a cybersecurity think tank. CIO, Al Sacco [Read More]
Made for Hacking
October 3, 2007 - Vint Cerf, Google's chief Internet evangelist, says the Internet is insecure. Forbes, Andy Greenberg [Read More]
Online Video Emerges as PC Security Hole
October 3, 2007 - Online videos aren't just for bloopers and rants — some might also be conduits for malicious code that can infect your computer. AP [Read More]
GTISC Names Advisory Board
September 14, 2007 - The Georgia Tech Information Security Center (GTISC) has created a 19-member board of industry advisors to give GTISC advice and strategy as it grows as an academic research organization in information security.
[View Atlanta Business Chronicle article ]
Information Security Seminar
The GTISC Information Security Seminar is in full swing for the fall semester. The weekly seminar provides interested students and faculty with access to the latest security problems faced by industry and commerce as well as state-of-the-art solutions developed by researchers at Georgia Tech and other academic institutions. For complete information, see the seminar's website.
First version of BotHunter is officially released now! (July 30, 2007)
SRI International and Georgia-Tech Institute (under the Cyber-TA research project) are pleased to announce the first Internet distribution of BotHunter, version 0.9.3. BotHunter introduces a new kind of passive network perimeter monitoring scheme, designed to recognize the intrusion and coordination dialog that occurs during a successful malware infection. It employs a novel dialog-based correlation engine (patent pending), which recognizes the communication patterns of malware-infected computers within your network perimeter. BotHunter is available for download and runs under Linux Fedora, SuSE, and Debian distributions.
Stolen data now more marketable
Hackers today are cyber pros going for big bucks, not kids or vandals.
Mustaque Ahamad, director of the Georgia Tech Information Security Center, comments on recent development of hackers. "Traditionally, hacking started with some kids in a basement doing it for fun or for bragging rights, " said Ahamad. "The last several years, the trend shifted to criminals and now it's more of an organized crime." By Madhusmita Bora, St Petersburg Times, Published July 8, 2007
Mike Nelson-Palmer was presented with an Information Assurance Courseware Evaluation certificate at The Colloquium for Information Systems Security Education Conference, June 5, 2007
GTISC Industrial Partner, SpiDynamics bought by HP, HP Press Release, June 19, 2007 ( pdf)
Nick Feamster awarded joint NSF award with MIT, CMU and Berkeley for $1.2M over 3 years, "Towards an Accountable Internet Architecture."
The growing cryptography group, led by an assistant professor Alexandra Boldyreva, had proceedings published from Asiacrypt '06, PKC '07, IEEE Security and Privacy '07, and will appear at the Data and Applications Security '07 and Crypto '07 conferences.
Georgia Tech's Identity Assertion Work Highlighted in Nortel's Labs and External Research Efforts, Nortel's Future Made Simple, May 2007 ( pdf)
ACM President's Award Honors Leading Proponent of Computer Security, Ethics, and Safety, Association for Computing Machinery - April 3, 2007
Schmidt: Cybersecurity a Private Affair, Search Security - March 8, 2007
Howard Schmidt Career Profile featured in Dark Reading, March 6, 2007
Early time change could throw your computer But impact of March 11 switch to daylight-saving time is not really known featuring Johnathon Giffin, The Atlanta Journal-Constitution - March 3, 2007
Nick Feamster Receives NSF CAREER Award, February 14, 2007
How Does The Hacker Economy Work? InformationWeek - February 10, 2007
GTISC Expert Discusses How To Combat Hackers
Professor of the Practice and world-renowned cybersecurity expert Howard Schmidt will speak at the Global Knowledge Congress' upcoming conference. November 6, 2006 ( pdf)
Georgia Precints to Use Paper Trail Mustaque Ahamad, director of the Georgia Tech Information Security Center, said most computer scientists believe voting machines are susceptible to tampering. Atlanta Journal Constitution (subcription required or download pdf version ), November 4, 2006
Data reveal trends to help researchers building better e-mail filters, The Whistle, October 9 edition ( pdf)
US experts take on VoIP security, One Stop Click, UK - Oct 2, 2006
VoIP Security Research Partnership Announced, Georgia Tech News Room, GA - Sep 27, 2006
Ga. Tech, BellSouth, Internet Security Systems initiate VoIP ... PhysOrg.com, VA - Sep 27, 2006
Georgia Tech Information Security Center, BellSouth and Internet ... Yahoo! News (press release) - Sep 27, 2006
VoIP Security Research Technology News Daily, AZ - Sep 28, 2006
Georgia Tech, BellSouth, Internet Security Systems Team Up For ... Local Tech Wire, SC - Sep 28, 2006
US experts launch VoIP security partnership, VNUNet.com, UK - Sep 28, 2006
BellSouth, ISS Back VoIP Security Effort, Telecomweb - Sep 27, 2006
US experts launch VoIP security partnership, iT News, Australia - Sep 28, 2006
Improving Cyber Security Research In The U.S., August 29, 2006
GTISC and PhD student David Dagon presents blueprints for an industrywide, automated "malware repository"WashingtonPost.com, August 9, 2006
Professor Goodman Addresses Cyber Security in Africa, August 2, 2006
Howard Schmidt's article, Shield Your Privacy or Be Exposed, Business Trends Quarterly, July 31, 2006 (pdf)
Howard Schmidt Receives Two Distinguished Honors
GTISC's renowned cyber security expert is a Georgia Tech Professor of Practice, and the new president of ISSA's International Board of Directors.
Research to Stem Spammers Accepted by Top Conference Nick Feamster, Assistant Professor within the Computing Sciences and Systems (CSS) division, and Ph.D. student Anirudh Ramachandran recently had their work accepted by ACM's SIGCOMM 2006.
Business Vital to Keeping Identity Info Safe Atlanta Business Chronicle, June 23, 2006
GTISC Director Says NSA's Controversial Traffic Analysis Is No Trivial Project Daily Report, May 19, 2006 ( PDF)
GTISC Director, Mustaque Ahamad, is panelist for Cybersecurity Breakfast event hosted by IBM and Metro Atlanta Chamber of Commerce. Moderator is GTISC alum Phyllis Schneck.
GTISC Pam Hassebroek, a student working with College of Computing Professor Sy Goodman and the Georgia Tech Information Security Center (GTISC) was honored by the International Information Systems Security Certification Consortium. (Business Wire, April 27, 2006)
GTISC Named Industrial Partner by Verso: An Alliance for VoIP Security (Business Wire, Mar 8, 2006) ( PDF)
GTISC co-director, Dr. Sy Goodman chaired the Risks and Exposures Subcommittee, for the major ACM study of offshoring outsourcing released at the beginning of March 2006. Read the report.
Ga. Tech embraces 'new face of computing' (AJC, Feb 20, 2006) ( PDF)
The Kama Sutra worm "will make a lot of people very unhappy on February 3rd" says expert Merrick Furst (CNN Technology, Feb 1, 2006) ( PDF)
Botnets are #1 emerging internet threat says CoC Distinguished Professor Merrick Furst (CNN Access, Jan 31, 2006) ( PDF)
Bot-buster Merrick Furst says botnets are today's top security threat (Red Herring, Jan 27, 2006) ( PDF)
Experts: Wireless security is immature (CNN.com, Nov 17, 2005)
Experts: WI-FI needs more security against hackers By Douglas Sams, staff writer (Gwinnett Daily Post, Nov 16, 2005)
As wireless grows, so do security risks by Rich DeMillo Dean of the CoC (AJC, Nov 3, 2005) ( PDF)
CipherTrust Sponsors the 2005-2006 Georgia Tech Information Security Center (GTISC) Distinguished Lecture Series (Business Wire, Sept 15, 2005)
The 2005-2006 GTISC Distinguished Lecture Series, sponsored by CipherTrust, Inc., will have the first lecture on September 27, and it will be given by Anthony Michael (Tony) Rutkowski, who is Vice-President for Regulatory Affairs within the Communication Services Division at VeriSign, Inc.
GTISC members Julian Grizzard and Greg Conti recently participated in the Defcon and Black Hat conferences. Grizzard spoke at Defcon on the subject of surgical recovery from rootkit installations. Conti spoke at Black Hat on building a PVR for security datastreams and at Defcon on countering denial of information attacks. (July 27-31, 2005)
Cisco Critical Infrastructure Assurance Group (CIAG) Supports Education at Top Institutions (Cisco System, June 28, 2005)