<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-8248801325449891837</atom:id><lastBuildDate>Mon, 12 May 2025 21:09:32 +0000</lastBuildDate><category>CyLab</category><category>CyBlog</category><category>Cyber Security News</category><category>Cyber Security</category><category>Information Security</category><category>Richard Power</category><category>Privacy</category><category>Mobility</category><category>RSA Conference</category><category>Adrian Perrig</category><category>Virgil Gliigor</category><category>Lorrie Cranor</category><category>Mobility Research Center</category><category>CUPS</category><category>Alessandro  Acquisti</category><category>Healthcare technology</category><category>Mobile Healthcare</category><category>Anupam Datta</category><category>RSA Conference 2009</category><category>Usability</category><category>CyLab Business Risks Forum</category><category>CyLab Partners Benefits</category><category>CyLab Seminar Series</category><category>SOUPS</category><category>TIW 2010</category><category>Trustworthy Computing</category><category>Gary McGraw</category><category>Jonathan McCune</category><category>Lujo Bauer</category><category>Glimpses into the 21st Century Threat Matrix</category><category>BSIMM</category><category>IEEE</category><category>IEEE Security and Privacy Symposium</category><category>Martin Griss</category><category>Silicon Valley Campus</category><category>Norman Sadeh</category><category>Pradeep Khosla</category><category>Biometrics</category><category>Carnegie Mellon Silicon Valley</category><category>Cigital</category><category>Economics of Security</category><category>Inspire Innovation -- The Campaign for Carnegie Mellon</category><category>Marios Savvides</category><category>Nicholas Christin</category><category>RSA Conference 2010</category><category>Security Awareness and Education</category><category>Software Security</category><category>USENIX Security Symposium</category><category>Behavorial Economics</category><category>Black Hat Briefing</category><category>BlackHat Briefings</category><category>CERT</category><category>Center for Usable Privacy and Security</category><category>Christopher Burgess</category><category>Cloud Computing</category><category>Cormac Herley</category><category>Cyberwar</category><category>David Brumley</category><category>Forensics</category><category>INI</category><category>Insider Threat</category><category>Instinctive Computing</category><category>Jason Hong</category><category>Melissa Hathaway</category><category>Yang Cai</category><category>Android</category><category>Brian Krebs</category><category>CSO Magazine</category><category>Code 2600</category><category>Economic Espionage</category><category>Ed Stroz</category><category>Edward Snowden</category><category>Facebook</category><category>Fortify</category><category>Instinctive Computing Lab</category><category>Jennifer Bayuk</category><category>Mobile App</category><category>Moxie Marlinspike</category><category>Priya Narasimhan</category><category>Rebecca Herold</category><category>Safeslinger</category><category>Smartphone</category><category>TED</category><category>Web Security</category><category>social media</category><category>ACLU</category><category>Alert Enterprise</category><category>Application Security</category><category>Bank InfoSecurity</category><category>Bob Sullivan</category><category>Brookings Institute</category><category>Browser Vulnerabilities</category><category>Bruce Schneier</category><category>Business Continuity</category><category>CERIAS</category><category>CSAIL</category><category>Christopher Soghoian</category><category>Collin Jackson</category><category>Computer Security Day</category><category>Crisis Management</category><category>CyLab Partners Conference</category><category>Cyber Security Awareness Month</category><category>Dan Geer</category><category>Data Privacy Day</category><category>Digital Video</category><category>E-Discovery</category><category>Erin Kenneally</category><category>F. Lynn McNulty</category><category>GhostNet</category><category>Glenn Greenwald</category><category>Google</category><category>Greg Ganger</category><category>Heartbleed</category><category>History of Hacking</category><category>IAPP</category><category>Industry Analysts</category><category>Information Security Magazine Security Seven Awards</category><category>James Morris</category><category>Kevin Poulsen</category><category>Lawrence Dietz</category><category>Liz King</category><category>Locaccino</category><category>Metricon</category><category>Michael Mimoso</category><category>Mike Susong</category><category>NGCRC</category><category>Nicole Perlroth</category><category>Northrop Grumman</category><category>Northrop Grumman Cybersecurity Research Consortium</category><category>Osman Yagan</category><category>Patrick Tague</category><category>Peter Neumann</category><category>Phishing</category><category>RSA Conference 2014</category><category>Rik Farrow</category><category>Robert Lemos</category><category>Robotics</category><category>SaaS</category><category>Securing the Digital Home</category><category>Sensor Networks</category><category>TEDGlobal</category><category>TEDx</category><category>Tal Global</category><category>Twitter</category><category>Verizon</category><category>Virtualization</category><category>War Games</category><category>White House</category><category>Wireless</category><category>YINZCAM</category><title>CyBlog: Security, Privacy and Mobility in the Information Age</title><description></description><link>http://www.cyblog.cylab.cmu.edu/</link><managingEditor>noreply@blogger.com (Carnegie Mellon CyLab)</managingEditor><generator>Blogger</generator><openSearch:totalResults>187</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8248801325449891837.post-5068005596199797053</guid><pubDate>Tue, 28 Jul 2015 18:19:00 +0000</pubDate><atom:updated>2015-07-28T11:19:14.444-07:00</atom:updated><title>SOUPS 2015: Usable Privacy and Security and the Human Factor</title><atom:summary type="text">The CyLab Usable Privacy and Security Laboratory (CUPS) 11th Annual Symposium on Usable Privacy and Security (SOUPS) was hosted by Carleton University in Ottawa, Canada on July 22-24, 2015. CUPS Director Lorrie Cranor welcomed the attendees for three days of workshops and proceedings with participation from researchers in business, academia and government. SOUPS underlying theme every year is the</atom:summary><link>http://www.cyblog.cylab.cmu.edu/2015/07/soups-2015-usable-privacy-and-security.html</link><author>noreply@blogger.com (Carnegie Mellon CyLab)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKmvftWrCSC31nnI1wCndGtFpfb-CSy7DI8m2O8uqeUmjkSNR7wzbpWnX3g7z4l7Bg2d7_RRmTUlfF2zEpZM69M9kTR25hYTj_SVPc1VN7KyJCEHjJkrdyMKQs8x-C3UNRwZ2nmNfStvY/s72-c/keynote.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8248801325449891837.post-6717666288947705011</guid><pubDate>Thu, 29 Jan 2015 19:47:00 +0000</pubDate><atom:updated>2015-01-29T12:04:36.277-08:00</atom:updated><title>New CMU Study Highlights Challenges of Complex Trade-Off in Privacy Decision-Making; “Privacy is not a modern invention, but a historically universal need,” says CyLab&#39;s Acquisti</title><atom:summary type="text">In &quot;Privacy and Human Behavior in the Information Age&quot;, a review published in the Jan. 30 special issue of the journal Science, CMU CyLab&#39;s Alessandro Acquisti and a team of fellow CMU researchers have detailed the privacy hurdles people face while navigating in the information age, and offered some perspectives on what should be done about privacy at a policy level. 



In their review, Acquisti</atom:summary><link>http://www.cyblog.cylab.cmu.edu/2015/01/new-cmu-study-highlights-challenges-of.html</link><author>noreply@blogger.com (Carnegie Mellon CyLab)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8248801325449891837.post-6158238031497127194</guid><pubDate>Fri, 09 Jan 2015 15:31:00 +0000</pubDate><atom:updated>2015-01-09T10:51:05.271-08:00</atom:updated><title>CMU CyLab&#39;s Dr. Lorrie Cranor named ACM Fellow </title><atom:summary type="text">

Dr. Lorrie Cranor, 10th Annual CyLab Partners Conference (October 2013)

Lorrie Faith Cranor, a professor
in the Institute for Software Research and director of the CyLab Usable Privacy and Security Lab, is
one of 47 computer scientists named as 2014
Fellows by the Association for Computing Machinery.




Cranor is a professor of computer science
and of engineering and public policy and is </atom:summary><link>http://www.cyblog.cylab.cmu.edu/2015/01/cmu-cylabs-dr-lorrire-cranor-named-acm.html</link><author>noreply@blogger.com (Carnegie Mellon CyLab)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXwBSf0HqB1xhL38kiR5tXkfGYaKGEfyT_4ZCofgtxPe1mRgofbZu66WzWWlOlqWMnQnnLm4uW8_u5A7X6C1oQCiq-0EFvhVqpehhz3wSZNZMewQh302-vuOzja59hwiZ816LGuoRJ6MA/s72-c/Untitled.png" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8248801325449891837.post-2414895402271588974</guid><pubDate>Thu, 20 Nov 2014 16:51:00 +0000</pubDate><atom:updated>2014-11-20T09:02:56.554-08:00</atom:updated><title>CyLab Chronicles: Researchers Share Compelling Work with Silicon Valley Thought Leaders, Technical Experts, Law Enforcement Officials and Media at Fall 2014 Executive Briefing </title><atom:summary type="text">


The Fall 2014 CyLab Executive Briefing,&amp;nbsp; held at Carnegie Mellon University&#39;s Silicon Valley campus (NASA Research Park), brought together an RSVP invitation-only group of&amp;nbsp; C-level executives, thought leaders, technical experts, venture capitalists, government investigators and one cyber journalist (with an exclusive) for an update from one of the world&#39;s premiere cyber security and </atom:summary><link>http://www.cyblog.cylab.cmu.edu/2014/11/cylab-researchers-engage-silicon-valley.html</link><author>noreply@blogger.com (Carnegie Mellon CyLab)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHQ7XbUCk3PpkjnJ0Kt7gUUyECVIeZpZBQj38VSR3MTZZkYSCZol3_nNVla2x2oG0ppVPthI9zZLNP53xl72-5-yJds2yEKVh8shZH5PtIeRZRU7wb3t4ysd9rxAiaxT6sJvWP4mtcdu4/s72-c/cylab-stack-block.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8248801325449891837.post-1834469399489620198</guid><pubDate>Tue, 28 Oct 2014 18:43:00 +0000</pubDate><atom:updated>2014-11-06T11:56:24.350-08:00</atom:updated><title>CyLab Chronicles: 2014 CyLab Partners Conference Explores Latest Research Into Vital Cyber Security and Privacy Issues</title><atom:summary type="text">




Student Poster Session, 11th Annual CyLab Partners Conference (October 2014)

The eleventh annual CyLab Partners Conference was held at the main campus of Carnegie Mellon University in Pittsburgh, Pennsylvania, on October 7th and 8th, 2014.

For two days, representatives of a dozen partners were briefed on CyLab&#39;s latest research across of broad spectrum of vital issues in the fields of </atom:summary><link>http://www.cyblog.cylab.cmu.edu/2014/10/2014-cylab-partners-conference-explores.html</link><author>noreply@blogger.com (Carnegie Mellon CyLab)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjE6QKUuVhz4GVAqrP6h84TLO5xg3bSsA0dd6xnP_03j8uF609pRww4UZOOMIhfIEjvIeR9p23G7SyAGaePox6mK4Da-A8aZ2SNHAy0Zb61suHvpZBJJvJtCvCDN2S4RrPtA5iEnqSFAJ4/s72-c/IMG_0881(1).JPG" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8248801325449891837.post-7552717561191101345</guid><pubDate>Wed, 27 Aug 2014 15:52:00 +0000</pubDate><atom:updated>2014-08-28T08:34:36.665-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">USENIX Security Symposium</category><title>CMU CyLab Researchers Wins USENIX Security 2014 Best Student Paper Award; Seven Other CMU Papers Delivered</title><atom:summary type="text">



As with other leading conferences in the vital fields of cyber security and privacy, Carnegie Mellon University (CMU) CyLab researchers distinguished themselves at USENIX Security 2014, the 23rd USENIX Security Symposium, held in San Diego, California, 8/20/14-8/22/14.

Three hundred fifty papers were submitted to the USENIX program committee, and the ensuing process, which involved 1,340 </atom:summary><link>http://www.cyblog.cylab.cmu.edu/2014/08/cmu-cylab-researcher-wins-usenix.html</link><author>noreply@blogger.com (Carnegie Mellon CyLab)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHQ7XbUCk3PpkjnJ0Kt7gUUyECVIeZpZBQj38VSR3MTZZkYSCZol3_nNVla2x2oG0ppVPthI9zZLNP53xl72-5-yJds2yEKVh8shZH5PtIeRZRU7wb3t4ysd9rxAiaxT6sJvWP4mtcdu4/s72-c/cylab-stack-block.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8248801325449891837.post-8190695413510418092</guid><pubDate>Thu, 21 Aug 2014 20:20:00 +0000</pubDate><atom:updated>2014-08-22T23:48:31.045-07:00</atom:updated><title>CMU CyLab PPP and CUPS teams win “Capture the Flag” and “Crack Me If You Can&quot; contests at DEFCON 22</title><atom:summary type="text">

Members of CMU CyLab&#39;s Plaid Parliament of Pwning 
(PPP)

Carnegie Mellon University demonstrated its cyber prowess at DEFCON 22 by winning the “Capture the Flag” and “Crack Me If You Can” contests ...

Carnegie Mellon’s computer hacking team, the Plaid Parliament of Pwning (PPP), took first place for the second consecutive year in the Capture the Flag (CTF) contest. Globally, hundreds of teams</atom:summary><link>http://www.cyblog.cylab.cmu.edu/2014/08/cmu-cylab-ppp-and-cups-teams-win.html</link><author>noreply@blogger.com (Carnegie Mellon CyLab)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTbO2fSS-un5s3C-k8a0QGPcJEOnZoUEp_4h8rvFZQH1POmLo8MN1To2nSr6msJYBAGgU-Rr-vtn90yYiAeub9hBctsnDOpxKfpRkoP43uudzNivt72XGRGsG4RMzCBSfpLCnVtvdqoM8/s72-c/IMG_4667.jpeg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8248801325449891837.post-1261400749047648477</guid><pubDate>Sun, 13 Jul 2014 22:49:00 +0000</pubDate><atom:updated>2014-07-17T07:15:02.027-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">ACLU</category><category domain="http://www.blogger.com/atom/ns#">Alessandro  Acquisti</category><category domain="http://www.blogger.com/atom/ns#">Christopher Soghoian</category><category domain="http://www.blogger.com/atom/ns#">CUPS</category><category domain="http://www.blogger.com/atom/ns#">Cyber Security</category><category domain="http://www.blogger.com/atom/ns#">CyLab</category><category domain="http://www.blogger.com/atom/ns#">Edward Snowden</category><category domain="http://www.blogger.com/atom/ns#">Facebook</category><category domain="http://www.blogger.com/atom/ns#">Glenn Greenwald</category><category domain="http://www.blogger.com/atom/ns#">Google</category><category domain="http://www.blogger.com/atom/ns#">IAPP</category><category domain="http://www.blogger.com/atom/ns#">Jason Hong</category><category domain="http://www.blogger.com/atom/ns#">Lorrie Cranor</category><category domain="http://www.blogger.com/atom/ns#">Norman Sadeh</category><category domain="http://www.blogger.com/atom/ns#">Privacy</category><category domain="http://www.blogger.com/atom/ns#">SOUPS</category><title>A Decade Into Its Vital Work, Another Savory SOUPS, A Report from the 10th Annual Symposium On Usable Privacy and Security</title><atom:summary type="text">





CMU CyLab&#39;s Dr. Lorrie Cranor, Founder of CUPS and SOUPS preps
for welcoming remarks at SOUPS 2014





The CyLab Usable Privacy and Security Laboratory (CUPS) 10th Annual Symposium on Usable Privacy and Security (SOUPS) was hosted by Facebook at its headquarters in Menlo Park, California (7/9/14 - 7/11/14). CUPS Director Lorrie Cranor welcomed the attendees, with the record-breaking </atom:summary><link>http://www.cyblog.cylab.cmu.edu/2014/07/a-decade-into-its-vital-work-savory.html</link><author>noreply@blogger.com (Carnegie Mellon CyLab)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge6MMpI2s5Iua4sjiLPJDLymY1OwX718YroEImkrUVZEeSxoh2jpVO1par09klRbM87hq0P8SLa2euyb9BL_bB0L937rIcp94hW5rM6g770B9Uxf3ICxThFgPTisuEByOfx5sMu4Ivy-Q/s72-c/photo(14).JPG" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8248801325449891837.post-1830634041752185118</guid><pubDate>Wed, 25 Jun 2014 18:16:00 +0000</pubDate><atom:updated>2014-06-26T08:57:04.242-07:00</atom:updated><title>CyLab Researchers  In 5-Year NSF-Funded Project to Overcome Challenges in Synchronizing Time for Cyber-Physical Systems</title><atom:summary type="text">

A Sundial in Saint-Rémy-de-Provence, France (Source: Wikimedia)



NOTE:
 This CyLab Chronicles is cross-posted on both the Carnegie Mellon CyLab
 public site and the CyLab partners-only portal. - See more at: 
http://www.cyblog.cylab.cmu.edu/#sthash.e9Z6CBOz.dpuf

The National Science Foundation (NSF) recently announced &quot;a five-year, $4 million award to tackle the challenge of synchronizing </atom:summary><link>http://www.cyblog.cylab.cmu.edu/2014/06/cylab-researchers-in-5-year-nsf-funded.html</link><author>noreply@blogger.com (Carnegie Mellon CyLab)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifiutZU8EphpGnA82GuYiI8V0sVGTyVTztD5glKx9srN9zHn0WwK3bj76ztl8tlconYGHuZGiVb6LBjI81TXDEVeZCxj5p972IhdONKCn81IZXQLETsZh7cb9lmRhfffhDSxq6e-QUZrI/s72-c/Saint-remy-de-provence-cadran-solaire.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8248801325449891837.post-2153051098267708088</guid><pubDate>Mon, 09 Jun 2014 19:39:00 +0000</pubDate><atom:updated>2014-06-17T09:55:23.586-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Anupam Datta</category><category domain="http://www.blogger.com/atom/ns#">Privacy</category><title>CyLab Chronicles: Anupam Datta on Impact and Implications of IEEE Award Winning Paper, &quot;Bootstrapping Privacy Compliance in Big Data Systems&quot;</title><atom:summary type="text">

NOTE: This CyLab Chronicles is cross-posted on both the Carnegie Mellon CyLab public site and the CyLab partners-only portal.

Anupam Datta is an Associate Professor at Carnegie Mellon University (CMU) and a leading researcher at CMU CyLab. CyLab Chronicles recently sat down with him to discuss his team&#39;s latest successes and the future direction of their vital research. Here is our </atom:summary><link>http://www.cyblog.cylab.cmu.edu/2014/06/cylab-chronicles-anupam-datta-on-impact.html</link><author>noreply@blogger.com (Carnegie Mellon CyLab)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgauqhMGGYV1WgtUCjEH3JuKa8L9BSC83b8HzvDPdSM5C7Rz1cfJGg5Bt3L26iGttZ3GufqpTTAqRifzjyxfRi3oIPaWhTo8yALF5SPR1m8caMJ9c1pCvDa-X9h_0X3zSlJbXVRvvDHUTQ/s72-c/tns.qjulpkat.170x170-75.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8248801325449891837.post-5167355837615771344</guid><pubDate>Thu, 22 May 2014 20:16:00 +0000</pubDate><atom:updated>2014-05-25T10:06:38.761-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Adrian Perrig</category><category domain="http://www.blogger.com/atom/ns#">Anupam Datta</category><category domain="http://www.blogger.com/atom/ns#">Cyber Security</category><category domain="http://www.blogger.com/atom/ns#">CyLab</category><category domain="http://www.blogger.com/atom/ns#">IEEE</category><category domain="http://www.blogger.com/atom/ns#">IEEE Security and Privacy Symposium</category><category domain="http://www.blogger.com/atom/ns#">Lujo Bauer</category><category domain="http://www.blogger.com/atom/ns#">Virgil Gliigor</category><title>IEEE Security and Privacy Symposium 2014: Another Challenging Year, Another Compelling IEEE SSP, and Another Significant Contribution from CMU CyLab</title><atom:summary type="text">




Giovanni Domenico Tiepolo - Procession of the Trojan Horse in Troy (1773)

Another challenging year in cyber security and privacy means another compelling IEEE Security and Privacy Symposium, and another compelling IEEE Security and Privacy Symposium means another significant contribution from Carnegie Mellon University CyLab.

This year, three hundred and thirty three papers were submitted.</atom:summary><link>http://www.cyblog.cylab.cmu.edu/2014/05/ieee-security-and-privacy-symposium.html</link><author>noreply@blogger.com (Carnegie Mellon CyLab)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYJGNNFFV0RqRPkGKSSkgBRFFx6fL7-_d-97nkW4MQMBv3xkib-vAu5CofOVIs3fuXgXrXNbexLKEDY8P_zLRwqud05uv3LjQOhR9rXGgdFQXmkQ0IgeXt95qvDc_eUZrIrakIyiP-RTo/s72-c/the-procession-of-the-trojan-horse-in-troy-1773.jpg!Blog.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8248801325449891837.post-4523014926846300145</guid><pubDate>Tue, 15 Apr 2014 20:48:00 +0000</pubDate><atom:updated>2014-04-17T07:26:08.814-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Android</category><category domain="http://www.blogger.com/atom/ns#">Cyber Security</category><category domain="http://www.blogger.com/atom/ns#">CyLab</category><category domain="http://www.blogger.com/atom/ns#">Heartbleed</category><category domain="http://www.blogger.com/atom/ns#">Information Security</category><category domain="http://www.blogger.com/atom/ns#">Mobility</category><title>CyLab Research Sheds Light on Heartbleed and Its Implications</title><atom:summary type="text">
Heartbleed is a significant event along the cyber security timeline. Its consequences will be with us all for quite awhile. If you haven&#39;t already come to grips with this issue, you should do so urgently.

For some guidance go to http://heartbleed.com/

To verify if a particular server is vulnerable, go to: http://filippo.io/Heartbleed/

For a command-line tool, go to: https://github.com/</atom:summary><link>http://www.cyblog.cylab.cmu.edu/2014/04/cylab-research-sheds-light-on.html</link><author>noreply@blogger.com (Carnegie Mellon CyLab)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgauqhMGGYV1WgtUCjEH3JuKa8L9BSC83b8HzvDPdSM5C7Rz1cfJGg5Bt3L26iGttZ3GufqpTTAqRifzjyxfRi3oIPaWhTo8yALF5SPR1m8caMJ9c1pCvDa-X9h_0X3zSlJbXVRvvDHUTQ/s72-c/tns.qjulpkat.170x170-75.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8248801325449891837.post-6750208461595017305</guid><pubDate>Wed, 12 Mar 2014 18:14:00 +0000</pubDate><atom:updated>2014-04-16T08:36:44.916-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Anupam Datta</category><category domain="http://www.blogger.com/atom/ns#">CyLab</category><category domain="http://www.blogger.com/atom/ns#">CyLab Seminar Series</category><category domain="http://www.blogger.com/atom/ns#">Privacy</category><title>New on @CyLab @YouTube Channel: Anupam Data - Privacy through Accountability (Full-Length Seminar)</title><atom:summary type="text">


The CyLab Seminar Series is held on Mondays during the school year, at CyLab HQ on the main campus of Carnegie Mellon University (Pittsburgh, PA.) These weekly talks feature the latest research from CyLab faculty and visiting colleagues from other centers of academic research into cyber security and privacy. Occasional Business Risk Forum events introduce the insights of cybersecurity and </atom:summary><link>http://www.cyblog.cylab.cmu.edu/2014/03/new-on-cylab-youtube-channel-anupam.html</link><author>noreply@blogger.com (Carnegie Mellon CyLab)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgauqhMGGYV1WgtUCjEH3JuKa8L9BSC83b8HzvDPdSM5C7Rz1cfJGg5Bt3L26iGttZ3GufqpTTAqRifzjyxfRi3oIPaWhTo8yALF5SPR1m8caMJ9c1pCvDa-X9h_0X3zSlJbXVRvvDHUTQ/s72-c/tns.qjulpkat.170x170-75.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8248801325449891837.post-1822070194074955327</guid><pubDate>Wed, 12 Mar 2014 18:08:00 +0000</pubDate><atom:updated>2014-04-16T08:36:28.092-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cyber Security</category><category domain="http://www.blogger.com/atom/ns#">CyLab</category><category domain="http://www.blogger.com/atom/ns#">CyLab Seminar Series</category><category domain="http://www.blogger.com/atom/ns#">Osman Yagan</category><category domain="http://www.blogger.com/atom/ns#">Sensor Networks</category><category domain="http://www.blogger.com/atom/ns#">Wireless</category><title>New on @CyLab @YouTube Channel: Osman Yagan - Designing Secure and Reliable Wireless Sensor Networks (Full-length CyLab Seminar)</title><atom:summary type="text">


The CyLab Seminar Series is held on Mondays during the school year, at CyLab HQ on the main campus of Carnegie Mellon University (Pittsburgh, PA.) These weekly talks feature the latest research from CyLab faculty and visiting colleagues from other centers of academic research into cyber security and privacy. Occasional Business Risk Forum events introduce the insights of cybersecurity and </atom:summary><link>http://www.cyblog.cylab.cmu.edu/2014/03/new-on-cylab-youtube-channel-osman.html</link><author>noreply@blogger.com (Carnegie Mellon CyLab)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgauqhMGGYV1WgtUCjEH3JuKa8L9BSC83b8HzvDPdSM5C7Rz1cfJGg5Bt3L26iGttZ3GufqpTTAqRifzjyxfRi3oIPaWhTo8yALF5SPR1m8caMJ9c1pCvDa-X9h_0X3zSlJbXVRvvDHUTQ/s72-c/tns.qjulpkat.170x170-75.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8248801325449891837.post-3379280034368160319</guid><pubDate>Fri, 07 Mar 2014 18:29:00 +0000</pubDate><atom:updated>2014-04-16T08:36:08.600-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Brian Krebs</category><category domain="http://www.blogger.com/atom/ns#">BSIMM</category><category domain="http://www.blogger.com/atom/ns#">Cyber Security</category><category domain="http://www.blogger.com/atom/ns#">Dan Geer</category><category domain="http://www.blogger.com/atom/ns#">Edward Snowden</category><category domain="http://www.blogger.com/atom/ns#">F. Lynn McNulty</category><category domain="http://www.blogger.com/atom/ns#">Gary McGraw</category><category domain="http://www.blogger.com/atom/ns#">Kevin Poulsen</category><category domain="http://www.blogger.com/atom/ns#">Nicole Perlroth</category><category domain="http://www.blogger.com/atom/ns#">RSA Conference</category><category domain="http://www.blogger.com/atom/ns#">RSA Conference 2014</category><title>Descending Into the Maelstrom - Notes on RSA Conference 2014</title><atom:summary type="text">

Dan Geer: &quot;We are all intelligence officers now.&quot; (RSA Conference 2014)


Descending Into the Maelstrom -- Notes on RSA Conference 2014

By Richard Power&amp;nbsp;
&amp;nbsp;&amp;nbsp;
I confess that I was tempted to simply go to Trustycon instead. But from a historical perspective, I could not resist the bitter ironies that RSA Conference 2014 offered up. After all, I had been there, two decades earlier, </atom:summary><link>http://www.cyblog.cylab.cmu.edu/2014/03/descending-into-maelstrom-notes-on-rsa.html</link><author>noreply@blogger.com (Carnegie Mellon CyLab)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5boULAuoqf8YfxxtjfvUvUxvasS1xpNN0iHBa82hq7gzLt1lGeYK0SC2A8D3Nho5v4ZSvwwbwr2XySTiRNaC5msAPMHHdYbbH69mlkbU8I0AlBHs41yu2Acqj78C22duF_T2MzOi2xG8/s72-c/-5.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8248801325449891837.post-4380470160776194977</guid><pubDate>Mon, 03 Feb 2014 20:48:00 +0000</pubDate><atom:updated>2014-02-03T13:58:26.381-08:00</atom:updated><title>White House Chief Privacy Officer Keynotes CMU Data Privacy Day (Video)</title><atom:summary type="text">



White House Privacy official Nicole Wang with host CUPS Director Lorrie Cranor 
on CMU Data Privacy Day, January 29th, 2014

Nicole Wong, a veteran of Google and Twitter who last year became the White House&#39;s Deputy U.S. Chief Technology Officer (CTO), was keynote speaker for Carnegie Mellon University&#39;s Data Privacy Day program on Jan. 29. Data Privacy Day is a global event held each year to</atom:summary><link>http://www.cyblog.cylab.cmu.edu/2014/02/white-house-chief-privacy-officer.html</link><author>noreply@blogger.com (Carnegie Mellon CyLab)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhE4NkXeBi_AAV4JtmFr2szRTQwMQjJRjHDpdwJtak-4dhpbpZG1o5tcwbyVYuu3TpWoo3-rcS-MNqscXeoBAWG7kodtB0-foDKtav3J0edznPanb4JCk1rnd5UpXa2iCL8YzWF6VHAZ9g/s72-c/Untitled+2.png" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8248801325449891837.post-1998449834682213589</guid><pubDate>Tue, 21 Jan 2014 18:18:00 +0000</pubDate><atom:updated>2014-01-29T09:01:15.873-08:00</atom:updated><title>CyLab&#39;s David Brumley and His Student Hacker Team Featured on PBS NEWSHOUR and CNBC</title><atom:summary type="text">


In recognition of his pioneering work, Carnegie Mellon University CyLab researcher David Brumley, has received both a Presidential Early Career Award for Scientists and Engineers (PECASE) and a Sloan Research Fellowship. And now, the mainstream media has discovered Brumley and his Plaid Parliament of Pwning (PPP) team of CMU students.


On October 26, 2013 (with repeat airing on January 19, </atom:summary><link>http://www.cyblog.cylab.cmu.edu/2014/01/cylabs-david-brumley-and-his-student.html</link><author>noreply@blogger.com (Carnegie Mellon CyLab)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8248801325449891837.post-1778270737197732336</guid><pubDate>Fri, 13 Dec 2013 14:21:00 +0000</pubDate><atom:updated>2014-01-29T09:10:24.032-08:00</atom:updated><title>CyLab&#39;s Anthony Rowe and Fellow CMU Researcher Win U.S. DOE Grant for Sensor Networks and Energy Efficiency Research</title><atom:summary type="text">
With a three-year, $1.9 million grant from the Department of Energy, CMU CyLab&#39;s Anthony Rowe and fellow researcher Mario Berges are developing sensor networks and an open-source software platform to optimize energy use in buildings, which annually consume 39 percent of total U.S. energy production.



CyLab&#39;s Anthony Rowe

The project builds on results from a larger research effort to integrate</atom:summary><link>http://www.cyblog.cylab.cmu.edu/2013/12/cylabs-anthony-rowe-and-fellow-cmu.html</link><author>noreply@blogger.com (Carnegie Mellon CyLab)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8248801325449891837.post-1637946999307883376</guid><pubDate>Tue, 12 Nov 2013 16:41:00 +0000</pubDate><atom:updated>2014-01-29T09:10:37.292-08:00</atom:updated><title>Two Recent News Items Underscore CyLab&#39;s Vital Role In Contributing to the Future of Cyber Security and Privacy.</title><atom:summary type="text">
Two recent news items underscore CyLab&#39;s vital role in contributing to the future of cyber security and privacy.

CyLab Researchers Work To Make Commercial Technologies Secure for Defense Department&amp;nbsp;



Researchers from Carnegie Mellon University CyLab and the University of Pennsylvania have received a four-year, $3.9 million grant from the Defense Advanced Research Projects Agency (DARPA) </atom:summary><link>http://www.cyblog.cylab.cmu.edu/2013/11/cylab-researchers-work-to-make.html</link><author>noreply@blogger.com (Carnegie Mellon CyLab)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmme4doJcGy9cgrOW-iCl6eNVaN7X_uoFqK8_Adwqz1elHJHUCcYthOQ6QJfzAHJADh3bvGW1oYuvWGm-XH6nYLrt3rcR4oU5pHCr8xaJkXFYIcVaa1zD6iYQSSr8aWStv6v8hyphenhyphenDrwPEc/s72-c/tns.qjulpkat.170x170-75.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8248801325449891837.post-3596199217688894088</guid><pubDate>Wed, 06 Nov 2013 18:23:00 +0000</pubDate><atom:updated>2014-01-29T09:10:49.544-08:00</atom:updated><title>CyLab Chronicles: CyLab Leans Forward In Its Tenth Annual Partners Conference</title><atom:summary type="text">
The 2013 Annual CyLab Partners Conference was held October 1st and October 2nd, on the main campus of Carnegie Mellon University in Pittsburgh, PA.


2013 CyLab Partners Conference


For many of us working in and with CyLab it was a particularly poignant one.

It marked the tenth anniversary of this world class cyber security and privacy research program.

And for those who know what to look for</atom:summary><link>http://www.cyblog.cylab.cmu.edu/2013/11/cylab-chronicles-cylab-leans-forward-in.html</link><author>noreply@blogger.com (Carnegie Mellon CyLab)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8248801325449891837.post-6204911045540682552</guid><pubDate>Thu, 17 Oct 2013 19:27:00 +0000</pubDate><atom:updated>2014-01-29T09:11:00.053-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Alessandro  Acquisti</category><category domain="http://www.blogger.com/atom/ns#">Privacy</category><category domain="http://www.blogger.com/atom/ns#">social media</category><category domain="http://www.blogger.com/atom/ns#">TED</category><category domain="http://www.blogger.com/atom/ns#">TEDGlobal</category><title>CyLab&#39;s Alessandro Acquisti on Why Privacy Matters at TEDGlobal 2013</title><atom:summary type="text">CyLab researcher Alessandro Acquisti spoke on Why Privacy Matters at TEDGlobal&amp;nbsp;2013 in Edinburgh, Scotland, June&amp;nbsp;10-14. Here is the video ... 



Some Related Links

CyLab&#39;s Alessandro Acquisti &amp;amp; Co-Authors Release 7 Year Study on Evolution of Facebook Privacy and Disclosure

CyLab Researchers Featured on CBS Sixty Minutes

CyLab&#39;s Alessandro Acquisti at TEDx Mid-Atlantic

CyLab&#39;s </atom:summary><link>http://www.cyblog.cylab.cmu.edu/2013/10/cylabs-alessandro-acquisti-on-why.html</link><author>noreply@blogger.com (Carnegie Mellon CyLab)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8248801325449891837.post-2986631499937638990</guid><pubDate>Mon, 29 Jul 2013 20:26:00 +0000</pubDate><atom:updated>2014-01-29T09:11:33.041-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">CUPS</category><category domain="http://www.blogger.com/atom/ns#">Lorrie Cranor</category><category domain="http://www.blogger.com/atom/ns#">Lujo Bauer</category><category domain="http://www.blogger.com/atom/ns#">SOUPS</category><category domain="http://www.blogger.com/atom/ns#">Usability</category><title>A Distinguish Paper Award for CUPS, and Other News from Ninth Annual SOUPS 2013</title><atom:summary type="text">

CyLab graduate student Cristian Bravo Lillo presents at SOUPS 2013

The ninth annual Symposium on Usable Privacy and Security (SOUPS 2013) was held July 9th through July 11th at Northumbria University (Newcastle, U.K.).


Lorrie Cranor, Director of CyLab Usable Privacy and Security (CUPS), chaired the conference, and CyLab Associate Research Professior Lujo Bauer served as technical papers </atom:summary><link>http://www.cyblog.cylab.cmu.edu/2013/07/cylab-graduate-student-cristian-bravo.html</link><author>noreply@blogger.com (Carnegie Mellon CyLab)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGipGLqccrHg6xCU83sBarP0zkSTa1tHQsvSi_NsfYunaskNbTEZp_DpfzPtzmQHMsYdiZQjO0oKwkDvJYbe7BYOTlckAey7XAuEZHonOsz8ita46_7Nu1_p7xNWSOajijTroo_4cZ2B4/s72-c/IMG_4537.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8248801325449891837.post-5627607406824904979</guid><pubDate>Wed, 10 Jul 2013 16:22:00 +0000</pubDate><atom:updated>2014-01-29T09:11:47.095-08:00</atom:updated><title>CyLab&#39;s Dr. Lorrie Cranor Keynotes 13th Annual Privacy Enhancing Technologies Symposium </title><atom:summary type="text">



CyLab&#39;s Dr. Lorrie Cranor delivered the keynote for the 13th Annual Privacy Enhancing Technologies Symposium (Bloomington, Indiana), Wednesday, July 10, 2013. 


Dr. Cranor is Director of the CyLab Usable Privacy and Security Laboratory (CUPS) and co-director of the MSIT-Privacy Engineering masters program and Associate Professor of Computer Science and of Engineering and Public Policy at </atom:summary><link>http://www.cyblog.cylab.cmu.edu/2013/07/cylabs-dr-lorrie-cranor-keynotes-13th.html</link><author>noreply@blogger.com (Carnegie Mellon CyLab)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggJ1FeU800rW8-h7WzDVlyAWPmxTzzB9kQgt0s0-rZ2TStJrjPSfxA51jMhK9yeWSAz24LsKa_QJlegiZrKuKft4IGTsqdpkAHDEI8pvAsEPXPd3NWnqk75vcy8mN6cF2VYEf-b16Q5-Y/s72-c/CUPS2013.png" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8248801325449891837.post-8361591361280422790</guid><pubDate>Thu, 23 May 2013 16:17:00 +0000</pubDate><atom:updated>2014-05-23T23:30:48.234-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Adrian Perrig</category><category domain="http://www.blogger.com/atom/ns#">Anupam Datta</category><category domain="http://www.blogger.com/atom/ns#">Cyber Security</category><category domain="http://www.blogger.com/atom/ns#">CyLab</category><category domain="http://www.blogger.com/atom/ns#">IEEE</category><category domain="http://www.blogger.com/atom/ns#">IEEE Security and Privacy Symposium</category><category domain="http://www.blogger.com/atom/ns#">Jonathan McCune</category><category domain="http://www.blogger.com/atom/ns#">Lujo Bauer</category><category domain="http://www.blogger.com/atom/ns#">Virgil Gliigor</category><title>CyLab&#39;s Strong Presence Continues at Annual IEEE Symposium on Security and Privacy</title><atom:summary type="text">

Min Suk Kang with fellow CyLab grad student, after presenting The Crossfire Attack at 
34th Annual IEEE Security &amp;amp; Privacy Symposium (May 2013, San Francisco).

The 34th annual IEEE Security and Privacy Symposium was held May 19-22 2013, in downtown San Francisco. Once again, as in recent years, Carnegie Mellon University CyLab researchers made a significant contribution to both its content</atom:summary><link>http://www.cyblog.cylab.cmu.edu/2013/05/cylabs-strong-presence-continues-at.html</link><author>noreply@blogger.com (Carnegie Mellon CyLab)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjZmEt9jzpOjajvXWOWGJuJI0sXZ69IdtkqGp8spLBxbmS2-hAW_F4h5zBUETB7EDAaeaWTso38DCy7z3fHkguclsGT3umFkgWN9ghnMeRkCn_LlZd-3pDsF-HgS8fzOK8dMnFYdruPhk/s72-c/IMG01534-20130520-1419.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8248801325449891837.post-1527820243772612935</guid><pubDate>Mon, 20 May 2013 04:08:00 +0000</pubDate><atom:updated>2014-01-29T09:12:47.373-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Alessandro  Acquisti</category><category domain="http://www.blogger.com/atom/ns#">Biometrics</category><category domain="http://www.blogger.com/atom/ns#">Cyber Security</category><category domain="http://www.blogger.com/atom/ns#">CyLab</category><category domain="http://www.blogger.com/atom/ns#">Marios Savvides</category><category domain="http://www.blogger.com/atom/ns#">Privacy</category><title>CyLab Researchers Alessadro Acquisti and Marios Savviddes featured on CBS Sixty Minutes</title><atom:summary type="text">


[NOTE: This CyBlog story is cross-posted as a CyLab Chronicles on the CyLab home page.]


In the wake of the Boston Marathon bombing investigation, there has been some mainstream news media attention paid to facial recognition software. After years of NCIS and other popular law enforcement TV dramas, there is an expectation that such technology could have led to a speedier conclusion to the </atom:summary><link>http://www.cyblog.cylab.cmu.edu/2013/05/cylab-researchers-alessadro-acquisti.html</link><author>noreply@blogger.com (Carnegie Mellon CyLab)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgp4CQpnhHjolDWytEwAlzsSnjNqHZU77XiUjnPbxmkwqvNnNmDk1qOcdk6FLumfxXuW1O2ycalbnZObpoIajRRAET-NfqKFSVj2gUOH6iTaR3xeoGsLcAuH03UE-MEKMH_8mc6aZ0ejgY/s72-c/60minutes.jpg" height="72" width="72"/></item></channel></rss>