UAB researchers are investigating game-based verification that may improve computer security and reduce user frustration compared to typical “type-what-you-see” CAPTCHA tools that use static images.

Published in Research
Sloan and Bangalore assume leadership positions for CIA|JFR.
Published in People of UAB
Alabama consumers can better respond to cases of identity theft when equipped with knowledge of reporting process.
Published in News You Can Use
UAB is reaffirmed as National Center of Academic Excellence in Information Assurance and Cyber Defense Research.
Published in People of UAB
An innovative solution for safeguarding personal information relies on your proximity instead of your memory.
Published in Research
UAB and Stanford are the first U.S. universities chosen for Facebook-sponsored contest in which computer-security enthusiasts attack and defend from peers online.
Published in Campus
Brain scans dispel assumptions about Internet safety, as well as show that critical-thinking skills and impulsivity are at work as users identify spam and phishing sites.
Published in Research
Repeating easy passwords can leave users vulnerable, but new UAB research offers increased sophistication and ease with a second security factor.
Published in Research
Interviews with participants in prisons and halfway houses was used to capture data on the experience of religious conversion and the ways it altered attitudes and behaviors.
Published in People of UAB
Gary Warner is an expert in phishing attacks and international cybersecurity fraud.
Published in Research
The annual summit explores new and ongoing threats to cybersecurity and potential safeguards against them.
Published in Research
The UAB SPIES Lab research on two facets of user-centered Internet security will be presented at the Network and Distributed Systems Security Symposium.
Published in Research

The event, which features live talks in the spirit of the TED experience, is themed “Rediscover the Magic of Birmingham."

Published in Campus
How does a UAB cybersecurity expert protects his own smartphone? Here are the risks you need to know.
Published in News You Can Use
Page 2 of 2
Back to Top