Researchers at the University of East Anglia have developed a new encryption method using chaos theory to protect medical images from cyber-attacks. The approach, called 'image-level protection,' makes each scan its own 'fortress' by making it extremely difficult for hackers to access or decrypt the images without the correct key.
Cas Cremers and collaborators receive Levchin Prize for Real-World Cryptography for their work on the Tamarin Prover, an open-source analysis tool for cryptographic protocols, which has had a significant impact on the practice of cryptography and its use in real-world systems.
Florida Atlantic University has received a $4.5 million grant from the US Air Force to establish a high-fidelity platform for autonomous decision-making and real-time sensor fusion research. The T-1A Jayhawk simulator will be used to study cognitive performance, situational awareness, stress and decision-making under pressure.
Apple Watch Series 11 (GPS, 46mm)
Apple Watch Series 11 (GPS, 46mm) tracks health metrics and safety alerts during long observing sessions, fieldwork, and remote expeditions.
Southwest Research Institute (SwRI) has achieved CMMC Level 2 certification through an independent assessment, demonstrating a commitment to cybersecurity best practices. The certification covers SwRI's Intelligent Systems and Mechanical Engineering divisions and requires the organization to meet 110 security-related requirements.
Researchers introduced an optimized framework for Bitcoin transaction validation using Segregated Witness technology, skipping repetitive verification steps and reducing validation time by approximately 50%. The 'single-validation' approach enhances the network's scalability without compromising security.
Vijay Anand, Kennesaw State University Associate Professor, recognized for pioneering research in secure computation and intelligent infrastructure. He has led the design of nationally recognized cybersecurity programs and advanced innovations in data exchange and cyber defense.
The institute will focus on technologies required to operate next-generation AI supercomputer systems reliably while accelerating scientific breakthroughs. It aims to drive innovation in making AI data centers more efficient, reliable, secure, and integrated with the nation's energy system.
Researchers from UC Irvine have discovered a critical security vulnerability in autonomous target-tracking drones that can be exploited using an ordinary umbrella. The team demonstrated how attackers could use the 'FlyTrap' attack framework to manipulate drones, drawing them close enough for capture or causing them to crash.
Apple iPhone 17 Pro
Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.
SynapTrack enables faster and more accurate detection of fraudulent activity using blockchains and cryptocurrencies, reducing false positives by a substantial margin. The system has been tested with real-life data from the Bybit hack, tracing hackers with 98% accuracy.
Researchers at Adelaide University have developed a world-first cybersecurity system to protect drones from hacking, signal disruption, and malicious software. The system uses Software-Defined Wide Area Networking (SD-WAN) to act as a smart traffic controller for internet connections, making drones less vulnerable to cyber threats.
Researchers at IMDEA Networks Institute discovered that tire pressure sensors in modern cars can be used to track vehicles and infer movement patterns. The study highlights the need for stronger security measures in future vehicle sensor systems.
The project aims to help universities better understand research security by examining human and behavioral dimensions of risk. Structured role-playing games will simulate realistic academic scenarios, encouraging participants to explore trade-offs and motivations that often remain hidden in standard security planning.
SAMSUNG T9 Portable SSD 2TB
SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.
A new study by the University of Cambridge found that many AI bots lack basic safety disclosures, including transparency about their abilities and potential risks. The 'AI Agent Index' revealed a significant transparency gap, with only four out of thirty agents publishing formal safety and evaluation documents.
Researchers at the University of East London identified a critical weakness in Industrial Internet of Things networks that can destabilize factories and safety-critical infrastructure. Attackers can exploit subtle 'delay attacks' to quietly disrupt coordination, making timing just as important as information in highly automated systems.
Research from UNSW Sydney and ANU found that people with average face-recognition ability performed only slightly better than chance in spotting AI-generated faces. Even super-recognisers, who excel at recognizing real human faces, were not immune to being fooled by highly realistic AI-generated images.
A new study by Binghamton University School of Management reveals that businesses can improve their performance when they openly discuss and address cybersecurity issues. The research found a positive correlation between cybersecurity readiness and firm performance, suggesting that proactive measures can lead to better outcomes.
Garmin GPSMAP 67i with inReach
Garmin GPSMAP 67i with inReach provides rugged GNSS navigation, satellite messaging, and SOS for backcountry geology and climate field teams.
The University of Tennessee and UCOR have strengthened their partnership to provide training and educational opportunities for students and workforce development in nuclear and criticality safety. The MOU renewal will include projects, research, and curriculum focused on these areas.
Researchers say tech companies need to adopt user-centered approaches to create authentication systems that are secure by design. They call for more inclusive and consistent methods, avoiding one-size-fits-all models that burden users with complex security rules.
New machine-learning tools significantly improve phishing site detection accuracy, surpassing 95% precision/recall. The study evaluates ten classifiers across three public datasets using URL, domain, and content features.
A new report by Anglia Ruskin University and the University of York identifies key weaknesses in the UK's food system and recommends interventions to prevent disruptions from escalating into a crisis. The study suggests increasing energy security, diversifying food value chains, and promoting varied diets to reduce risks.
GQ GMC-500Plus Geiger Counter
GQ GMC-500Plus Geiger Counter logs beta, gamma, and X-ray levels for environmental monitoring, training labs, and safety demonstrations.
Researchers investigate real-world blockchain security incidents to extract representative attack patterns and categorize them into six classes based on standard blockchain architecture layers. The study also evaluates current detection and defense strategies, highlighting their strengths and limitations.
The VERIFHE project aims to develop an open-source library for verifiable homomorphic encryption, enabling private and reliable inference. The ERC Proof of Concept grant will support the development of practical tools for machine learning services.
The Association for Computing Machinery has named 72 new Fellows for their technical innovations and service to the field. The honorees represent the top 1% of professionals worldwide, with contributions in AI for healthcare, computer graphics, data management, and more.
Researchers have identified a new vulnerability in AI-powered robots, where malicious text on signs or objects can hijack their decision-making. The study, led by UC Santa Cruz professors Alvaro Cardenas and Cihang Xie, presents the first academic exploration of environmental indirect prompt injection attacks against embodied AI systems.
CalDigit TS4 Thunderbolt 4 Dock
CalDigit TS4 Thunderbolt 4 Dock simplifies serious desks with 18 ports for high-speed storage, monitors, and instruments across Mac and PC setups.
A new approach uses multiple LLM agents collaborating through iterative interactions to improve AI safety checks, outperforming existing methods in F1-score and achieving better trade-offs between catching harmful and harmless prompts. The system divides work into two teams: generator and analyzer, with logs capturing past mistakes and...
Researchers found that nearly half of geostationary satellite communications are not encrypted, putting sensitive data such as cellular texts, voice calls, and military information at risk. The study led to immediate action from companies like T-Mobile, Walmart, and KPU Telecom, which enabled encryption in response to the findings.
New research from the University of East London reveals widespread online risk-taking among young people, with many engaging in illegal behavior before crossing a legal boundary. The study highlights clear pathways into cybercrime, often driven by risk, opportunity, and lack of understanding about online laws.
Sony Alpha a7 IV (Body Only)
Sony Alpha a7 IV (Body Only) delivers reliable low-light performance and rugged build for astrophotography, lab documentation, and field expeditions.
A new study reveals that young people are at risk of engaging in serious online offenses through gradual progression from low-risk behaviors like digital piracy. Researchers found that nearly half reported engaging in illegal online behavior early on, with many describing a pattern of repeat offending.
A recent paper highlights the need for defense mechanisms covering software, programs, and physical components of quantum computing systems. Key findings include the risk of crosstalk, intellectual property theft, and lack of end-to-end protection, emphasizing the need for safeguarding quantum computers from ground up.
Andreas Zeller recognized for his work on automated debugging and security testing, with a total of nine Test of Time Awards. He is one of the few researchers to receive two ERC Advanced Grants from the European Research Council.
The SHASAI project addresses cybersecurity risks in AI systems from design to real-world operation, combining secure hardware and software, risk-driven engineering, and real-world validation. The project will demonstrate its methods and tools in three diverse scenarios, supporting Europe's efforts to promote trustworthy AI.
The Association for Computing Machinery has named 61 new Distinguished Members, recognized for their contributions to AI for healthcare, data management, human-computer interaction, and other areas. The recipients include experts from top universities, corporations, and research institutions worldwide.
AmScope B120C-5M Compound Microscope
AmScope B120C-5M Compound Microscope supports teaching labs and QA checks with LED illumination, mechanical stage, and included 5MP camera.
Rayna Dimitrova's SyReP project aims to eliminate the separation between decision-making and data in software development, enabling developers to specify system behavior and generate implementation automatically. The ERC Consolidator Grant will support her research on novel symbolic algorithms and realizability certificates.
Researchers analyzed 12 years of hospital website data and found pixel tracking in 66% of observations, significantly increasing breach risk. Hospitals using third-party pixels saw a 1.4 percentage point increase in breach probability compared to baseline rates.
A new study by Pius Ewoh argues that healthcare cybersecurity requires socio-technical solutions, not just technical fixes. The framework combines human behaviour monitoring, organisational learning, and intelligent incident-response capabilities to identify and prevent vulnerabilities.
A new study by Emmanuel Anti at the University of Vaasa suggests that empathetic security models can strengthen cybersecurity practices and prevent insider threats. The research proposes co-creating cybersecurity policies with employees, focusing on understanding their needs, motivations, and emotional well-being.
Kestrel 3000 Pocket Weather Meter
Kestrel 3000 Pocket Weather Meter measures wind, temperature, and humidity in real time for site assessments, aviation checks, and safety briefings.
The partnership aims to develop solutions for emerging digital threats through joint research initiatives in cryptography, AI security, and blockchain technology. The collaboration will facilitate researcher mobility and identify opportunities for collaborative funding.
Bahaa Eltahawy's dissertation highlights the importance of integrated cybersecurity strategies for protecting critical infrastructure. The study reveals that current standards have limitations and proposes a model that expands protection into seven domains.
A study by Griffith University researchers reveals that smartphone sharing is a growing issue, with 20% of identity theft perpetrators being current or former intimate partners. The study argues that one-user/one-device threat models are inadequate for addressing interpersonal cybersecurity risks.
Rigol DP832 Triple-Output Bench Power Supply
Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.
Researchers at SwRI discovered a security vulnerability in the Signal Level Attenuation Characterization (SLAC) protocol used in electric vehicle-to-grid communications. The team successfully modeled and replicated a machine-in-the-middle attack that could manipulate or halt EV charging processes.
Security researchers have developed a defense mechanism that protects against cryptanalytic parameter extraction attacks on AI systems. By making neurons in the same layer similar to each other, the defense creates a barrier of similarity that makes it difficult for attacks to proceed.
A University of Delaware team, funded by NSF, creates next-generation secure computer chips using AI and game theory. The project aims to predict attacks and set new benchmarks for global hardware security, enabling the design of safer and more trustworthy systems.
Apple AirPods Pro (2nd Generation, USB-C)
Apple AirPods Pro (2nd Generation, USB-C) provide clear calls and strong noise reduction for interviews, conferences, and noisy field environments.
Researchers from the University of Florida discovered critical security vulnerabilities in portable genetic sequencers, exposing them to potential attacks and data breaches. The devices' reliance on insecure connections to laptops or unsecured networks amplifies these risks.
The University of Houston has been redesignated by the NSA as a Center for Academic Excellence in Cyber Research (CAE-R) through 2029. This recognition underscores UH's growing role in advancing research and workforce training to strengthen US resilience against evolving cyber threats.
A game theoretical model of cyberwarfare assesses Attacker and Defender costs, revealing that networks with fewer attack vectors benefit Defenders. Converging technological capabilities amplify conflicts, while centralized government control can provoke more aggressive attacks.
Doowon Kim, an assistant professor at the University of Tennessee, received a prestigious award from ACM CCS for his decade-long study on Advanced Persistent Threats (APTs). His research provides a comprehensive understanding of APT evolution and global patterns, shedding new light on these sophisticated cyberattacks.
Researchers found that providing feedback to everyone after the entire simulation ends leads to better learning outcomes. The study's findings suggest that companies can design more effective software tools using this approach, which has been implemented by KnowBe4.
GoPro HERO13 Black
GoPro HERO13 Black records stabilized 5.3K video for instrument deployments, field notes, and outreach, even in harsh weather and underwater conditions.
A new security framework based on blockchain technology and distributed reinforcement learning ensures secure data storage and transmission while adapting to evolving threats. The framework demonstrated improved memory consumption and transaction latency compared to existing approaches.
Researchers are developing training-free detection methods and novel countermeasures to protect sensitive information from emerging wireless eavesdropping techniques. By manipulating wireless channels, these defenses can obscure or distort signal patterns that attackers rely on.
A new study by Yifan Yu offers guidance on how to deploy emotion AI in various scenarios, emphasizing the importance of balancing human involvement with AI's emotional detection capabilities. The analysis showed that emotion AI works best when integrated with human employees, and some scenarios are better handled by humans alone.
Fluke 87V Industrial Digital Multimeter
Fluke 87V Industrial Digital Multimeter is a trusted meter for precise measurements during instrument integration, repairs, and field diagnostics.
Researchers developed a cyberattack detection system that uses federated learning and cloud coordination to detect DDoS attacks in 6G-ready smart grids without exposing user energy-use data. The system achieved high accuracy and precision, but trade-offs were observed in terms of resources consumption.
New WiFi technology can create images of individuals and surroundings by passively recording communication in radio networks, raising concerns about privacy. Researchers call for protective measures and privacy safeguards in the forthcoming IEEE 802.11bf WiFi standard.
The platform allows users to create personalized LLM-based chatbots, serving as a 24/7 teaching assistant or scraping campus websites to find needed resources. Illinois Chat has already been utilized in various departments and research groups, providing valuable feedback to make it more practical.
Meta Quest 3 512GB
Meta Quest 3 512GB enables immersive mission planning, terrain rehearsal, and interactive STEM demos with high-resolution mixed-reality experiences.
Researchers at the University of Missouri have developed an AI-powered method to detect hidden hardware trojans in chip designs, offering a 97% accurate solution. The approach leverages large language models to scan for suspicious code and provides explanations for detected threats.
A new study reveals that multitasking makes phishing detection harder, but introducing brief reminders can significantly improve accuracy. Researchers found that working memory load and message framing cues affect detection performance.
Researchers at Texas A&M University have developed a new framework to protect industrial processing facilities from cyber threats. The framework identifies vulnerabilities, detects abnormal activity in real-time, and provides safeguards and mitigation strategies to maintain safe operations.
Researchers at NC State University identified a hardware vulnerability that allows attackers to compromise AI privacy by exploiting ML accelerator behavior. The GATEBLEED vulnerability exploits power gating in AI accelerators, creating an observable timing channel for attackers.
Researchers at the University of Sydney have developed end-to-end encryption for git services, protecting sensitive code from cybersecurity threats. The encryption aligns seamlessly with existing platforms like Github and Bitbucket, reducing computational resources needed while encrypting only edits.
Sky & Telescope Pocket Sky Atlas, 2nd Edition
Sky & Telescope Pocket Sky Atlas, 2nd Edition is a durable star atlas for planning sessions, identifying targets, and teaching celestial navigation.
Florida International University researchers have developed a defensive system called SHIELD that can detect and neutralize cyberattacks on drones in real time. The system allows the drone to finish its mission while providing robust recovery mechanisms, making it crucial for securing commercial drone use across industries.
Researchers Joseph Clark, Doowon Kim, and Joon Sue Lee received NSF CAREER awards for their groundbreaking work in chemistry, computer science, and physics. They are developing new methods to track pharmaceutical drugs and detect phishing websites, while studying the properties of quantum materials.