Bluesky Facebook Reddit Email

How chaos theory could turn every NHS scan into its own fortress

Researchers at the University of East Anglia have developed a new encryption method using chaos theory to protect medical images from cyber-attacks. The approach, called 'image-level protection,' makes each scan its own 'fortress' by making it extremely difficult for hackers to access or decrypt the images without the correct key.

FAU lands $4.5M US Air Force T-1A Jayhawk flight simulator

Florida Atlantic University has received a $4.5 million grant from the US Air Force to establish a high-fidelity platform for autonomous decision-making and real-time sensor fusion research. The T-1A Jayhawk simulator will be used to study cognitive performance, situational awareness, stress and decision-making under pressure.

Apple Watch Series 11 (GPS, 46mm)

Apple Watch Series 11 (GPS, 46mm) tracks health metrics and safety alerts during long observing sessions, fieldwork, and remote expeditions.

SwRI earns CMMC Level 2 cybersecurity certification

Southwest Research Institute (SwRI) has achieved CMMC Level 2 certification through an independent assessment, demonstrating a commitment to cybersecurity best practices. The certification covers SwRI's Intelligent Systems and Mechanical Engineering divisions and requires the organization to meet 110 security-related requirements.

Apple iPhone 17 Pro

Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.

New system designed to protect drones from cyber threats

Researchers at Adelaide University have developed a world-first cybersecurity system to protect drones from hacking, signal disruption, and malicious software. The system uses Software-Defined Wide Area Networking (SD-WAN) to act as a smart traffic controller for internet connections, making drones less vulnerable to cyber threats.

Your car’s tire sensors could be used to track you

Researchers at IMDEA Networks Institute discovered that tire pressure sensors in modern cars can be used to track vehicles and infer movement patterns. The study highlights the need for stronger security measures in future vehicle sensor systems.

SAMSUNG T9 Portable SSD 2TB

SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.

Most AI bots lack basic safety disclosures, study finds

A new study by the University of Cambridge found that many AI bots lack basic safety disclosures, including transparency about their abilities and potential risks. The 'AI Agent Index' revealed a significant transparency gap, with only four out of thirty agents publishing formal safety and evaluation documents.

Cyber-attacks could disrupt smart factories by targeting time itself, study warns

Researchers at the University of East London identified a critical weakness in Industrial Internet of Things networks that can destabilize factories and safety-critical infrastructure. Attackers can exploit subtle 'delay attacks' to quietly disrupt coordination, making timing just as important as information in highly automated systems.

People are overconfident about spotting AI faces, study finds

Research from UNSW Sydney and ANU found that people with average face-recognition ability performed only slightly better than chance in spotting AI-generated faces. Even super-recognisers, who excel at recognizing real human faces, were not immune to being fooled by highly realistic AI-generated images.

Garmin GPSMAP 67i with inReach

Garmin GPSMAP 67i with inReach provides rugged GNSS navigation, satellite messaging, and SOS for backcountry geology and climate field teams.

Experts show how major UK food crisis might occur

A new report by Anglia Ruskin University and the University of York identifies key weaknesses in the UK's food system and recommends interventions to prevent disruptions from escalating into a crisis. The study suggests increasing energy security, diversifying food value chains, and promoting varied diets to reduce risks.

GQ GMC-500Plus Geiger Counter

GQ GMC-500Plus Geiger Counter logs beta, gamma, and X-ray levels for environmental monitoring, training labs, and safety demonstrations.

Security analysis of blockchain-based cryptocurrency

Researchers investigate real-world blockchain security incidents to extract representative attack patterns and categorize them into six classes based on standard blockchain architecture layers. The study also evaluates current detection and defense strategies, highlighting their strengths and limitations.

Misleading text in the physical world can hijack AI-enabled robots

Researchers have identified a new vulnerability in AI-powered robots, where malicious text on signs or objects can hijack their decision-making. The study, led by UC Santa Cruz professors Alvaro Cardenas and Cihang Xie, presents the first academic exploration of environmental indirect prompt injection attacks against embodied AI systems.

CalDigit TS4 Thunderbolt 4 Dock

CalDigit TS4 Thunderbolt 4 Dock simplifies serious desks with 18 ports for high-speed storage, monitors, and instruments across Mac and PC setups.

Agents team up to strengthen AI safety checks

A new approach uses multiple LLM agents collaborating through iterative interactions to improve AI safety checks, outperforming existing methods in F1-score and achieving better trade-offs between catching harmful and harmless prompts. The system divides work into two teams: generator and analyzer, with logs capturing past mistakes and...

Sony Alpha a7 IV (Body Only)

Sony Alpha a7 IV (Body Only) delivers reliable low-light performance and rugged build for astrophotography, lab documentation, and field expeditions.

What does cybersecurity look like in the quantum age?

A recent paper highlights the need for defense mechanisms covering software, programs, and physical components of quantum computing systems. Key findings include the risk of crosstalk, intellectual property theft, and lack of end-to-end protection, emphasizing the need for safeguarding quantum computers from ground up.

CISPA researcher Andreas Zeller named IEEE Fellow

Andreas Zeller recognized for his work on automated debugging and security testing, with a total of nine Test of Time Awards. He is one of the few researchers to receive two ERC Advanced Grants from the European Research Council.

Securing AI systems against growing cybersecurity threats

The SHASAI project addresses cybersecurity risks in AI systems from design to real-world operation, combining secure hardware and software, risk-driven engineering, and real-world validation. The project will demonstrate its methods and tools in three diverse scenarios, supporting Europe's efforts to promote trustworthy AI.

ACM honors 2025 Distinguished Members for driving the future of computing

The Association for Computing Machinery has named 61 new Distinguished Members, recognized for their contributions to AI for healthcare, data management, human-computer interaction, and other areas. The recipients include experts from top universities, corporations, and research institutions worldwide.

AmScope B120C-5M Compound Microscope

AmScope B120C-5M Compound Microscope supports teaching labs and QA checks with LED illumination, mechanical stage, and included 5MP camera.

ERC Consolidator Grant awarded to CISPA researcher Rayna Dimitrova

Rayna Dimitrova's SyReP project aims to eliminate the separation between decision-making and data in software development, enabling developers to specify system behavior and generate implementation automatically. The ERC Consolidator Grant will support her research on novel symbolic algorithms and realizability certificates.

Online tracking and privacy on hospital websites

Researchers analyzed 12 years of hospital website data and found pixel tracking in 66% of observations, significantly increasing breach risk. Hospitals using third-party pixels saw a 1.4 percentage point increase in breach probability compared to baseline rates.

Stress and a toxic workplace culture can cause insider cybersecurity threats

A new study by Emmanuel Anti at the University of Vaasa suggests that empathetic security models can strengthen cybersecurity practices and prevent insider threats. The research proposes co-creating cybersecurity policies with employees, focusing on understanding their needs, motivations, and emotional well-being.

Kestrel 3000 Pocket Weather Meter

Kestrel 3000 Pocket Weather Meter measures wind, temperature, and humidity in real time for site assessments, aviation checks, and safety briefings.

Smartphone sharing demands a new approach to cybersecurity

A study by Griffith University researchers reveals that smartphone sharing is a growing issue, with 20% of identity theft perpetrators being current or former intimate partners. The study argues that one-user/one-device threat models are inadequate for addressing interpersonal cybersecurity risks.

Rigol DP832 Triple-Output Bench Power Supply

Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.

SwRI identifies security vulnerability in EV charging protocol

Researchers at SwRI discovered a security vulnerability in the Signal Level Attenuation Characterization (SLAC) protocol used in electric vehicle-to-grid communications. The team successfully modeled and replicated a machine-in-the-middle attack that could manipulate or halt EV charging processes.

Apple AirPods Pro (2nd Generation, USB-C)

Apple AirPods Pro (2nd Generation, USB-C) provide clear calls and strong noise reduction for interviews, conferences, and noisy field environments.

University of Tennessee's Kim receives ACM CCS Distinguished Paper Award

Doowon Kim, an assistant professor at the University of Tennessee, received a prestigious award from ACM CCS for his decade-long study on Advanced Persistent Threats (APTs). His research provides a comprehensive understanding of APT evolution and global patterns, shedding new light on these sophisticated cyberattacks.

GoPro HERO13 Black

GoPro HERO13 Black records stabilized 5.3K video for instrument deployments, field notes, and outreach, even in harsh weather and underwater conditions.

How can (A)I help you?

A new study by Yifan Yu offers guidance on how to deploy emotion AI in various scenarios, emphasizing the importance of balancing human involvement with AI's emotional detection capabilities. The analysis showed that emotion AI works best when integrated with human employees, and some scenarios are better handled by humans alone.

Fluke 87V Industrial Digital Multimeter

Fluke 87V Industrial Digital Multimeter is a trusted meter for precise measurements during instrument integration, repairs, and field diagnostics.

Training the grid to spot cyberattacks without seeing your data

Researchers developed a cyberattack detection system that uses federated learning and cloud coordination to detect DDoS attacks in 6G-ready smart grids without exposing user energy-use data. The system achieved high accuracy and precision, but trade-offs were observed in terms of resources consumption.

Illinois Chat is launched for campus community

The platform allows users to create personalized LLM-based chatbots, serving as a 24/7 teaching assistant or scraping campus websites to find needed resources. Illinois Chat has already been utilized in various departments and research groups, providing valuable feedback to make it more practical.

Meta Quest 3 512GB

Meta Quest 3 512GB enables immersive mission planning, terrain rehearsal, and interactive STEM demos with high-resolution mixed-reality experiences.

New framework could defend factories from cyber-attacks

Researchers at Texas A&M University have developed a new framework to protect industrial processing facilities from cyber threats. The framework identifies vulnerabilities, detects abnormal activity in real-time, and provides safeguards and mitigation strategies to maintain safe operations.

Hardware vulnerability allows attackers to hack AI training data

Researchers at NC State University identified a hardware vulnerability that allows attackers to compromise AI privacy by exploiting ML accelerator behavior. The GATEBLEED vulnerability exploits power gating in AI accelerators, creating an observable timing channel for attackers.

Scientists develop end-to-end encryption for git services

Researchers at the University of Sydney have developed end-to-end encryption for git services, protecting sensitive code from cybersecurity threats. The encryption aligns seamlessly with existing platforms like Github and Bitbucket, reducing computational resources needed while encrypting only edits.

Sky & Telescope Pocket Sky Atlas, 2nd Edition

Sky & Telescope Pocket Sky Atlas, 2nd Edition is a durable star atlas for planning sessions, identifying targets, and teaching celestial navigation.

FIU cybersecurity researchers develop midflight defense against drone hijacking

Florida International University researchers have developed a defensive system called SHIELD that can detect and neutralize cyberattacks on drones in real time. The system allows the drone to finish its mission while providing robust recovery mechanisms, making it crucial for securing commercial drone use across industries.