Bluesky Facebook Reddit Email

Nikon Monarch 5 8x42 Binoculars

Nikon Monarch 5 8x42 Binoculars deliver bright, sharp views for wildlife surveys, eclipse chases, and quick star-field scans at dark sites.

No digital content is safe from generative AI, researchers say

Researchers discovered that simple artificial intelligence tools can bypass security techniques meant to protect authentic content from use in deepfakes and facial identity theft. The study found that attackers can easily defeat existing image protection using off-the-shelf AI models and simple commands.

AI fails to make inroads with cybercriminals, study finds

A study analyzing 100 million posts from underground cybercrime communities found that most cybercriminals lack the skills to use AI effectively, and its adoption has limited benefits for their work. However, AI coding assistants are mostly useful for already skilled actors, and poorly secured agentic AI systems pose a significant risk.

New report looks at how AI is impacting software development

The report examines how generative AI tools are transforming software development, offering benefits such as increased productivity but also raising security vulnerabilities and technical debt. Strong software engineering practices are still required to ensure systems are secure, reliable, and maintainable.

Enabling privacy-preserving AI training on everyday devices

Researchers at MIT developed a technique to overcome memory constraints and communication bottlenecks in federated learning, enabling faster and more accurate AI model training. The new framework, FTTE, uses a subset of model parameters and an asynchronous approach to reduce lag time and improve training performance.

Companies disclose more on cybersecurity – but markets remain indifferent

A study by the University of Vaasa and Aalto University finds that mandatory cybersecurity disclosure in the US has increased internal documentation and made cyber risks more visible to senior management, but not affected investor behavior. Companies produced new content describing their cybersecurity governance structures, suggesting ...

Apple MacBook Pro 14-inch (M4 Pro)

Apple MacBook Pro 14-inch (M4 Pro) powers local ML workloads, large datasets, and multi-display analysis for field and lab teams.

Your P@ssw0rds! no longer have to cause anxiety

Researchers at Texas A&M University created HIPPO, a browser extension that generates unique passwords for each website without storing them. Participants preferred HIPPO over traditional password tools for ease and security, reporting higher satisfaction rates.

An ethereum-based fully distributed authentication mechanism in VANETs

Researchers introduce EBDA, a novel framework that replaces traditional PKI certificate systems with a blockchain-maintained Graph of Trust (GoT), enabling fully decentralized identity authentication for vehicles. The approach reduces authentication latency by at least 22.93% while maintaining low computational and storage overhead.

SAMSUNG T9 Portable SSD 2TB

SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.

Privacy goes public with new database

A new database, led by Harvard computer scientist Salil Vadhan, enables companies to adopt differential privacy framework, providing real-world applications for protected data. The Differential Privacy Deployments Registry aims to promote widespread adoption and refinement of the technology.

Illinois Tech computer science researcher honored by IEEE Chicago Section

Binghui Wang, an Illinois Tech Assistant Professor of Computer Science, has been awarded the 2025 Distinguished Junior R&D Award by the IEEE Chicago Section for his groundbreaking research in AI security and trustworthy machine learning. The award recognizes Wang's impactful work on developing provably secure and trustworthy AI systems.

Meta Quest 3 512GB

Meta Quest 3 512GB enables immersive mission planning, terrain rehearsal, and interactive STEM demos with high-resolution mixed-reality experiences.

Deepfake x-rays fool radiologists and AI

A study found that deepfake X-rays can be indistinguishable from authentic images, posing a risk to patient diagnoses and digital medical records. Radiologists and AI models struggled to detect synthetic images, with accuracy ranging from 58% to 92%. Experts recommend implementing advanced digital safeguards to prevent tampering.

How chaos theory could turn every NHS scan into its own fortress

Researchers at the University of East Anglia have developed a new encryption method using chaos theory to protect medical images from cyber-attacks. The approach, called 'image-level protection,' makes each scan its own 'fortress' by making it extremely difficult for hackers to access or decrypt the images without the correct key.

FAU lands $4.5M US Air Force T-1A Jayhawk flight simulator

Florida Atlantic University has received a $4.5 million grant from the US Air Force to establish a high-fidelity platform for autonomous decision-making and real-time sensor fusion research. The T-1A Jayhawk simulator will be used to study cognitive performance, situational awareness, stress and decision-making under pressure.

SwRI earns CMMC Level 2 cybersecurity certification

Southwest Research Institute (SwRI) has achieved CMMC Level 2 certification through an independent assessment, demonstrating a commitment to cybersecurity best practices. The certification covers SwRI's Intelligent Systems and Mechanical Engineering divisions and requires the organization to meet 110 security-related requirements.

Apple iPhone 17 Pro

Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.

Sky & Telescope Pocket Sky Atlas, 2nd Edition

Sky & Telescope Pocket Sky Atlas, 2nd Edition is a durable star atlas for planning sessions, identifying targets, and teaching celestial navigation.

New system designed to protect drones from cyber threats

Researchers at Adelaide University have developed a world-first cybersecurity system to protect drones from hacking, signal disruption, and malicious software. The system uses Software-Defined Wide Area Networking (SD-WAN) to act as a smart traffic controller for internet connections, making drones less vulnerable to cyber threats.

Your car’s tire sensors could be used to track you

Researchers at IMDEA Networks Institute discovered that tire pressure sensors in modern cars can be used to track vehicles and infer movement patterns. The study highlights the need for stronger security measures in future vehicle sensor systems.

Apple iPad Pro 11-inch (M4)

Apple iPad Pro 11-inch (M4) runs demanding GIS, imaging, and annotation workflows on the go for surveys, briefings, and lab notebooks.

Cyber-attacks could disrupt smart factories by targeting time itself, study warns

Researchers at the University of East London identified a critical weakness in Industrial Internet of Things networks that can destabilize factories and safety-critical infrastructure. Attackers can exploit subtle 'delay attacks' to quietly disrupt coordination, making timing just as important as information in highly automated systems.

Most AI bots lack basic safety disclosures, study finds

A new study by the University of Cambridge found that many AI bots lack basic safety disclosures, including transparency about their abilities and potential risks. The 'AI Agent Index' revealed a significant transparency gap, with only four out of thirty agents publishing formal safety and evaluation documents.

People are overconfident about spotting AI faces, study finds

Research from UNSW Sydney and ANU found that people with average face-recognition ability performed only slightly better than chance in spotting AI-generated faces. Even super-recognisers, who excel at recognizing real human faces, were not immune to being fooled by highly realistic AI-generated images.

Apple Watch Series 11 (GPS, 46mm)

Apple Watch Series 11 (GPS, 46mm) tracks health metrics and safety alerts during long observing sessions, fieldwork, and remote expeditions.

Experts show how major UK food crisis might occur

A new report by Anglia Ruskin University and the University of York identifies key weaknesses in the UK's food system and recommends interventions to prevent disruptions from escalating into a crisis. The study suggests increasing energy security, diversifying food value chains, and promoting varied diets to reduce risks.

Sky-Watcher EQ6-R Pro Equatorial Mount

Sky-Watcher EQ6-R Pro Equatorial Mount provides precise tracking capacity for deep-sky imaging rigs during long astrophotography sessions.

Security analysis of blockchain-based cryptocurrency

Researchers investigate real-world blockchain security incidents to extract representative attack patterns and categorize them into six classes based on standard blockchain architecture layers. The study also evaluates current detection and defense strategies, highlighting their strengths and limitations.

Misleading text in the physical world can hijack AI-enabled robots

Researchers have identified a new vulnerability in AI-powered robots, where malicious text on signs or objects can hijack their decision-making. The study, led by UC Santa Cruz professors Alvaro Cardenas and Cihang Xie, presents the first academic exploration of environmental indirect prompt injection attacks against embodied AI systems.

Davis Instruments Vantage Pro2 Weather Station

Davis Instruments Vantage Pro2 Weather Station offers research-grade local weather data for networked stations, campuses, and community observatories.

Agents team up to strengthen AI safety checks

A new approach uses multiple LLM agents collaborating through iterative interactions to improve AI safety checks, outperforming existing methods in F1-score and achieving better trade-offs between catching harmful and harmless prompts. The system divides work into two teams: generator and analyzer, with logs capturing past mistakes and...

What does cybersecurity look like in the quantum age?

A recent paper highlights the need for defense mechanisms covering software, programs, and physical components of quantum computing systems. Key findings include the risk of crosstalk, intellectual property theft, and lack of end-to-end protection, emphasizing the need for safeguarding quantum computers from ground up.

Creality K1 Max 3D Printer

Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.

Securing AI systems against growing cybersecurity threats

The SHASAI project addresses cybersecurity risks in AI systems from design to real-world operation, combining secure hardware and software, risk-driven engineering, and real-world validation. The project will demonstrate its methods and tools in three diverse scenarios, supporting Europe's efforts to promote trustworthy AI.

CISPA researcher Andreas Zeller named IEEE Fellow

Andreas Zeller recognized for his work on automated debugging and security testing, with a total of nine Test of Time Awards. He is one of the few researchers to receive two ERC Advanced Grants from the European Research Council.

ACM honors 2025 Distinguished Members for driving the future of computing

The Association for Computing Machinery has named 61 new Distinguished Members, recognized for their contributions to AI for healthcare, data management, human-computer interaction, and other areas. The recipients include experts from top universities, corporations, and research institutions worldwide.

DJI Air 3 (RC-N2)

DJI Air 3 (RC-N2) captures 4K mapping passes and environmental surveys with dual cameras, long flight time, and omnidirectional obstacle sensing.

Online tracking and privacy on hospital websites

Researchers analyzed 12 years of hospital website data and found pixel tracking in 66% of observations, significantly increasing breach risk. Hospitals using third-party pixels saw a 1.4 percentage point increase in breach probability compared to baseline rates.

ERC Consolidator Grant awarded to CISPA researcher Rayna Dimitrova

Rayna Dimitrova's SyReP project aims to eliminate the separation between decision-making and data in software development, enabling developers to specify system behavior and generate implementation automatically. The ERC Consolidator Grant will support her research on novel symbolic algorithms and realizability certificates.

Stress and a toxic workplace culture can cause insider cybersecurity threats

A new study by Emmanuel Anti at the University of Vaasa suggests that empathetic security models can strengthen cybersecurity practices and prevent insider threats. The research proposes co-creating cybersecurity policies with employees, focusing on understanding their needs, motivations, and emotional well-being.

Kestrel 3000 Pocket Weather Meter

Kestrel 3000 Pocket Weather Meter measures wind, temperature, and humidity in real time for site assessments, aviation checks, and safety briefings.

SwRI identifies security vulnerability in EV charging protocol

Researchers at SwRI discovered a security vulnerability in the Signal Level Attenuation Characterization (SLAC) protocol used in electric vehicle-to-grid communications. The team successfully modeled and replicated a machine-in-the-middle attack that could manipulate or halt EV charging processes.

Smartphone sharing demands a new approach to cybersecurity

A study by Griffith University researchers reveals that smartphone sharing is a growing issue, with 20% of identity theft perpetrators being current or former intimate partners. The study argues that one-user/one-device threat models are inadequate for addressing interpersonal cybersecurity risks.

GQ GMC-500Plus Geiger Counter

GQ GMC-500Plus Geiger Counter logs beta, gamma, and X-ray levels for environmental monitoring, training labs, and safety demonstrations.

Celestron NexStar 8SE Computerized Telescope

Celestron NexStar 8SE Computerized Telescope combines portable Schmidt-Cassegrain optics with GoTo pointing for outreach nights and field campaigns.