Bluesky Facebook Reddit Email

Life Sciences

Comprehensive exploration of living organisms, biological systems, and life processes across all scales from molecules to ecosystems. Encompasses cutting-edge research in biology, genetics, molecular biology, ecology, biochemistry, microbiology, botany, zoology, evolutionary biology, genomics, and biotechnology. Investigates cellular mechanisms, organism development, genetic inheritance, biodiversity conservation, metabolic processes, protein synthesis, DNA sequencing, CRISPR gene editing, stem cell research, and the fundamental principles governing all forms of life on Earth.

447,757 articles | 2542 topics

Health and Medicine

Comprehensive medical research, clinical studies, and healthcare sciences focused on disease prevention, diagnosis, and treatment. Encompasses clinical medicine, public health, pharmacology, epidemiology, medical specialties, disease mechanisms, therapeutic interventions, healthcare innovation, precision medicine, telemedicine, medical devices, drug development, clinical trials, patient care, mental health, nutrition science, health policy, and the application of medical science to improve human health, wellbeing, and quality of life across diverse populations.

431,843 articles | 751 topics

Social Sciences

Comprehensive investigation of human society, behavior, relationships, and social structures through systematic research and analysis. Encompasses psychology, sociology, anthropology, economics, political science, linguistics, education, demography, communications, and social research methodologies. Examines human cognition, social interactions, cultural phenomena, economic systems, political institutions, language and communication, educational processes, population dynamics, and the complex social, cultural, economic, and political forces shaping human societies, communities, and civilizations throughout history and across the contemporary world.

260,756 articles | 745 topics

Physical Sciences

Fundamental study of the non-living natural world, matter, energy, and physical phenomena governing the universe. Encompasses physics, chemistry, earth sciences, atmospheric sciences, oceanography, materials science, and the investigation of physical laws, chemical reactions, geological processes, climate systems, and planetary dynamics. Explores everything from subatomic particles and quantum mechanics to planetary systems and cosmic phenomena, including energy transformations, molecular interactions, elemental properties, weather patterns, tectonic activity, and the fundamental forces and principles underlying the physical nature of reality.

257,913 articles | 1552 topics

Applied Sciences and Engineering

Practical application of scientific knowledge and engineering principles to solve real-world problems and develop innovative technologies. Encompasses all engineering disciplines, technology development, computer science, artificial intelligence, environmental sciences, agriculture, materials applications, energy systems, and industrial innovation. Bridges theoretical research with tangible solutions for infrastructure, manufacturing, computing, communications, transportation, construction, sustainable development, and emerging technologies that advance human capabilities, improve quality of life, and address societal challenges through scientific innovation and technological progress.

225,386 articles | 998 topics

Scientific Community

Study of the practice, culture, infrastructure, and social dimensions of science itself. Addresses how science is conducted, organized, communicated, and integrated into society. Encompasses research funding mechanisms, scientific publishing systems, peer review processes, academic ethics, science policy, research institutions, scientific collaboration networks, science education, career development, research programs, scientific methods, science communication, and the sociology of scientific discovery. Examines the human, institutional, and cultural aspects of scientific enterprise, knowledge production, and the translation of research into societal benefit.

193,043 articles | 157 topics

Space Sciences

Comprehensive study of the universe beyond Earth, encompassing celestial objects, cosmic phenomena, and space exploration. Includes astronomy, astrophysics, planetary science, cosmology, space physics, astrobiology, and space technology. Investigates stars, galaxies, planets, moons, asteroids, comets, black holes, nebulae, exoplanets, dark matter, dark energy, cosmic microwave background, stellar evolution, planetary formation, space weather, solar system dynamics, the search for extraterrestrial life, and humanity's efforts to explore, understand, and unlock the mysteries of the cosmos through observation, theory, and space missions.

29,662 articles | 175 topics

Research Methods

Comprehensive examination of tools, techniques, methodologies, and approaches used across scientific disciplines to conduct research, collect data, and analyze results. Encompasses experimental procedures, analytical methods, measurement techniques, instrumentation, imaging technologies, spectroscopic methods, laboratory protocols, observational studies, statistical analysis, computational methods, data visualization, quality control, and methodological innovations. Addresses the practical techniques and theoretical frameworks enabling scientists to investigate phenomena, test hypotheses, gather evidence, ensure reproducibility, and generate reliable knowledge through systematic, rigorous investigation across all areas of scientific inquiry.

21,889 articles | 139 topics

Mathematics

Study of abstract structures, patterns, quantities, relationships, and logical reasoning through pure and applied mathematical disciplines. Encompasses algebra, calculus, geometry, topology, number theory, analysis, discrete mathematics, mathematical logic, set theory, probability, statistics, and computational mathematics. Investigates mathematical structures, theorems, proofs, algorithms, functions, equations, and the rigorous logical frameworks underlying quantitative reasoning. Provides the foundational language and tools for all scientific fields, enabling precise description of natural phenomena, modeling of complex systems, and the development of technologies across physics, engineering, computer science, economics, and all quantitative sciences.

3,023 articles | 113 topics

Building a broader cybersecurity ecosystem

Experts from across industries and disciplines gathered to assess the current state of cybersecurity through a multidisciplinary lens. The workshop explored emerging technologies and the intersection of technology and policy, highlighting the need for a unified ecosystem to address persistent challenges.

AI Chatbots can be exploited to extract more personal information

Researchers at King's College London found that AI chatbots can be exploited to reveal up to 12.5 times more personal information from users. The study used three types of malicious AIs to encourage disclosure of private info, with reciprocal strategies proving the most effective.

Meta Quest 3 512GB

Meta Quest 3 512GB enables immersive mission planning, terrain rehearsal, and interactive STEM demos with high-resolution mixed-reality experiences.

Connect and corrupt: C++ coroutines prone to code-reuse attack despite CFI

Researchers have discovered a code-reuse attack capable of exploiting C++ coroutines across three major compilers, including those protected by Control Flow Integrity. The attack, called Coroutine Frame-Oriented Programming (CFOP), chains together existing functions to achieve arbitrary code execution.

You’re better at spotting malware than you think

A new study suggests that with proper training, people of all skill levels can accurately detect malware. Novice users improved to 80% accuracy after receiving basic instructions on red flags, while expert users maintained high detection rates. The study highlights the importance of fostering critical thinking in cybersecurity.

Crop monitoring system utilizing IoT, AI and other tech showcased at ASABE

The system tracks and analyzes crop development using data from sensors, biosensors, the Internet of Things, and AI. Strong security protocols ensure farmer data remains private and resilient against future quantum computer attacks. The research team plans to improve their system with faster sensor processing and a solar-powered battery.

Exploring the evolution of decentralized networks in real-world systems

This book provides a beginner-friendly resource on the impact and evolution of decentralized networks, highlighting their applications in healthcare, supply chains, agriculture, climate monitoring, and education. The authors emphasize sustainability, data security, and ethical tech adoption.

Apple iPhone 17 Pro

Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.

Aligning AI with Human Values and Well-Being

A special issue examines how AI can support human flourishing in various contexts, including healthcare, education, and digital interactions. The issue highlights the need for humane AI that balances technological advancement with human-centric values and psychological insight.

Watermarks offer no defense against deepfakes

Researchers at the University of Waterloo have created a tool called UnMarker that can remove any AI image watermark, highlighting the vulnerability of this technology to deepfakes. The team's discovery shows that even invisible encoded watermarks can be destroyed without knowing their design or internal parameters.

The Tap Trap: Android security vulnerability discovered

A research team at Vienna University of Technology has discovered a previously undiscovered Android security vulnerability that allows fraudulent apps to take control of mobile phones. Users may be tricked into performing unwanted actions, such as granting certain rights or deleting data.

GoPro HERO13 Black

GoPro HERO13 Black records stabilized 5.3K video for instrument deployments, field notes, and outreach, even in harsh weather and underwater conditions.

Decoding quantum advantage

Researchers at Kyoto University have characterized quantum advantage by proving an equivalence between its existence and the security of certain cryptographic primitives. This breakthrough implies that when quantum advantage does not exist, many conventional cryptographic primitives are broken, including post-quantum ones.

Swansea University drives next-gen cybersecurity in aerospace systems

Researchers are applying Model-Based Systems Engineering to enhance system resilience and protect against cyber threats in aerospace. The initiative aims to create robust frameworks for safeguarding emerging technologies, with potential benefits including job creation and skills development.

SAMSUNG T9 Portable SSD 2TB

SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.

New attack can make AI ‘see’ whatever you want

Researchers have demonstrated a new technique, RisingAttacK, to manipulate all widely used AI computer vision systems, allowing them to control what the AI 'sees'. The attack is effective at influencing the AI's ability to detect top targets, such as cars, pedestrians, or stop signs.

How to manage cybersecurity risks in the energy sector?

A new handbook from the University of Vaasa provides a comprehensive toolkit for policymakers, energy companies, and cybersecurity professionals to improve cyber resilience. The handbook emphasizes socio-cyber-physical risk management, education, awareness, cooperation, and strategic investments to reduce threats in the energy sector.

Researchers show AI art protection tools still leave creators at risk

Researchers discovered AI art protection tools have critical weaknesses that cannot reliably stop AI models from training on artists' work. LightShed, a new method, can detect and remove distortions, stripping away protections and rendering images usable again for generative AI model training.

Creality K1 Max 3D Printer

Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.

Websites are tracking you via browser fingerprinting

Researchers at Texas A&M University found that websites use browser fingerprinting to track people across browser sessions and sites. Even users who opt out of tracking under privacy laws may still be silently tracked through fingerprinting.

Our online world relies on encryption. What happens if it fails?

Researchers at Boston University are developing a groundbreaking method for securing sensitive data in the face of emerging quantum computing threats. Their approach, called Encrypted Operator Computing (EOC), merges physics, computer science, and mathematics to enable scalable methods for computing directly on encrypted data.

GQ GMC-500Plus Geiger Counter

GQ GMC-500Plus Geiger Counter logs beta, gamma, and X-ray levels for environmental monitoring, training labs, and safety demonstrations.

MSU study: Ransomware drives US health data breaches

A new study reveals that ransomware attacks have become the primary driver of health care data breaches in the United States. The study found that ransomware accounted for 69% of all patient records compromised in 2024, despite accounting for only 11% of breaches by number.

Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C)

Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C) keeps Macs, tablets, and meters powered during extended observing runs and remote surveys.

ETH researchers discover new security vulnerability in Intel processors

Researchers from ETH Zurich have discovered a new class of vulnerabilities in Intel processors that can be exploited to gain unauthorized access to information from other users. The 'BPRC' vulnerability affects all Intel processors and can be triggered by special inputs, allowing attackers to read sensitive information.

Smart home devices used to monitor domestic workers raise safety concerns

A study by King's College London reveals how surveillance technologies in smart homes exacerbate power imbalances between domestic workers and employers, undermining their rights and increasing vulnerability. The constant monitoring of these employees can lead to mental wellbeing issues and a lack of trust in the workplace.

Sony Alpha a7 IV (Body Only)

Sony Alpha a7 IV (Body Only) delivers reliable low-light performance and rugged build for astrophotography, lab documentation, and field expeditions.

ACM honors those who shape technology's future

This year's ACM awards recognize groundbreaking innovations in autonomous systems, cryptography, and software for parallel computers. Peter Stone receives the Allen Newell Award for contributions to AI, while William Gropp and his team receive the Software System Award for developing MPICH.

UTEP launches artificial intelligence think tank to address regional challenges

The University of Texas at El Paso has launched the AI Institute for Community-Engaged Research (AI-ICER), an interdisciplinary think tank leveraging artificial intelligence technologies to address pressing regional challenges. The institute aims to foster collaboration between researchers, public and private sector groups, and industr...

Celestron NexStar 8SE Computerized Telescope

Celestron NexStar 8SE Computerized Telescope combines portable Schmidt-Cassegrain optics with GoTo pointing for outreach nights and field campaigns.

FAU designated a National Center of Academic Excellence in Cyber Research

Florida Atlantic University has been recognized as a National Center of Academic Excellence in Cyber Research, affirming its leadership in cybersecurity research at the doctoral level. The designation highlights the university's faculty dedication to pushing cyber science boundaries and equipping students for high-impact research.

Computer science professor elected AAAS Fellow

Dr. Latifur Khan, a renowned computer science professor, has been elected as an AAAS Fellow for his pioneering work in machine learning and big-data analytics. He developed innovative solutions to adapt machine learning models to cybersecurity risks and created an AI-driven tool to analyze political conflict and violence.

Apple MacBook Pro 14-inch (M4 Pro)

Apple MacBook Pro 14-inch (M4 Pro) powers local ML workloads, large datasets, and multi-display analysis for field and lab teams.

New method efficiently safeguards sensitive AI training data

Researchers developed a new framework, PAC Privacy, to maintain AI model accuracy and ensure sensitive data remains safe from attackers. The new variant of PAC Privacy estimates anisotropic noise, reducing computational cost and boosting accuracy.

Aranet4 Home CO2 Monitor

Aranet4 Home CO2 Monitor tracks ventilation quality in labs, classrooms, and conference rooms with long battery life and clear e-ink readouts.

“ChatGPT” for computer security

A team led by Dr. Marcus Botacin is creating a large language model (LLM) to automatically identify malware and write rules to defend against it. The LLM will use signatures to complement human analysts' skills, identifying malware faster and more accurately.

Nikon Monarch 5 8x42 Binoculars

Nikon Monarch 5 8x42 Binoculars deliver bright, sharp views for wildlife surveys, eclipse chases, and quick star-field scans at dark sites.

Staying one step ahead of cyberattackers

Researchers at Mizzou have developed a proactive approach using artificial intelligence to address evolving threats against smart grids. The CIBR-Fort system can predict cyberattacks with 91.88% accuracy and defend against them in real-time, enabling scalable security for power grids of the future.

New technology could quash QR code phishing attacks

Researchers have developed a new form of QR code that can protect users from phishing attacks by signaling whether a link is safe or not. The SDMQR codes provide an added layer of security without interfering with existing functionality, allowing companies to replace traditional barcodes with more sophisticated QR codes.

Rigol DP832 Triple-Output Bench Power Supply

Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.

Sun receives funding for CyberCorps scholarship for service

The project aims to establish a new EAGLE SFS program at George Mason University to support students in gaining interdisciplinary education, hands-on research experience, and leadership skills. Graduates will serve in key government roles, advancing national defense, public safety, and technological innovation.

Apple iPad Pro 11-inch (M4)

Apple iPad Pro 11-inch (M4) runs demanding GIS, imaging, and annotation workflows on the go for surveys, briefings, and lab notebooks.

Flaw in computer memory leads to global security fixes

Researchers discovered a key security weakness in AMD computer processors due to 'BadRAM', rogue memory modules providing false information to the processor. This allows attackers to bypass CPU memory protections and access sensitive data or cause disruptions in shared cloud environments.