Bluesky Facebook Reddit Email

University of Tennessee's Kim receives ACM CCS Distinguished Paper Award

Doowon Kim, an assistant professor at the University of Tennessee, received a prestigious award from ACM CCS for his decade-long study on Advanced Persistent Threats (APTs). His research provides a comprehensive understanding of APT evolution and global patterns, shedding new light on these sophisticated cyberattacks.

SAMSUNG T9 Portable SSD 2TB

SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.

How can (A)I help you?

A new study by Yifan Yu offers guidance on how to deploy emotion AI in various scenarios, emphasizing the importance of balancing human involvement with AI's emotional detection capabilities. The analysis showed that emotion AI works best when integrated with human employees, and some scenarios are better handled by humans alone.

Training the grid to spot cyberattacks without seeing your data

Researchers developed a cyberattack detection system that uses federated learning and cloud coordination to detect DDoS attacks in 6G-ready smart grids without exposing user energy-use data. The system achieved high accuracy and precision, but trade-offs were observed in terms of resources consumption.

Celestron NexStar 8SE Computerized Telescope

Celestron NexStar 8SE Computerized Telescope combines portable Schmidt-Cassegrain optics with GoTo pointing for outreach nights and field campaigns.

Illinois Chat is launched for campus community

The platform allows users to create personalized LLM-based chatbots, serving as a 24/7 teaching assistant or scraping campus websites to find needed resources. Illinois Chat has already been utilized in various departments and research groups, providing valuable feedback to make it more practical.

GoPro HERO13 Black

GoPro HERO13 Black records stabilized 5.3K video for instrument deployments, field notes, and outreach, even in harsh weather and underwater conditions.

New framework could defend factories from cyber-attacks

Researchers at Texas A&M University have developed a new framework to protect industrial processing facilities from cyber threats. The framework identifies vulnerabilities, detects abnormal activity in real-time, and provides safeguards and mitigation strategies to maintain safe operations.

Hardware vulnerability allows attackers to hack AI training data

Researchers at NC State University identified a hardware vulnerability that allows attackers to compromise AI privacy by exploiting ML accelerator behavior. The GATEBLEED vulnerability exploits power gating in AI accelerators, creating an observable timing channel for attackers.

Scientists develop end-to-end encryption for git services

Researchers at the University of Sydney have developed end-to-end encryption for git services, protecting sensitive code from cybersecurity threats. The encryption aligns seamlessly with existing platforms like Github and Bitbucket, reducing computational resources needed while encrypting only edits.

FIU cybersecurity researchers develop midflight defense against drone hijacking

Florida International University researchers have developed a defensive system called SHIELD that can detect and neutralize cyberattacks on drones in real time. The system allows the drone to finish its mission while providing robust recovery mechanisms, making it crucial for securing commercial drone use across industries.

Apple AirPods Pro (2nd Generation, USB-C)

Apple AirPods Pro (2nd Generation, USB-C) provide clear calls and strong noise reduction for interviews, conferences, and noisy field environments.

Next-generation quantum communication

The researchers have successfully demonstrated a four-dimensional QKD system with high efficiency and low measurement error rates. This breakthrough enables secure data transmission over long distances, with potential applications in fields such as finance and government.

From black box to glass box: AI explainability in stroke treatment

Liberate AI project develops an AI model capable of predicting long-term outcomes and potential complications in ischemic stroke patients. The model will be trained using Swarm Learning technology, aiming for explainability and transparency, while striking a balance between these features and accuracy.

Sky-Watcher EQ6-R Pro Equatorial Mount

Sky-Watcher EQ6-R Pro Equatorial Mount provides precise tracking capacity for deep-sky imaging rigs during long astrophotography sessions.

Forget numbers: your PIN could consist of a shimmy and a shake

Researchers at UBC have developed a new NFC-based gesture system that can distinguish between nine distinct gestures with high accuracy. This technology has the potential to improve accessibility for users with mobility issues and reduce the spread of germs through touchpads.

Apple Watch Series 11 (GPS, 46mm)

Apple Watch Series 11 (GPS, 46mm) tracks health metrics and safety alerts during long observing sessions, fieldwork, and remote expeditions.

New College of AI, Cyber and Computing launched at UT San Antonio

The University of Texas at San Antonio has launched the College of AI, Cyber and Computing, which will serve over 5,000 students pursuing degrees in rapidly growing career fields. The college is positioned to advance technological education and research, with faculty securing major grants and launching industry partnerships.

UCR researchers fortify AI against rogue rewiring

Researchers at UCR have developed a method to preserve AI safeguards in open-source models by retraining internal structure to detect and block dangerous prompts. The approach avoids external filters or software patches, instead changing the model's fundamental understanding of risky content.

Apple iPhone 17 Pro

Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.

Google.org backs the Wits MIND Institute with US$1M boost

The Wits MIND Institute has received a $1 million boost from Google.org, enabling it to drive next-generation breakthroughs in natural and artificial intelligence. The partnership aims to advance the scientific understanding of both natural and artificial intelligence, foster breakthrough research and technological innovation.

A new attack reshapes the rules of Bitcoin mining

A new attack, Infiltrated Selfish Mining (ISM), could reshape the rules of Bitcoin mining by allowing attackers to profit simultaneously. ISM avoids the miner's dilemma and yields up to 1.52 times more rewards than previous attacks.

Rigol DP832 Triple-Output Bench Power Supply

Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.

Login system helps spot online hacks without sacrificing privacy

A new login system called Client-Side Encrypted Access Logging (CSAL) detects online account compromise without exposing personal devices to invasive tracking. The system verifies whether a login came from a user's own device, addressing a flaw in how major platforms log account access.

The 12th Heidelberg Laureate Forum begins September 14

The 12th Heidelberg Laureate Forum brings together 200 young mathematicians and computer scientists with 29 distinguished laureates to exchange ideas and discuss pressing issues in their fields. The event features a diverse range of lectures, talks, and panel discussions.

Building a broader cybersecurity ecosystem

Experts from across industries and disciplines gathered to assess the current state of cybersecurity through a multidisciplinary lens. The workshop explored emerging technologies and the intersection of technology and policy, highlighting the need for a unified ecosystem to address persistent challenges.

Creality K1 Max 3D Printer

Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.

AI Chatbots can be exploited to extract more personal information

Researchers at King's College London found that AI chatbots can be exploited to reveal up to 12.5 times more personal information from users. The study used three types of malicious AIs to encourage disclosure of private info, with reciprocal strategies proving the most effective.

CalDigit TS4 Thunderbolt 4 Dock

CalDigit TS4 Thunderbolt 4 Dock simplifies serious desks with 18 ports for high-speed storage, monitors, and instruments across Mac and PC setups.

Connect and corrupt: C++ coroutines prone to code-reuse attack despite CFI

Researchers have discovered a code-reuse attack capable of exploiting C++ coroutines across three major compilers, including those protected by Control Flow Integrity. The attack, called Coroutine Frame-Oriented Programming (CFOP), chains together existing functions to achieve arbitrary code execution.

You’re better at spotting malware than you think

A new study suggests that with proper training, people of all skill levels can accurately detect malware. Novice users improved to 80% accuracy after receiving basic instructions on red flags, while expert users maintained high detection rates. The study highlights the importance of fostering critical thinking in cybersecurity.

Crop monitoring system utilizing IoT, AI and other tech showcased at ASABE

The system tracks and analyzes crop development using data from sensors, biosensors, the Internet of Things, and AI. Strong security protocols ensure farmer data remains private and resilient against future quantum computer attacks. The research team plans to improve their system with faster sensor processing and a solar-powered battery.

Exploring the evolution of decentralized networks in real-world systems

This book provides a beginner-friendly resource on the impact and evolution of decentralized networks, highlighting their applications in healthcare, supply chains, agriculture, climate monitoring, and education. The authors emphasize sustainability, data security, and ethical tech adoption.

Kestrel 3000 Pocket Weather Meter

Kestrel 3000 Pocket Weather Meter measures wind, temperature, and humidity in real time for site assessments, aviation checks, and safety briefings.

Aligning AI with Human Values and Well-Being

A special issue examines how AI can support human flourishing in various contexts, including healthcare, education, and digital interactions. The issue highlights the need for humane AI that balances technological advancement with human-centric values and psychological insight.

Watermarks offer no defense against deepfakes

Researchers at the University of Waterloo have created a tool called UnMarker that can remove any AI image watermark, highlighting the vulnerability of this technology to deepfakes. The team's discovery shows that even invisible encoded watermarks can be destroyed without knowing their design or internal parameters.

Sony Alpha a7 IV (Body Only)

Sony Alpha a7 IV (Body Only) delivers reliable low-light performance and rugged build for astrophotography, lab documentation, and field expeditions.

The Tap Trap: Android security vulnerability discovered

A research team at Vienna University of Technology has discovered a previously undiscovered Android security vulnerability that allows fraudulent apps to take control of mobile phones. Users may be tricked into performing unwanted actions, such as granting certain rights or deleting data.

Decoding quantum advantage

Researchers at Kyoto University have characterized quantum advantage by proving an equivalence between its existence and the security of certain cryptographic primitives. This breakthrough implies that when quantum advantage does not exist, many conventional cryptographic primitives are broken, including post-quantum ones.

Swansea University drives next-gen cybersecurity in aerospace systems

Researchers are applying Model-Based Systems Engineering to enhance system resilience and protect against cyber threats in aerospace. The initiative aims to create robust frameworks for safeguarding emerging technologies, with potential benefits including job creation and skills development.

Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C)

Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C) keeps Macs, tablets, and meters powered during extended observing runs and remote surveys.

New attack can make AI ‘see’ whatever you want

Researchers have demonstrated a new technique, RisingAttacK, to manipulate all widely used AI computer vision systems, allowing them to control what the AI 'sees'. The attack is effective at influencing the AI's ability to detect top targets, such as cars, pedestrians, or stop signs.

How to manage cybersecurity risks in the energy sector?

A new handbook from the University of Vaasa provides a comprehensive toolkit for policymakers, energy companies, and cybersecurity professionals to improve cyber resilience. The handbook emphasizes socio-cyber-physical risk management, education, awareness, cooperation, and strategic investments to reduce threats in the energy sector.

Davis Instruments Vantage Pro2 Weather Station

Davis Instruments Vantage Pro2 Weather Station offers research-grade local weather data for networked stations, campuses, and community observatories.

Researchers show AI art protection tools still leave creators at risk

Researchers discovered AI art protection tools have critical weaknesses that cannot reliably stop AI models from training on artists' work. LightShed, a new method, can detect and remove distortions, stripping away protections and rendering images usable again for generative AI model training.

Websites are tracking you via browser fingerprinting

Researchers at Texas A&M University found that websites use browser fingerprinting to track people across browser sessions and sites. Even users who opt out of tracking under privacy laws may still be silently tracked through fingerprinting.

Fluke 87V Industrial Digital Multimeter

Fluke 87V Industrial Digital Multimeter is a trusted meter for precise measurements during instrument integration, repairs, and field diagnostics.

Our online world relies on encryption. What happens if it fails?

Researchers at Boston University are developing a groundbreaking method for securing sensitive data in the face of emerging quantum computing threats. Their approach, called Encrypted Operator Computing (EOC), merges physics, computer science, and mathematics to enable scalable methods for computing directly on encrypted data.