The researchers have successfully demonstrated a four-dimensional QKD system with high efficiency and low measurement error rates. This breakthrough enables secure data transmission over long distances, with potential applications in fields such as finance and government.
Apple iPhone 17 Pro
Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.
Liberate AI project develops an AI model capable of predicting long-term outcomes and potential complications in ischemic stroke patients. The model will be trained using Swarm Learning technology, aiming for explainability and transparency, while striking a balance between these features and accuracy.
The CIAS Community Cybersecurity Clinic will expand its reach to more organizations with the support of a $100,000 grant from Craig Newmark Philanthropies. The clinic provides low- and no-cost cybersecurity services to organizations in need, as well as hands-on workforce development opportunities for UT San Antonio students.
The European Lighthouse on Secure and Safe AI (ELSA) network has grown to include 41 members, expanding its expertise in pressing AI research topics and fostering knowledge exchange. The network's founding members are renowned for their work on Safety, Security, Artificial Intelligence, and Machine Learning.
Researchers at UBC have developed a new NFC-based gesture system that can distinguish between nine distinct gestures with high accuracy. This technology has the potential to improve accessibility for users with mobility issues and reduce the spread of germs through touchpads.
GQ GMC-500Plus Geiger Counter
GQ GMC-500Plus Geiger Counter logs beta, gamma, and X-ray levels for environmental monitoring, training labs, and safety demonstrations.
The partnership aims to provide cutting-edge professional development to public sector and critical infrastructure leaders across Canada, equipped with strategic skills to outthink and outmaneuver threats. The initiative strengthens Canada's cyber resilience by enhancing national cyber resilience.
A recent study found that cybersecurity training programs do little to prevent employees from falling for phishing scams. Researchers sent 10 different phishing email campaigns to over 19,500 employees at UC San Diego Health and found that embedded phishing training only reduced the likelihood of clicking on a phishing link by 2%. As t...
Southwest Research Institute (SwRI) has installed a private 5G network to boost security, eliminate dependency on outside mobile networks, and expand off-site capabilities for advanced 5G projects. The secure network supports various 5G advancements, including cybersecurity research, drone technology, and antenna development.
AI TechX, a UT Knoxville initiative, awards $60,000 seed funding to nine projects addressing real-world challenges through AI research and innovation. The funded projects accelerate adoption of AI across various disciplines, enabling high-impact collaborations and job creation.
Apple MacBook Pro 14-inch (M4 Pro)
Apple MacBook Pro 14-inch (M4 Pro) powers local ML workloads, large datasets, and multi-display analysis for field and lab teams.
The University of Texas at San Antonio has launched the College of AI, Cyber and Computing, which will serve over 5,000 students pursuing degrees in rapidly growing career fields. The college is positioned to advance technological education and research, with faculty securing major grants and launching industry partnerships.
The £250 million investment will create an Advanced Marine Technology Hub at the University of Plymouth, leveraging its expertise in autonomous marine systems, maritime cyber security, and renewable energy. This initiative aims to boost the city's economy and enhance UK's national resilience.
Researchers at UCR have developed a method to preserve AI safeguards in open-source models by retraining internal structure to detect and block dangerous prompts. The approach avoids external filters or software patches, instead changing the model's fundamental understanding of risky content.
Apple AirPods Pro (2nd Generation, USB-C)
Apple AirPods Pro (2nd Generation, USB-C) provide clear calls and strong noise reduction for interviews, conferences, and noisy field environments.
The Wits MIND Institute has received a $1 million boost from Google.org, enabling it to drive next-generation breakthroughs in natural and artificial intelligence. The partnership aims to advance the scientific understanding of both natural and artificial intelligence, foster breakthrough research and technological innovation.
A new attack, Infiltrated Selfish Mining (ISM), could reshape the rules of Bitcoin mining by allowing attackers to profit simultaneously. ISM avoids the miner's dilemma and yields up to 1.52 times more rewards than previous attacks.
A comprehensive study reveals critical vulnerabilities in smart railways, from data breaches to operational sabotage. Key findings propose comprehensive mitigation strategies, emphasizing human factors and staff training in building cyber-resilient systems.
A new login system called Client-Side Encrypted Access Logging (CSAL) detects online account compromise without exposing personal devices to invasive tracking. The system verifies whether a login came from a user's own device, addressing a flaw in how major platforms log account access.
The 12th Heidelberg Laureate Forum brings together 200 young mathematicians and computer scientists with 29 distinguished laureates to exchange ideas and discuss pressing issues in their fields. The event features a diverse range of lectures, talks, and panel discussions.
Rigol DP832 Triple-Output Bench Power Supply
Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.
A new study by UC Davis researchers reveals that popular GenAI browser assistants collect and share sensitive data without users' knowledge. The study highlights the need for stronger safeguards and transparency to protect user privacy online.
The 34th International Joint Conference on Artificial Intelligence (IJCAI) will take place in Montreal, Canada, from August 16 to 22, 2025. The conference aims to showcase the frontiers of artificial intelligence research and applications, with a focus on AI's impact on society.
The $2.5 million DRIFT program aims to close critical talent gaps and safeguard connected vehicles by providing specialized online and in-person training. Worcester Polytechnic Institute will lead the university’s DRIFT program, offering tuition-free modules and real-world training to upskill engineers and professionals.
Experts from across industries and disciplines gathered to assess the current state of cybersecurity through a multidisciplinary lens. The workshop explored emerging technologies and the intersection of technology and policy, highlighting the need for a unified ecosystem to address persistent challenges.
Researchers at King's College London found that AI chatbots can be exploited to reveal up to 12.5 times more personal information from users. The study used three types of malicious AIs to encourage disclosure of private info, with reciprocal strategies proving the most effective.
Creality K1 Max 3D Printer
Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.
A qualitative interview study with 21 international participants explored the opportunities and challenges of cryptographic update processes. Software developers face unique security risks when updating crypto implementations, which can lead to a single point of failure in the supply chain.
Researchers have discovered a code-reuse attack capable of exploiting C++ coroutines across three major compilers, including those protected by Control Flow Integrity. The attack, called Coroutine Frame-Oriented Programming (CFOP), chains together existing functions to achieve arbitrary code execution.
A new study suggests that with proper training, people of all skill levels can accurately detect malware. Novice users improved to 80% accuracy after receiving basic instructions on red flags, while expert users maintained high detection rates. The study highlights the importance of fostering critical thinking in cybersecurity.
SAMSUNG T9 Portable SSD 2TB
SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.
Researchers found that mobile users were less likely to click on phishing links compared to PC users, especially for lower-risk URLs. The study suggests that device use settings affect users' risk assessment abilities, leading to more avoidant behavior on mobile devices.
The system tracks and analyzes crop development using data from sensors, biosensors, the Internet of Things, and AI. Strong security protocols ensure farmer data remains private and resilient against future quantum computer attacks. The research team plans to improve their system with faster sensor processing and a solar-powered battery.
This book provides a beginner-friendly resource on the impact and evolution of decentralized networks, highlighting their applications in healthcare, supply chains, agriculture, climate monitoring, and education. The authors emphasize sustainability, data security, and ethical tech adoption.
AmScope B120C-5M Compound Microscope
AmScope B120C-5M Compound Microscope supports teaching labs and QA checks with LED illumination, mechanical stage, and included 5MP camera.
A study by IMDEA Networks reveals that 86% of mobile apps collect at least one type of sensitive data via WiFi and Bluetooth connections. The research team analyzed 52 SDKs in nearly 10,000 apps and found that many use these technologies to track users' movements indoors and build user profiles for targeted advertising.
A special issue examines how AI can support human flourishing in various contexts, including healthcare, education, and digital interactions. The issue highlights the need for humane AI that balances technological advancement with human-centric values and psychological insight.
Researchers at the University of Waterloo have created a tool called UnMarker that can remove any AI image watermark, highlighting the vulnerability of this technology to deepfakes. The team's discovery shows that even invisible encoded watermarks can be destroyed without knowing their design or internal parameters.
The new compute roadmap aims to improve lives and livelihoods with advanced computing power. It includes investments in AI research, healthcare diagnostics, and renewable energy.
A research team at Vienna University of Technology has discovered a previously undiscovered Android security vulnerability that allows fraudulent apps to take control of mobile phones. Users may be tricked into performing unwanted actions, such as granting certain rights or deleting data.
Davis Instruments Vantage Pro2 Weather Station
Davis Instruments Vantage Pro2 Weather Station offers research-grade local weather data for networked stations, campuses, and community observatories.
Researchers at Kyoto University have characterized quantum advantage by proving an equivalence between its existence and the security of certain cryptographic primitives. This breakthrough implies that when quantum advantage does not exist, many conventional cryptographic primitives are broken, including post-quantum ones.
The partnership aims to address the region's skills shortage by offering flexible, evidence-based cyber education; 15 online micro-credentials are available for individual learners and organizations, spanning key areas such as AI security and incident response.
Researchers from the University of Surrey investigate how senior citizens are targeted by cybercriminals due to societal biases, including ageism and stereotypes that portray them as frail and gullible. The study highlights the need for educational initiatives and support systems to empower older adults to protect themselves online.
Kestrel 3000 Pocket Weather Meter
Kestrel 3000 Pocket Weather Meter measures wind, temperature, and humidity in real time for site assessments, aviation checks, and safety briefings.
Researchers are applying Model-Based Systems Engineering to enhance system resilience and protect against cyber threats in aerospace. The initiative aims to create robust frameworks for safeguarding emerging technologies, with potential benefits including job creation and skills development.
Researchers have demonstrated a new technique, RisingAttacK, to manipulate all widely used AI computer vision systems, allowing them to control what the AI 'sees'. The attack is effective at influencing the AI's ability to detect top targets, such as cars, pedestrians, or stop signs.
A new handbook from the University of Vaasa provides a comprehensive toolkit for policymakers, energy companies, and cybersecurity professionals to improve cyber resilience. The handbook emphasizes socio-cyber-physical risk management, education, awareness, cooperation, and strategic investments to reduce threats in the energy sector.
Meta Quest 3 512GB
Meta Quest 3 512GB enables immersive mission planning, terrain rehearsal, and interactive STEM demos with high-resolution mixed-reality experiences.
Researchers discovered AI art protection tools have critical weaknesses that cannot reliably stop AI models from training on artists' work. LightShed, a new method, can detect and remove distortions, stripping away protections and rendering images usable again for generative AI model training.
FANDANGO, a new open-source fuzzing tool, employs an iterative procedure modeled on biological evolution to produce high-quality test inputs that cover both semantics and syntax. The tool enables complete control over test inputs, allowing testers to specify input characteristics and explore specific parts of the program.
The Association for Computing Machinery (ACM) has announced a new open-access journal, TAISAP, focusing on AI security and privacy. The journal aims to develop methods for assessing the security of AI models, systems, and environments, including adversarial attacks, privacy concerns, and cybersecurity applications.
Researchers at Texas A&M University found that websites use browser fingerprinting to track people across browser sessions and sites. Even users who opt out of tracking under privacy laws may still be silently tracked through fingerprinting.
Researchers at Boston University are developing a groundbreaking method for securing sensitive data in the face of emerging quantum computing threats. Their approach, called Encrypted Operator Computing (EOC), merges physics, computer science, and mathematics to enable scalable methods for computing directly on encrypted data.
Nikon Monarch 5 8x42 Binoculars
Nikon Monarch 5 8x42 Binoculars deliver bright, sharp views for wildlife surveys, eclipse chases, and quick star-field scans at dark sites.
Prof. AU Man Ho Allen has been recognized with the prestigious Hong Kong Engineering Science and Technology (HKEST) Award 2024-25 for his outstanding contributions to the Web3 ecosystem and the digital economy. His research focuses on developing practical, secure, and privacy-preserving cryptographic solutions.
Native Android apps silently listen on fixed local ports to receive web tracking data from their web tracking solutions without user consent. Researchers found that Meta's Pixel and Yandex Metrica map Android users' browsing habits with their persistent identities, bypassing privacy protections.
The ENABLE-6G project has developed 20 technological breakthroughs that prioritize network intelligence, energy efficiency, localization, and privacy-preserving analytics. The project has generated a range of outputs, including real-world testing platforms, wireless sensing algorithms, and AI-driven network optimization methods.
A new study reveals that ransomware attacks have become the primary driver of health care data breaches in the United States. The study found that ransomware accounted for 69% of all patient records compromised in 2024, despite accounting for only 11% of breaches by number.
Researchers from ETH Zurich have discovered a new class of vulnerabilities in Intel processors that can be exploited to gain unauthorized access to information from other users. The 'BPRC' vulnerability affects all Intel processors and can be triggered by special inputs, allowing attackers to read sensitive information.
GoPro HERO13 Black
GoPro HERO13 Black records stabilized 5.3K video for instrument deployments, field notes, and outreach, even in harsh weather and underwater conditions.
A study by King's College London reveals how surveillance technologies in smart homes exacerbate power imbalances between domestic workers and employers, undermining their rights and increasing vulnerability. The constant monitoring of these employees can lead to mental wellbeing issues and a lack of trust in the workplace.
The University of Tennessee has been designated a National Center of Academic Excellence in Cybersecurity, marking a significant advancement in its cybersecurity programs. The designation will provide EECS students with access to federal grants, expanded funding opportunities, and connections to top-tier national networks.
This year's ACM awards recognize groundbreaking innovations in autonomous systems, cryptography, and software for parallel computers. Peter Stone receives the Allen Newell Award for contributions to AI, while William Gropp and his team receive the Software System Award for developing MPICH.
Recent high-quality deepfake videos can feature realistic heartbeats and minute changes in face color, making them challenging to detect. Researchers found that even small variations in skin tone and facial motion can replicate the original pulse in deepfakes.
Researchers at Carnegie Mellon University developed a cybersecurity lab, CyberSim Lab, that integrates experiential learning, role play, and collaborative learning to support learning outcomes. The lab is designed to bridge the gap between classroom education and real-world workplace skills.
Garmin GPSMAP 67i with inReach
Garmin GPSMAP 67i with inReach provides rugged GNSS navigation, satellite messaging, and SOS for backcountry geology and climate field teams.
The University of Texas at El Paso has launched the AI Institute for Community-Engaged Research (AI-ICER), an interdisciplinary think tank leveraging artificial intelligence technologies to address pressing regional challenges. The institute aims to foster collaboration between researchers, public and private sector groups, and industr...
Florida Atlantic University has been recognized as a National Center of Academic Excellence in Cyber Research, affirming its leadership in cybersecurity research at the doctoral level. The designation highlights the university's faculty dedication to pushing cyber science boundaries and equipping students for high-impact research.
Researchers found that nearly 10% of compliant websites still run non-compliant ads, violating the Acceptable Ads Standard. Flaws in ad-filtering rules allow advertisers to bypass size and format restrictions, putting user privacy at risk.
CalDigit TS4 Thunderbolt 4 Dock
CalDigit TS4 Thunderbolt 4 Dock simplifies serious desks with 18 ports for high-speed storage, monitors, and instruments across Mac and PC setups.
Researchers from the UK and Australia are combining forces to tackle pressing global challenges through eight collaborative projects focusing on AI, sustainability, space, and cybersecurity. The partnership aims to develop innovative technologies that work for people and the planet, not just profit.
Dr. Latifur Khan, a renowned computer science professor, has been elected as an AAAS Fellow for his pioneering work in machine learning and big-data analytics. He developed innovative solutions to adapt machine learning models to cybersecurity risks and created an AI-driven tool to analyze political conflict and violence.
Quantum Base, a Lancaster University spin-out, has successfully floated on the London Stock Exchange with a £4.8 million fundraising. The company aims to harness quantum technology to address real-world challenges through its patented Q-ID solution for anti-counterfeiting.