The $2.5 million DRIFT program aims to close critical talent gaps and safeguard connected vehicles by providing specialized online and in-person training. Worcester Polytechnic Institute will lead the university’s DRIFT program, offering tuition-free modules and real-world training to upskill engineers and professionals.
Experts from across industries and disciplines gathered to assess the current state of cybersecurity through a multidisciplinary lens. The workshop explored emerging technologies and the intersection of technology and policy, highlighting the need for a unified ecosystem to address persistent challenges.
Researchers at King's College London found that AI chatbots can be exploited to reveal up to 12.5 times more personal information from users. The study used three types of malicious AIs to encourage disclosure of private info, with reciprocal strategies proving the most effective.
A qualitative interview study with 21 international participants explored the opportunities and challenges of cryptographic update processes. Software developers face unique security risks when updating crypto implementations, which can lead to a single point of failure in the supply chain.
Meta Quest 3 512GB
Meta Quest 3 512GB enables immersive mission planning, terrain rehearsal, and interactive STEM demos with high-resolution mixed-reality experiences.
Researchers have discovered a code-reuse attack capable of exploiting C++ coroutines across three major compilers, including those protected by Control Flow Integrity. The attack, called Coroutine Frame-Oriented Programming (CFOP), chains together existing functions to achieve arbitrary code execution.
A new study suggests that with proper training, people of all skill levels can accurately detect malware. Novice users improved to 80% accuracy after receiving basic instructions on red flags, while expert users maintained high detection rates. The study highlights the importance of fostering critical thinking in cybersecurity.
Researchers found that mobile users were less likely to click on phishing links compared to PC users, especially for lower-risk URLs. The study suggests that device use settings affect users' risk assessment abilities, leading to more avoidant behavior on mobile devices.
The system tracks and analyzes crop development using data from sensors, biosensors, the Internet of Things, and AI. Strong security protocols ensure farmer data remains private and resilient against future quantum computer attacks. The research team plans to improve their system with faster sensor processing and a solar-powered battery.
This book provides a beginner-friendly resource on the impact and evolution of decentralized networks, highlighting their applications in healthcare, supply chains, agriculture, climate monitoring, and education. The authors emphasize sustainability, data security, and ethical tech adoption.
Apple iPhone 17 Pro
Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.
A study by IMDEA Networks reveals that 86% of mobile apps collect at least one type of sensitive data via WiFi and Bluetooth connections. The research team analyzed 52 SDKs in nearly 10,000 apps and found that many use these technologies to track users' movements indoors and build user profiles for targeted advertising.
A special issue examines how AI can support human flourishing in various contexts, including healthcare, education, and digital interactions. The issue highlights the need for humane AI that balances technological advancement with human-centric values and psychological insight.
Researchers at the University of Waterloo have created a tool called UnMarker that can remove any AI image watermark, highlighting the vulnerability of this technology to deepfakes. The team's discovery shows that even invisible encoded watermarks can be destroyed without knowing their design or internal parameters.
A research team at Vienna University of Technology has discovered a previously undiscovered Android security vulnerability that allows fraudulent apps to take control of mobile phones. Users may be tricked into performing unwanted actions, such as granting certain rights or deleting data.
GoPro HERO13 Black
GoPro HERO13 Black records stabilized 5.3K video for instrument deployments, field notes, and outreach, even in harsh weather and underwater conditions.
The new compute roadmap aims to improve lives and livelihoods with advanced computing power. It includes investments in AI research, healthcare diagnostics, and renewable energy.
Researchers at Kyoto University have characterized quantum advantage by proving an equivalence between its existence and the security of certain cryptographic primitives. This breakthrough implies that when quantum advantage does not exist, many conventional cryptographic primitives are broken, including post-quantum ones.
Researchers from the University of Surrey investigate how senior citizens are targeted by cybercriminals due to societal biases, including ageism and stereotypes that portray them as frail and gullible. The study highlights the need for educational initiatives and support systems to empower older adults to protect themselves online.
The partnership aims to address the region's skills shortage by offering flexible, evidence-based cyber education; 15 online micro-credentials are available for individual learners and organizations, spanning key areas such as AI security and incident response.
Researchers are applying Model-Based Systems Engineering to enhance system resilience and protect against cyber threats in aerospace. The initiative aims to create robust frameworks for safeguarding emerging technologies, with potential benefits including job creation and skills development.
SAMSUNG T9 Portable SSD 2TB
SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.
Researchers have demonstrated a new technique, RisingAttacK, to manipulate all widely used AI computer vision systems, allowing them to control what the AI 'sees'. The attack is effective at influencing the AI's ability to detect top targets, such as cars, pedestrians, or stop signs.
A new handbook from the University of Vaasa provides a comprehensive toolkit for policymakers, energy companies, and cybersecurity professionals to improve cyber resilience. The handbook emphasizes socio-cyber-physical risk management, education, awareness, cooperation, and strategic investments to reduce threats in the energy sector.
Researchers discovered AI art protection tools have critical weaknesses that cannot reliably stop AI models from training on artists' work. LightShed, a new method, can detect and remove distortions, stripping away protections and rendering images usable again for generative AI model training.
Creality K1 Max 3D Printer
Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.
FANDANGO, a new open-source fuzzing tool, employs an iterative procedure modeled on biological evolution to produce high-quality test inputs that cover both semantics and syntax. The tool enables complete control over test inputs, allowing testers to specify input characteristics and explore specific parts of the program.
The Association for Computing Machinery (ACM) has announced a new open-access journal, TAISAP, focusing on AI security and privacy. The journal aims to develop methods for assessing the security of AI models, systems, and environments, including adversarial attacks, privacy concerns, and cybersecurity applications.
Researchers at Texas A&M University found that websites use browser fingerprinting to track people across browser sessions and sites. Even users who opt out of tracking under privacy laws may still be silently tracked through fingerprinting.
Researchers at Boston University are developing a groundbreaking method for securing sensitive data in the face of emerging quantum computing threats. Their approach, called Encrypted Operator Computing (EOC), merges physics, computer science, and mathematics to enable scalable methods for computing directly on encrypted data.
Prof. AU Man Ho Allen has been recognized with the prestigious Hong Kong Engineering Science and Technology (HKEST) Award 2024-25 for his outstanding contributions to the Web3 ecosystem and the digital economy. His research focuses on developing practical, secure, and privacy-preserving cryptographic solutions.
GQ GMC-500Plus Geiger Counter
GQ GMC-500Plus Geiger Counter logs beta, gamma, and X-ray levels for environmental monitoring, training labs, and safety demonstrations.
Native Android apps silently listen on fixed local ports to receive web tracking data from their web tracking solutions without user consent. Researchers found that Meta's Pixel and Yandex Metrica map Android users' browsing habits with their persistent identities, bypassing privacy protections.
The ENABLE-6G project has developed 20 technological breakthroughs that prioritize network intelligence, energy efficiency, localization, and privacy-preserving analytics. The project has generated a range of outputs, including real-world testing platforms, wireless sensing algorithms, and AI-driven network optimization methods.
A new study reveals that ransomware attacks have become the primary driver of health care data breaches in the United States. The study found that ransomware accounted for 69% of all patient records compromised in 2024, despite accounting for only 11% of breaches by number.
Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C)
Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C) keeps Macs, tablets, and meters powered during extended observing runs and remote surveys.
Researchers from ETH Zurich have discovered a new class of vulnerabilities in Intel processors that can be exploited to gain unauthorized access to information from other users. The 'BPRC' vulnerability affects all Intel processors and can be triggered by special inputs, allowing attackers to read sensitive information.
A study by King's College London reveals how surveillance technologies in smart homes exacerbate power imbalances between domestic workers and employers, undermining their rights and increasing vulnerability. The constant monitoring of these employees can lead to mental wellbeing issues and a lack of trust in the workplace.
The University of Tennessee has been designated a National Center of Academic Excellence in Cybersecurity, marking a significant advancement in its cybersecurity programs. The designation will provide EECS students with access to federal grants, expanded funding opportunities, and connections to top-tier national networks.
Sony Alpha a7 IV (Body Only)
Sony Alpha a7 IV (Body Only) delivers reliable low-light performance and rugged build for astrophotography, lab documentation, and field expeditions.
This year's ACM awards recognize groundbreaking innovations in autonomous systems, cryptography, and software for parallel computers. Peter Stone receives the Allen Newell Award for contributions to AI, while William Gropp and his team receive the Software System Award for developing MPICH.
Recent high-quality deepfake videos can feature realistic heartbeats and minute changes in face color, making them challenging to detect. Researchers found that even small variations in skin tone and facial motion can replicate the original pulse in deepfakes.
Researchers at Carnegie Mellon University developed a cybersecurity lab, CyberSim Lab, that integrates experiential learning, role play, and collaborative learning to support learning outcomes. The lab is designed to bridge the gap between classroom education and real-world workplace skills.
The University of Texas at El Paso has launched the AI Institute for Community-Engaged Research (AI-ICER), an interdisciplinary think tank leveraging artificial intelligence technologies to address pressing regional challenges. The institute aims to foster collaboration between researchers, public and private sector groups, and industr...
Celestron NexStar 8SE Computerized Telescope
Celestron NexStar 8SE Computerized Telescope combines portable Schmidt-Cassegrain optics with GoTo pointing for outreach nights and field campaigns.
Florida Atlantic University has been recognized as a National Center of Academic Excellence in Cyber Research, affirming its leadership in cybersecurity research at the doctoral level. The designation highlights the university's faculty dedication to pushing cyber science boundaries and equipping students for high-impact research.
Researchers found that nearly 10% of compliant websites still run non-compliant ads, violating the Acceptable Ads Standard. Flaws in ad-filtering rules allow advertisers to bypass size and format restrictions, putting user privacy at risk.
Researchers from the UK and Australia are combining forces to tackle pressing global challenges through eight collaborative projects focusing on AI, sustainability, space, and cybersecurity. The partnership aims to develop innovative technologies that work for people and the planet, not just profit.
Dr. Latifur Khan, a renowned computer science professor, has been elected as an AAAS Fellow for his pioneering work in machine learning and big-data analytics. He developed innovative solutions to adapt machine learning models to cybersecurity risks and created an AI-driven tool to analyze political conflict and violence.
Quantum Base, a Lancaster University spin-out, has successfully floated on the London Stock Exchange with a £4.8 million fundraising. The company aims to harness quantum technology to address real-world challenges through its patented Q-ID solution for anti-counterfeiting.
Apple MacBook Pro 14-inch (M4 Pro)
Apple MacBook Pro 14-inch (M4 Pro) powers local ML workloads, large datasets, and multi-display analysis for field and lab teams.
Researchers developed a new framework, PAC Privacy, to maintain AI model accuracy and ensure sensitive data remains safe from attackers. The new variant of PAC Privacy estimates anisotropic noise, reducing computational cost and boosting accuracy.
A recent study from UTSA researchers reveals that large language models (LLMs) can pose a serious threat to programmers who use them to help write code. The study found that up to 97% of software developers incorporate generative AI into their workflow, and 30% of code written today is AI-generated.
Researchers successfully demonstrated the UK’s first long-distance ultra-secure transfer of data over a quantum communications network, enabling secure video calls and encrypted medical data transmission. The network uses standard fibreoptic infrastructure and quantum phenomena to enable ultra-secure data transfer.
Aranet4 Home CO2 Monitor
Aranet4 Home CO2 Monitor tracks ventilation quality in labs, classrooms, and conference rooms with long battery life and clear e-ink readouts.
The University of Arizona College of Engineering has received a $1 million endowment to support its electrical and computer engineering department. The Thomas R. Brown Family Private Foundation donated the funds to create a leadership chair, which will focus on artificial intelligence and cybersecurity research.
A new security protocol has been developed to protect miniaturized wireless medical implants from cyber threats, ensuring patient safety. The protocol uses a quirk of wireless power transfer to authenticate device access and prevent hacking.
A team led by Dr. Marcus Botacin is creating a large language model (LLM) to automatically identify malware and write rules to defend against it. The LLM will use signatures to complement human analysts' skills, identifying malware faster and more accurately.
Hebrew University alumni Assaf Rappaport, Ami Lotbek, and Yinon Costica have achieved the largest exit in Israel's history with the acquisition of WIZ by Google. The trio is proud graduates of the university, with Lotbek also holding a master's degree from the School of Engineering and Computer Science.
The Third Annual FBI & KU Cybersecurity Conference will address the growing threat of cybersecurity to national security and the economy. The event will bring together government, industry, workforce, and research experts to share knowledge and address this challenge.
Nikon Monarch 5 8x42 Binoculars
Nikon Monarch 5 8x42 Binoculars deliver bright, sharp views for wildlife surveys, eclipse chases, and quick star-field scans at dark sites.
Researchers at Mizzou have developed a proactive approach using artificial intelligence to address evolving threats against smart grids. The CIBR-Fort system can predict cyberattacks with 91.88% accuracy and defend against them in real-time, enabling scalable security for power grids of the future.
Daniel G. Graham, author of 'Ethical Hacking', has contributed expertise to the new edition of 'Metasploit: The Penetration Tester's Guide'. This comprehensive resource covers key topics such as penetration testing in cloud environments and advanced evasion techniques.
YuraScanner harnesses LLMs to navigate web applications like humans do, identifying tasks and workflows. It detects previously unknown XSS vulnerabilities, surpassing existing scanners.
Researchers have developed a new form of QR code that can protect users from phishing attacks by signaling whether a link is safe or not. The SDMQR codes provide an added layer of security without interfering with existing functionality, allowing companies to replace traditional barcodes with more sophisticated QR codes.
Researchers at Johannes Gutenberg University Mainz are working on a subproject to investigate theoretical modeling and experimental realization of concepts for quantum repeaters. They aim to reduce transmission losses and generate high-quality quantum states to build secure quantum networks.
Rigol DP832 Triple-Output Bench Power Supply
Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.
The University of Bath's new Institute for Digital Security and Behavior aims to put people at the heart of research into digital security and behavior. Researchers will study factors that make individuals, organizations, and societies safer and more secure.
Researchers introduce 'fitness centrality,' a faster method to identify crucial elements in any network, with practical applications in supply chains, ecological conservation, and cybersecurity. The approach streamlines analysis, making it practical for vast networks.
The project aims to establish a new EAGLE SFS program at George Mason University to support students in gaining interdisciplinary education, hands-on research experience, and leadership skills. Graduates will serve in key government roles, advancing national defense, public safety, and technological innovation.
Apple iPad Pro 11-inch (M4)
Apple iPad Pro 11-inch (M4) runs demanding GIS, imaging, and annotation workflows on the go for surveys, briefings, and lab notebooks.
The University of Texas at San Antonio has launched the Center for Space Technology and Operations Research, which will advance engineering, technology, and operations supporting space missions. The center will address growing demands from civil, commercial, and national security space agencies and companies.
Researchers discovered a key security weakness in AMD computer processors due to 'BadRAM', rogue memory modules providing false information to the processor. This allows attackers to bypass CPU memory protections and access sensitive data or cause disruptions in shared cloud environments.
A recent study by the Society for Risk Analysis found that employees who visit adult or gambling sites are more likely to encounter seven types of malware, including coinminers and ransomware. Visiting these types of websites increases the risk of infection by two-fold.