Doowon Kim, an assistant professor at the University of Tennessee, received a prestigious award from ACM CCS for his decade-long study on Advanced Persistent Threats (APTs). His research provides a comprehensive understanding of APT evolution and global patterns, shedding new light on these sophisticated cyberattacks.
Researchers found that providing feedback to everyone after the entire simulation ends leads to better learning outcomes. The study's findings suggest that companies can design more effective software tools using this approach, which has been implemented by KnowBe4.
A new security framework based on blockchain technology and distributed reinforcement learning ensures secure data storage and transmission while adapting to evolving threats. The framework demonstrated improved memory consumption and transaction latency compared to existing approaches.
Researchers are developing training-free detection methods and novel countermeasures to protect sensitive information from emerging wireless eavesdropping techniques. By manipulating wireless channels, these defenses can obscure or distort signal patterns that attackers rely on.
SAMSUNG T9 Portable SSD 2TB
SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.
A new study by Yifan Yu offers guidance on how to deploy emotion AI in various scenarios, emphasizing the importance of balancing human involvement with AI's emotional detection capabilities. The analysis showed that emotion AI works best when integrated with human employees, and some scenarios are better handled by humans alone.
Researchers developed a cyberattack detection system that uses federated learning and cloud coordination to detect DDoS attacks in 6G-ready smart grids without exposing user energy-use data. The system achieved high accuracy and precision, but trade-offs were observed in terms of resources consumption.
Researchers at the University of Missouri have developed an AI-powered method to detect hidden hardware trojans in chip designs, offering a 97% accurate solution. The approach leverages large language models to scan for suspicious code and provides explanations for detected threats.
Celestron NexStar 8SE Computerized Telescope
Celestron NexStar 8SE Computerized Telescope combines portable Schmidt-Cassegrain optics with GoTo pointing for outreach nights and field campaigns.
New WiFi technology can create images of individuals and surroundings by passively recording communication in radio networks, raising concerns about privacy. Researchers call for protective measures and privacy safeguards in the forthcoming IEEE 802.11bf WiFi standard.
The platform allows users to create personalized LLM-based chatbots, serving as a 24/7 teaching assistant or scraping campus websites to find needed resources. Illinois Chat has already been utilized in various departments and research groups, providing valuable feedback to make it more practical.
A new study reveals that multitasking makes phishing detection harder, but introducing brief reminders can significantly improve accuracy. Researchers found that working memory load and message framing cues affect detection performance.
GoPro HERO13 Black
GoPro HERO13 Black records stabilized 5.3K video for instrument deployments, field notes, and outreach, even in harsh weather and underwater conditions.
Researchers at Texas A&M University have developed a new framework to protect industrial processing facilities from cyber threats. The framework identifies vulnerabilities, detects abnormal activity in real-time, and provides safeguards and mitigation strategies to maintain safe operations.
Researchers at NC State University identified a hardware vulnerability that allows attackers to compromise AI privacy by exploiting ML accelerator behavior. The GATEBLEED vulnerability exploits power gating in AI accelerators, creating an observable timing channel for attackers.
Researchers at the University of Sydney have developed end-to-end encryption for git services, protecting sensitive code from cybersecurity threats. The encryption aligns seamlessly with existing platforms like Github and Bitbucket, reducing computational resources needed while encrypting only edits.
Florida International University researchers have developed a defensive system called SHIELD that can detect and neutralize cyberattacks on drones in real time. The system allows the drone to finish its mission while providing robust recovery mechanisms, making it crucial for securing commercial drone use across industries.
Researchers Joseph Clark, Doowon Kim, and Joon Sue Lee received NSF CAREER awards for their groundbreaking work in chemistry, computer science, and physics. They are developing new methods to track pharmaceutical drugs and detect phishing websites, while studying the properties of quantum materials.
Apple AirPods Pro (2nd Generation, USB-C)
Apple AirPods Pro (2nd Generation, USB-C) provide clear calls and strong noise reduction for interviews, conferences, and noisy field environments.
The researchers have successfully demonstrated a four-dimensional QKD system with high efficiency and low measurement error rates. This breakthrough enables secure data transmission over long distances, with potential applications in fields such as finance and government.
The CIAS Community Cybersecurity Clinic will expand its reach to more organizations with the support of a $100,000 grant from Craig Newmark Philanthropies. The clinic provides low- and no-cost cybersecurity services to organizations in need, as well as hands-on workforce development opportunities for UT San Antonio students.
Liberate AI project develops an AI model capable of predicting long-term outcomes and potential complications in ischemic stroke patients. The model will be trained using Swarm Learning technology, aiming for explainability and transparency, while striking a balance between these features and accuracy.
The European Lighthouse on Secure and Safe AI (ELSA) network has grown to include 41 members, expanding its expertise in pressing AI research topics and fostering knowledge exchange. The network's founding members are renowned for their work on Safety, Security, Artificial Intelligence, and Machine Learning.
Sky-Watcher EQ6-R Pro Equatorial Mount
Sky-Watcher EQ6-R Pro Equatorial Mount provides precise tracking capacity for deep-sky imaging rigs during long astrophotography sessions.
Researchers at UBC have developed a new NFC-based gesture system that can distinguish between nine distinct gestures with high accuracy. This technology has the potential to improve accessibility for users with mobility issues and reduce the spread of germs through touchpads.
The partnership aims to provide cutting-edge professional development to public sector and critical infrastructure leaders across Canada, equipped with strategic skills to outthink and outmaneuver threats. The initiative strengthens Canada's cyber resilience by enhancing national cyber resilience.
A recent study found that cybersecurity training programs do little to prevent employees from falling for phishing scams. Researchers sent 10 different phishing email campaigns to over 19,500 employees at UC San Diego Health and found that embedded phishing training only reduced the likelihood of clicking on a phishing link by 2%. As t...
AI TechX, a UT Knoxville initiative, awards $60,000 seed funding to nine projects addressing real-world challenges through AI research and innovation. The funded projects accelerate adoption of AI across various disciplines, enabling high-impact collaborations and job creation.
Southwest Research Institute (SwRI) has installed a private 5G network to boost security, eliminate dependency on outside mobile networks, and expand off-site capabilities for advanced 5G projects. The secure network supports various 5G advancements, including cybersecurity research, drone technology, and antenna development.
Apple Watch Series 11 (GPS, 46mm)
Apple Watch Series 11 (GPS, 46mm) tracks health metrics and safety alerts during long observing sessions, fieldwork, and remote expeditions.
The University of Texas at San Antonio has launched the College of AI, Cyber and Computing, which will serve over 5,000 students pursuing degrees in rapidly growing career fields. The college is positioned to advance technological education and research, with faculty securing major grants and launching industry partnerships.
The £250 million investment will create an Advanced Marine Technology Hub at the University of Plymouth, leveraging its expertise in autonomous marine systems, maritime cyber security, and renewable energy. This initiative aims to boost the city's economy and enhance UK's national resilience.
Researchers at UCR have developed a method to preserve AI safeguards in open-source models by retraining internal structure to detect and block dangerous prompts. The approach avoids external filters or software patches, instead changing the model's fundamental understanding of risky content.
Apple iPhone 17 Pro
Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.
The Wits MIND Institute has received a $1 million boost from Google.org, enabling it to drive next-generation breakthroughs in natural and artificial intelligence. The partnership aims to advance the scientific understanding of both natural and artificial intelligence, foster breakthrough research and technological innovation.
A new attack, Infiltrated Selfish Mining (ISM), could reshape the rules of Bitcoin mining by allowing attackers to profit simultaneously. ISM avoids the miner's dilemma and yields up to 1.52 times more rewards than previous attacks.
A comprehensive study reveals critical vulnerabilities in smart railways, from data breaches to operational sabotage. Key findings propose comprehensive mitigation strategies, emphasizing human factors and staff training in building cyber-resilient systems.
Rigol DP832 Triple-Output Bench Power Supply
Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.
A new login system called Client-Side Encrypted Access Logging (CSAL) detects online account compromise without exposing personal devices to invasive tracking. The system verifies whether a login came from a user's own device, addressing a flaw in how major platforms log account access.
The 12th Heidelberg Laureate Forum brings together 200 young mathematicians and computer scientists with 29 distinguished laureates to exchange ideas and discuss pressing issues in their fields. The event features a diverse range of lectures, talks, and panel discussions.
A new study by UC Davis researchers reveals that popular GenAI browser assistants collect and share sensitive data without users' knowledge. The study highlights the need for stronger safeguards and transparency to protect user privacy online.
The 34th International Joint Conference on Artificial Intelligence (IJCAI) will take place in Montreal, Canada, from August 16 to 22, 2025. The conference aims to showcase the frontiers of artificial intelligence research and applications, with a focus on AI's impact on society.
Experts from across industries and disciplines gathered to assess the current state of cybersecurity through a multidisciplinary lens. The workshop explored emerging technologies and the intersection of technology and policy, highlighting the need for a unified ecosystem to address persistent challenges.
Creality K1 Max 3D Printer
Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.
The $2.5 million DRIFT program aims to close critical talent gaps and safeguard connected vehicles by providing specialized online and in-person training. Worcester Polytechnic Institute will lead the university’s DRIFT program, offering tuition-free modules and real-world training to upskill engineers and professionals.
Researchers at King's College London found that AI chatbots can be exploited to reveal up to 12.5 times more personal information from users. The study used three types of malicious AIs to encourage disclosure of private info, with reciprocal strategies proving the most effective.
A qualitative interview study with 21 international participants explored the opportunities and challenges of cryptographic update processes. Software developers face unique security risks when updating crypto implementations, which can lead to a single point of failure in the supply chain.
Researchers found that mobile users were less likely to click on phishing links compared to PC users, especially for lower-risk URLs. The study suggests that device use settings affect users' risk assessment abilities, leading to more avoidant behavior on mobile devices.
CalDigit TS4 Thunderbolt 4 Dock
CalDigit TS4 Thunderbolt 4 Dock simplifies serious desks with 18 ports for high-speed storage, monitors, and instruments across Mac and PC setups.
Researchers have discovered a code-reuse attack capable of exploiting C++ coroutines across three major compilers, including those protected by Control Flow Integrity. The attack, called Coroutine Frame-Oriented Programming (CFOP), chains together existing functions to achieve arbitrary code execution.
A new study suggests that with proper training, people of all skill levels can accurately detect malware. Novice users improved to 80% accuracy after receiving basic instructions on red flags, while expert users maintained high detection rates. The study highlights the importance of fostering critical thinking in cybersecurity.
The system tracks and analyzes crop development using data from sensors, biosensors, the Internet of Things, and AI. Strong security protocols ensure farmer data remains private and resilient against future quantum computer attacks. The research team plans to improve their system with faster sensor processing and a solar-powered battery.
This book provides a beginner-friendly resource on the impact and evolution of decentralized networks, highlighting their applications in healthcare, supply chains, agriculture, climate monitoring, and education. The authors emphasize sustainability, data security, and ethical tech adoption.
Kestrel 3000 Pocket Weather Meter
Kestrel 3000 Pocket Weather Meter measures wind, temperature, and humidity in real time for site assessments, aviation checks, and safety briefings.
A study by IMDEA Networks reveals that 86% of mobile apps collect at least one type of sensitive data via WiFi and Bluetooth connections. The research team analyzed 52 SDKs in nearly 10,000 apps and found that many use these technologies to track users' movements indoors and build user profiles for targeted advertising.
A special issue examines how AI can support human flourishing in various contexts, including healthcare, education, and digital interactions. The issue highlights the need for humane AI that balances technological advancement with human-centric values and psychological insight.
Researchers at the University of Waterloo have created a tool called UnMarker that can remove any AI image watermark, highlighting the vulnerability of this technology to deepfakes. The team's discovery shows that even invisible encoded watermarks can be destroyed without knowing their design or internal parameters.
The new compute roadmap aims to improve lives and livelihoods with advanced computing power. It includes investments in AI research, healthcare diagnostics, and renewable energy.
Sony Alpha a7 IV (Body Only)
Sony Alpha a7 IV (Body Only) delivers reliable low-light performance and rugged build for astrophotography, lab documentation, and field expeditions.
A research team at Vienna University of Technology has discovered a previously undiscovered Android security vulnerability that allows fraudulent apps to take control of mobile phones. Users may be tricked into performing unwanted actions, such as granting certain rights or deleting data.
Researchers at Kyoto University have characterized quantum advantage by proving an equivalence between its existence and the security of certain cryptographic primitives. This breakthrough implies that when quantum advantage does not exist, many conventional cryptographic primitives are broken, including post-quantum ones.
Researchers from the University of Surrey investigate how senior citizens are targeted by cybercriminals due to societal biases, including ageism and stereotypes that portray them as frail and gullible. The study highlights the need for educational initiatives and support systems to empower older adults to protect themselves online.
The partnership aims to address the region's skills shortage by offering flexible, evidence-based cyber education; 15 online micro-credentials are available for individual learners and organizations, spanning key areas such as AI security and incident response.
Researchers are applying Model-Based Systems Engineering to enhance system resilience and protect against cyber threats in aerospace. The initiative aims to create robust frameworks for safeguarding emerging technologies, with potential benefits including job creation and skills development.
Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C)
Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C) keeps Macs, tablets, and meters powered during extended observing runs and remote surveys.
Researchers have demonstrated a new technique, RisingAttacK, to manipulate all widely used AI computer vision systems, allowing them to control what the AI 'sees'. The attack is effective at influencing the AI's ability to detect top targets, such as cars, pedestrians, or stop signs.
A new handbook from the University of Vaasa provides a comprehensive toolkit for policymakers, energy companies, and cybersecurity professionals to improve cyber resilience. The handbook emphasizes socio-cyber-physical risk management, education, awareness, cooperation, and strategic investments to reduce threats in the energy sector.
FANDANGO, a new open-source fuzzing tool, employs an iterative procedure modeled on biological evolution to produce high-quality test inputs that cover both semantics and syntax. The tool enables complete control over test inputs, allowing testers to specify input characteristics and explore specific parts of the program.
Davis Instruments Vantage Pro2 Weather Station
Davis Instruments Vantage Pro2 Weather Station offers research-grade local weather data for networked stations, campuses, and community observatories.
Researchers discovered AI art protection tools have critical weaknesses that cannot reliably stop AI models from training on artists' work. LightShed, a new method, can detect and remove distortions, stripping away protections and rendering images usable again for generative AI model training.
The Association for Computing Machinery (ACM) has announced a new open-access journal, TAISAP, focusing on AI security and privacy. The journal aims to develop methods for assessing the security of AI models, systems, and environments, including adversarial attacks, privacy concerns, and cybersecurity applications.
Researchers at Texas A&M University found that websites use browser fingerprinting to track people across browser sessions and sites. Even users who opt out of tracking under privacy laws may still be silently tracked through fingerprinting.
Prof. AU Man Ho Allen has been recognized with the prestigious Hong Kong Engineering Science and Technology (HKEST) Award 2024-25 for his outstanding contributions to the Web3 ecosystem and the digital economy. His research focuses on developing practical, secure, and privacy-preserving cryptographic solutions.
Fluke 87V Industrial Digital Multimeter
Fluke 87V Industrial Digital Multimeter is a trusted meter for precise measurements during instrument integration, repairs, and field diagnostics.
Researchers at Boston University are developing a groundbreaking method for securing sensitive data in the face of emerging quantum computing threats. Their approach, called Encrypted Operator Computing (EOC), merges physics, computer science, and mathematics to enable scalable methods for computing directly on encrypted data.