Researchers at Tokyo University of Science have developed a new method called black-box forgetting, which enables selective removal of unnecessary information from large pre-trained AI models. This approach enhances model efficiency and improves privacy by reducing computational resources and information leakage.
Researchers are developing a system to instantly conceal and anonymize voices through computer-generated speech. The technology will allow users to control factors like age, gender, and dialect in real-time conversations.
Research by SMU's School of Accountancy found that data breaches rose nearly eight times between 2005 and 2018, with average costs reaching US$388 million. To mitigate this issue, managers should realign incentives and foster a corporate culture valuing long-term sustainability over short-term gains.
SAMSUNG T9 Portable SSD 2TB
SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.
Researchers at Universitat Oberta de Catalunya have designed ZIRCON, a system to guarantee the integrity and origin of data in IoT networks. The innovative method uses a zero-watermarking technique without modifying the original data, ensuring tamper-proof transmission over the network.
A recent study from Drexel University and Arizona State University reveals that most Fortune 100 companies offer inadequate reporting channels for phishing attacks, with only 3% of reported sites ever being blocked. The research also found that nearly 30% of reported websites were never accessed as part of an investigation.
A new report by IFI CLAIMS Patent Services analyzes leading cybersecurity innovations and patents. The study highlights the growing threat of cyberattacks and cyber spying, emphasizing the need for advanced technology solutions.
Aranet4 Home CO2 Monitor
Aranet4 Home CO2 Monitor tracks ventilation quality in labs, classrooms, and conference rooms with long battery life and clear e-ink readouts.
A comprehensive framework for securing mobile money applications has been ratified by the United Nations, marking a significant step toward safer digital financial transactions. The framework includes 120 detailed recommendations and controls to ensure comprehensive protection for users and transactions.
The Cyber-Resilience Resource Center will provide training and support to organizations across West Virginia, with a focus on small and medium-sized businesses. Over 200 students will gain real-world cybersecurity experience through the center.
A new study reveals a surge in cryptocurrency fraud committed by young, tech-savvy male offenders, with 55% of cases involving American targets, posing significant challenges to traditional law enforcement.
A team of researchers created PenGym, an effective and reliable realistic training framework for RL pentesting agents that enables actual actions on realistic hosts in network environments. This approach yields promising results compared to simulated environments.
Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C)
Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C) keeps Macs, tablets, and meters powered during extended observing runs and remote surveys.
Penn Engineering researchers found that certain features of AI-governed robots have security vulnerabilities, putting safety at risk. The 'jailbreak' rate of OpenAI's ChatGPT was 100% in just days, bypassing safety guardrails and allowing manipulation or hacking.
Karimian's research will investigate common hardware-based attacks on biometric systems, including spoofing, template, side-channel, and fault-injection attacks. He also aims to develop a hardware-based biometric template protection system that addresses bias in facial recognition software.
Researchers at KTH Royal Institute of Technology have developed a novel 3D printing method to fabricate glass micro-supercapacitors with enhanced performance. The approach utilizes ultrashort laser pulses to create electrodes with increased surface area and rapid ion transport, leading to improved energy storage capabilities.
Apple iPhone 17 Pro
Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.
Researchers used LSTM networks to detect cyber threats in SWaT plant industrial control systems, capturing complex time-dependent patterns missed by traditional methods. The study demonstrates the effectiveness of LSTM technology in safeguarding industrial control systems from cyberattacks.
Karen Jo Matsler, a UTA professor, is being honored for her extensive contributions to physics education and her efforts to support educators nationwide. Her Quantum for All initiative aims to integrate quantum concepts into high school science instruction, preparing students for careers in quantum technology.
Researchers propose a new approach to reduce the tradeoff between overhead and protecting machines against vulnerabilities. The 'Vulnerability-Adaptive Protection Paradigm' applies different protection strategies to different parts of the system, allocating resources more wisely.
Researchers at MIT developed a security protocol that leverages quantum mechanics to guarantee secure data transmission during deep-learning computations. The protocol encodes data into laser light, making it impossible for attackers to copy or intercept information without detection.
Sony Alpha a7 IV (Body Only)
Sony Alpha a7 IV (Body Only) delivers reliable low-light performance and rugged build for astrophotography, lab documentation, and field expeditions.
A Kennesaw State University researcher is developing secure AI models that not only protect personal information but also reduce energy use. Her goal is to create a federated learning system that overcomes specific vulnerabilities of current systems, improving data transmission security and confining AI training to individual devices.
A recent study found that hospitals with standardized data governance platforms were 47% less likely to be breached. The research proposes building enterprise-wide data analytics platforms to manage data sharing among diverse systems, simplifying the system and reducing breaches. Practitioners should embrace IT complexity as long as it...
Massimiliano Albanese receives $87,833 from the US Department of Defense to improve cybersecurity enrollment, retention, and graduation rates at George Mason University. The program aims to enhance academic programs in cybersecurity, building on the university's National Center of Academic Excellence in Cybersecurity designation.
GQ GMC-500Plus Geiger Counter
GQ GMC-500Plus Geiger Counter logs beta, gamma, and X-ray levels for environmental monitoring, training labs, and safety demonstrations.
Hassan's research focuses on creating advanced techniques for collecting and integrating data provenance to enhance threat detection. The project also includes educational initiatives to prepare the next generation of cybersecurity professionals.
Researchers Maria Eichlseder and Fariba Karimi will study keyless encryption and AI's impact on online social networks to promote fair algorithms. Their projects aim to address open problems in cryptographic systems and quantify intersectional inequality.
A new study reveals that giving users the option to delay security tasks and nudging them to commit later significantly increases completion rates. The study found that participants who made promises or requested reminders were more likely to follow through on their commitment.
A comprehensive analysis by researchers at TU Graz found that numerous Android manufacturers use insecure kernels, leaving devices susceptible to one-day exploits. The study revealed that only between 29-55% of tested smartphones prevented attacks, with manufacturer kernels performing up to 4.6 times worse than the Generic Kernel Image.
CalDigit TS4 Thunderbolt 4 Dock
CalDigit TS4 Thunderbolt 4 Dock simplifies serious desks with 18 ports for high-speed storage, monitors, and instruments across Mac and PC setups.
Researchers at UMass Amherst discovered a vulnerability in digital wallet security that can be exploited by malicious actors even if the rightful cardholder doesn't use a digital wallet. The study found that banks prioritize convenience over security, leaving users' credit cards susceptible to unauthorized transactions.
Wang will develop an educational simulation game, CyberShield H2O, to enhance awareness and understanding of cybersecurity risks associated with public water systems. The project aims to foster critical systems thinking and prepare students to address cyber risks in municipal water systems.
Liza Wilson Durant, Associate Dean at George Mason University, received funding for the Commonwealth Cyber Initiative Traineeship Program, providing a 7-week training program in cybersecurity and apprenticeships with industry partners. The program aims to develop and diversify data analytics and cybersecurity expertise in Virginia's wo...
Research by University of East Anglia and University of Texas found that stricter data privacy laws significantly reduced breaches, but negatively affected firms' market value. Companies compliant with GDPR invested more in data protection and were less likely to experience data breaches.
Creality K1 Max 3D Printer
Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.
A new study identifies six best practices for addressing non-functional requirements (NFRs) to ensure software security and performance. The research highlights the importance of NFRs in determining software quality and success, and how developers discuss and manage these requirements.
Researchers at Graz University of Technology discovered a security loophole that enables tracking users' online activities in detail by monitoring internet connection speed fluctuations. The 'SnailLoad' attack can bypass protective measures like firewalls and browser privacy modes without malicious code or data traffic interception.
A new study by the Society for Risk Analysis explores the impact of AI-driven cyberattacks on global economies, supply chains, and trade. The research found that these attacks can cause significant declines in real GDP, trade prices, and volumes, as well as disruptions to trade routes, particularly among heavily reliant digital economies.
A WPI researcher has received a CAREER Award to develop new technologies to monitor and protect computer chips from malicious attacks. The project aims to create better metrics to verify the integrity of components and advance understanding of side-channel attacks.
Apple iPad Pro 11-inch (M4)
Apple iPad Pro 11-inch (M4) runs demanding GIS, imaging, and annotation workflows on the go for surveys, briefings, and lab notebooks.
Researchers propose a new scheme to enhance cybersecurity with 'moving trees', addressing shortcomings of existing OTP methods. The dynamic group time-based one-time passwords (DGTOTP) scheme provides user identity privacy while ensuring security and scalability, making it suitable for real-world applications.
Ransomware attacks on targeted hospitals led to a temporary decrease in emergency department visits and inpatient admissions. Nearby unattacked hospitals experienced a corresponding increase in ED visits, suggesting a broader impact of such attacks.
Researchers collected an unprecedented amount of data on SMS phishing attacks, identifying 35,128 unique campaigns and 600 distinct operations. They also found that phishers use mainstream servers, URL-shortening apps, and web infrastructure to support their operations.
UCF assistant professors Li Fang and Fan Yao have been awarded the 2024 NSF Faculty Early Career Development program award for their research projects. Fang is studying photo-induced ultrafast electron-nuclear dynamics in molecules, while Yao is identifying lapses in computer processing security at the micro level.
Model disgorgement is a set of techniques that force generative models to remove content leading to copyright infringement or biased responses. Researchers propose this approach to address issues like stylistic infringement, where models reproduce copyrighted works in the style of famous artists.
Rigol DP832 Triple-Output Bench Power Supply
Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.
A UBC study reveals that Facebook Marketplace users are concerned about physical and financial safety, as well as their own well-being when trading with strangers. Despite these risks, many participants continued to use the platform due to its simplicity and wide audience reach.
A new tool called VFCFinder analyzes open-source software updates to pinpoint specific code sections being modified to address security vulnerabilities. This helps programmers determine which updates are necessary without unnecessary changes.
A new study conducted by North Carolina State University found that many parents are not taking adequate steps to address security and privacy risks associated with virtual reality (VR) apps. Parents were primarily concerned about physiological development issues, but lacked awareness of data surveillance and collection risks.
A study reviewed 100 US institutions with National Center of Academic Excellence in Cybersecurity designations, finding significant variation in program types, credits, and learning outcomes. The research aims to improve industry-readiness and graduate employability by highlighting areas for improvement in cybersecurity education.
Apple MacBook Pro 14-inch (M4 Pro)
Apple MacBook Pro 14-inch (M4 Pro) powers local ML workloads, large datasets, and multi-display analysis for field and lab teams.
Iowa State University has established a new cybersecurity center to address the growing threat of cyberattacks on renewable energy systems and microgrids. The center will develop robust algorithms and tools to detect and mitigate cyberattacks, as well as strengthen the grid industry's cybersecurity workforce.
Researchers at Graz University of Technology discovered three side-channel attacks on WebGPU browser interface, allowing them to access a computer's cache memory and extract sensitive information. The attacks were fast enough to succeed during normal surfing behavior, highlighting the need for browsers to address GPU security and priva...
A new study published in Physical Review Letters has developed a method for secure quantum computing, enabling users to access remote quantum computers while maintaining data authenticity and security. This breakthrough promises to unlock the transformative potential of cloud-based quantum computing.
The study finds that cybercriminal threats are primarily concentrated in a small number of countries, with China, Russia, Ukraine, the US, Romania, and Nigeria ranking high in various categories. The World Cybercrime Index provides a useful tool for targeting investigative and preventive efforts more efficiently.
Celestron NexStar 8SE Computerized Telescope
Celestron NexStar 8SE Computerized Telescope combines portable Schmidt-Cassegrain optics with GoTo pointing for outreach nights and field campaigns.
The World Cybercrime Index ranks countries by cybercrime threat level, identifying Russia as the top hotspot. The study's findings suggest that a small number of countries house the greatest cybercrime threats, with the UK coming in at number eight.
A new USF study finds that language barriers limit the effectiveness of cybersecurity resources, with many limited English proficiency users engaging in risky online behaviors. The research highlights the need for providing cybersecurity information and resources in multiple formats to accommodate diverse literacy levels.
A method has been developed to protect and manage personal data on the internet using blockchain technology and smart contracts. The system allows users to control who has their information and what it is used for, enabling more secure browsing and compliance with European data protection law.
Davis Instruments Vantage Pro2 Weather Station
Davis Instruments Vantage Pro2 Weather Station offers research-grade local weather data for networked stations, campuses, and community observatories.
Researchers developed an approach called Quantum Noise Injection for Adversarial Defense (QNAD) to protect quantum computers from attacks. The method introduces noise into the quantum neural network, making it more accurate during an attack.
A team of experts at PNNL developed a new tool that sorts and prioritizes cyber threats on the fly, giving grid operators a clear blueprint to identify and address the biggest threats first. The approach uses hybrid attack graphs and optimization to reduce the number of potential attacks from thousands to fewer than 100.
A new research project led by Professor David Lo aims to develop an approach to find cybersecurity weaknesses in software applications' source code. The project proposes building a localised and specialised LLM solution to discover vulnerabilities in government code base, leveraging open-source projects and communities.
The Heidelberg Laureate Forum Foundation offers limited international journalist travel grants to report on the event. Journalists can apply until April 28, 2024, and will cover travel and visa costs, as well as room and board during their stay in Heidelberg.
Kestrel 3000 Pocket Weather Meter
Kestrel 3000 Pocket Weather Meter measures wind, temperature, and humidity in real time for site assessments, aviation checks, and safety briefings.
Researcher Vijay Shah is developing a robust framework for comprehensive validation and testing of deployed Open Radio Access Network (O-RAN) systems using distinctive power signatures and electromagnetic emanations. This technology has the potential to increase efficiency and cost-effectiveness in supply chain risk management.
A study by Lancaster University forecasts exponential growth in Artificial Intelligence over the next 15 years, with experts warning of corners being cut in safe AI development. The experts also predict that advances in technology will make it harder to distinguish truth from fiction, with potential ramifications for democracies.
FAU Engineering has received a $2.6 million NSF grant to establish a CyberCorps student scholarship program, increasing the nation's cybersecurity workforce. The program provides full scholarships and stipends to students pursuing studies in cybersecurity and AI.
Research found mobile phone users process information faster but are more likely to fall for misinformation compared to personal computers. PC users, however, are more susceptible to phishing attempts, highlighting the importance of device-specific responses.
The National DigiFoundry aims to establish global standards for digital asset use and exchange through blockchain technologies. The consortium will develop a resilient framework to address cybersecurity challenges in digital asset management.
GoPro HERO13 Black
GoPro HERO13 Black records stabilized 5.3K video for instrument deployments, field notes, and outreach, even in harsh weather and underwater conditions.
A new study reveals AI tools are more vulnerable than thought to targeted attacks that force AI systems to make bad decisions. Researchers developed a software called QuadAttac K to test for vulnerabilities in deep neural networks.
The ETH Zurich-developed Authentic Digital EMblem (ADEM) aims to protect humanitarian organizations' digital infrastructure from cyberattacks. The system uses a combination of security protocols, including web PKI and CT ecosystem, to ensure authenticity, accountability, and covert inspection.
A recent cyberattack in southwestern Ontario highlights the need for clinicians and hospitals to improve their cybersecurity practices. Experts recommend navigating trade-offs between efficiency and risk reduction using the US National Institute of Standards and Technology's Cybersecurity Framework.