Native Android apps silently listen on fixed local ports to receive web tracking data from their web tracking solutions without user consent. Researchers found that Meta's Pixel and Yandex Metrica map Android users' browsing habits with their persistent identities, bypassing privacy protections.
The ENABLE-6G project has developed 20 technological breakthroughs that prioritize network intelligence, energy efficiency, localization, and privacy-preserving analytics. The project has generated a range of outputs, including real-world testing platforms, wireless sensing algorithms, and AI-driven network optimization methods.
A new study reveals that ransomware attacks have become the primary driver of health care data breaches in the United States. The study found that ransomware accounted for 69% of all patient records compromised in 2024, despite accounting for only 11% of breaches by number.
Davis Instruments Vantage Pro2 Weather Station
Davis Instruments Vantage Pro2 Weather Station offers research-grade local weather data for networked stations, campuses, and community observatories.
Researchers from ETH Zurich have discovered a new class of vulnerabilities in Intel processors that can be exploited to gain unauthorized access to information from other users. The 'BPRC' vulnerability affects all Intel processors and can be triggered by special inputs, allowing attackers to read sensitive information.
A study by King's College London reveals how surveillance technologies in smart homes exacerbate power imbalances between domestic workers and employers, undermining their rights and increasing vulnerability. The constant monitoring of these employees can lead to mental wellbeing issues and a lack of trust in the workplace.
The University of Tennessee has been designated a National Center of Academic Excellence in Cybersecurity, marking a significant advancement in its cybersecurity programs. The designation will provide EECS students with access to federal grants, expanded funding opportunities, and connections to top-tier national networks.
This year's ACM awards recognize groundbreaking innovations in autonomous systems, cryptography, and software for parallel computers. Peter Stone receives the Allen Newell Award for contributions to AI, while William Gropp and his team receive the Software System Award for developing MPICH.
Recent high-quality deepfake videos can feature realistic heartbeats and minute changes in face color, making them challenging to detect. Researchers found that even small variations in skin tone and facial motion can replicate the original pulse in deepfakes.
Creality K1 Max 3D Printer
Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.
Researchers at Carnegie Mellon University developed a cybersecurity lab, CyberSim Lab, that integrates experiential learning, role play, and collaborative learning to support learning outcomes. The lab is designed to bridge the gap between classroom education and real-world workplace skills.
The University of Texas at El Paso has launched the AI Institute for Community-Engaged Research (AI-ICER), an interdisciplinary think tank leveraging artificial intelligence technologies to address pressing regional challenges. The institute aims to foster collaboration between researchers, public and private sector groups, and industr...
Florida Atlantic University has been recognized as a National Center of Academic Excellence in Cyber Research, affirming its leadership in cybersecurity research at the doctoral level. The designation highlights the university's faculty dedication to pushing cyber science boundaries and equipping students for high-impact research.
Rigol DP832 Triple-Output Bench Power Supply
Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.
Researchers from the UK and Australia are combining forces to tackle pressing global challenges through eight collaborative projects focusing on AI, sustainability, space, and cybersecurity. The partnership aims to develop innovative technologies that work for people and the planet, not just profit.
Researchers found that nearly 10% of compliant websites still run non-compliant ads, violating the Acceptable Ads Standard. Flaws in ad-filtering rules allow advertisers to bypass size and format restrictions, putting user privacy at risk.
Dr. Latifur Khan, a renowned computer science professor, has been elected as an AAAS Fellow for his pioneering work in machine learning and big-data analytics. He developed innovative solutions to adapt machine learning models to cybersecurity risks and created an AI-driven tool to analyze political conflict and violence.
Researchers developed a new framework, PAC Privacy, to maintain AI model accuracy and ensure sensitive data remains safe from attackers. The new variant of PAC Privacy estimates anisotropic noise, reducing computational cost and boosting accuracy.
AmScope B120C-5M Compound Microscope
AmScope B120C-5M Compound Microscope supports teaching labs and QA checks with LED illumination, mechanical stage, and included 5MP camera.
Quantum Base, a Lancaster University spin-out, has successfully floated on the London Stock Exchange with a £4.8 million fundraising. The company aims to harness quantum technology to address real-world challenges through its patented Q-ID solution for anti-counterfeiting.
A recent study from UTSA researchers reveals that large language models (LLMs) can pose a serious threat to programmers who use them to help write code. The study found that up to 97% of software developers incorporate generative AI into their workflow, and 30% of code written today is AI-generated.
Researchers successfully demonstrated the UK’s first long-distance ultra-secure transfer of data over a quantum communications network, enabling secure video calls and encrypted medical data transmission. The network uses standard fibreoptic infrastructure and quantum phenomena to enable ultra-secure data transfer.
Kestrel 3000 Pocket Weather Meter
Kestrel 3000 Pocket Weather Meter measures wind, temperature, and humidity in real time for site assessments, aviation checks, and safety briefings.
The University of Arizona College of Engineering has received a $1 million endowment to support its electrical and computer engineering department. The Thomas R. Brown Family Private Foundation donated the funds to create a leadership chair, which will focus on artificial intelligence and cybersecurity research.
A new security protocol has been developed to protect miniaturized wireless medical implants from cyber threats, ensuring patient safety. The protocol uses a quirk of wireless power transfer to authenticate device access and prevent hacking.
Hebrew University alumni Assaf Rappaport, Ami Lotbek, and Yinon Costica have achieved the largest exit in Israel's history with the acquisition of WIZ by Google. The trio is proud graduates of the university, with Lotbek also holding a master's degree from the School of Engineering and Computer Science.
A team led by Dr. Marcus Botacin is creating a large language model (LLM) to automatically identify malware and write rules to defend against it. The LLM will use signatures to complement human analysts' skills, identifying malware faster and more accurately.
Apple iPhone 17 Pro
Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.
The Third Annual FBI & KU Cybersecurity Conference will address the growing threat of cybersecurity to national security and the economy. The event will bring together government, industry, workforce, and research experts to share knowledge and address this challenge.
Researchers at Mizzou have developed a proactive approach using artificial intelligence to address evolving threats against smart grids. The CIBR-Fort system can predict cyberattacks with 91.88% accuracy and defend against them in real-time, enabling scalable security for power grids of the future.
Daniel G. Graham, author of 'Ethical Hacking', has contributed expertise to the new edition of 'Metasploit: The Penetration Tester's Guide'. This comprehensive resource covers key topics such as penetration testing in cloud environments and advanced evasion techniques.
YuraScanner harnesses LLMs to navigate web applications like humans do, identifying tasks and workflows. It detects previously unknown XSS vulnerabilities, surpassing existing scanners.
Researchers at Johannes Gutenberg University Mainz are working on a subproject to investigate theoretical modeling and experimental realization of concepts for quantum repeaters. They aim to reduce transmission losses and generate high-quality quantum states to build secure quantum networks.
Garmin GPSMAP 67i with inReach
Garmin GPSMAP 67i with inReach provides rugged GNSS navigation, satellite messaging, and SOS for backcountry geology and climate field teams.
Researchers have developed a new form of QR code that can protect users from phishing attacks by signaling whether a link is safe or not. The SDMQR codes provide an added layer of security without interfering with existing functionality, allowing companies to replace traditional barcodes with more sophisticated QR codes.
Researchers introduce 'fitness centrality,' a faster method to identify crucial elements in any network, with practical applications in supply chains, ecological conservation, and cybersecurity. The approach streamlines analysis, making it practical for vast networks.
The University of Bath's new Institute for Digital Security and Behavior aims to put people at the heart of research into digital security and behavior. Researchers will study factors that make individuals, organizations, and societies safer and more secure.
Nikon Monarch 5 8x42 Binoculars
Nikon Monarch 5 8x42 Binoculars deliver bright, sharp views for wildlife surveys, eclipse chases, and quick star-field scans at dark sites.
The project aims to establish a new EAGLE SFS program at George Mason University to support students in gaining interdisciplinary education, hands-on research experience, and leadership skills. Graduates will serve in key government roles, advancing national defense, public safety, and technological innovation.
The University of Texas at San Antonio has launched the Center for Space Technology and Operations Research, which will advance engineering, technology, and operations supporting space missions. The center will address growing demands from civil, commercial, and national security space agencies and companies.
Researchers discovered a key security weakness in AMD computer processors due to 'BadRAM', rogue memory modules providing false information to the processor. This allows attackers to bypass CPU memory protections and access sensitive data or cause disruptions in shared cloud environments.
A recent study by the Society for Risk Analysis found that employees who visit adult or gambling sites are more likely to encounter seven types of malware, including coinminers and ransomware. Visiting these types of websites increases the risk of infection by two-fold.
Researchers at Tokyo University of Science have developed a new method called black-box forgetting, which enables selective removal of unnecessary information from large pre-trained AI models. This approach enhances model efficiency and improves privacy by reducing computational resources and information leakage.
Meta Quest 3 512GB
Meta Quest 3 512GB enables immersive mission planning, terrain rehearsal, and interactive STEM demos with high-resolution mixed-reality experiences.
Researchers are developing a system to instantly conceal and anonymize voices through computer-generated speech. The technology will allow users to control factors like age, gender, and dialect in real-time conversations.
Research by SMU's School of Accountancy found that data breaches rose nearly eight times between 2005 and 2018, with average costs reaching US$388 million. To mitigate this issue, managers should realign incentives and foster a corporate culture valuing long-term sustainability over short-term gains.
Researchers at Universitat Oberta de Catalunya have designed ZIRCON, a system to guarantee the integrity and origin of data in IoT networks. The innovative method uses a zero-watermarking technique without modifying the original data, ensuring tamper-proof transmission over the network.
A new report by IFI CLAIMS Patent Services analyzes leading cybersecurity innovations and patents. The study highlights the growing threat of cyberattacks and cyber spying, emphasizing the need for advanced technology solutions.
A recent study from Drexel University and Arizona State University reveals that most Fortune 100 companies offer inadequate reporting channels for phishing attacks, with only 3% of reported sites ever being blocked. The research also found that nearly 30% of reported websites were never accessed as part of an investigation.
Fluke 87V Industrial Digital Multimeter
Fluke 87V Industrial Digital Multimeter is a trusted meter for precise measurements during instrument integration, repairs, and field diagnostics.
A comprehensive framework for securing mobile money applications has been ratified by the United Nations, marking a significant step toward safer digital financial transactions. The framework includes 120 detailed recommendations and controls to ensure comprehensive protection for users and transactions.
The Cyber-Resilience Resource Center will provide training and support to organizations across West Virginia, with a focus on small and medium-sized businesses. Over 200 students will gain real-world cybersecurity experience through the center.
A new study reveals a surge in cryptocurrency fraud committed by young, tech-savvy male offenders, with 55% of cases involving American targets, posing significant challenges to traditional law enforcement.
A team of researchers created PenGym, an effective and reliable realistic training framework for RL pentesting agents that enables actual actions on realistic hosts in network environments. This approach yields promising results compared to simulated environments.
Penn Engineering researchers found that certain features of AI-governed robots have security vulnerabilities, putting safety at risk. The 'jailbreak' rate of OpenAI's ChatGPT was 100% in just days, bypassing safety guardrails and allowing manipulation or hacking.
Sky-Watcher EQ6-R Pro Equatorial Mount
Sky-Watcher EQ6-R Pro Equatorial Mount provides precise tracking capacity for deep-sky imaging rigs during long astrophotography sessions.
Karimian's research will investigate common hardware-based attacks on biometric systems, including spoofing, template, side-channel, and fault-injection attacks. He also aims to develop a hardware-based biometric template protection system that addresses bias in facial recognition software.
Researchers at KTH Royal Institute of Technology have developed a novel 3D printing method to fabricate glass micro-supercapacitors with enhanced performance. The approach utilizes ultrashort laser pulses to create electrodes with increased surface area and rapid ion transport, leading to improved energy storage capabilities.
Researchers used LSTM networks to detect cyber threats in SWaT plant industrial control systems, capturing complex time-dependent patterns missed by traditional methods. The study demonstrates the effectiveness of LSTM technology in safeguarding industrial control systems from cyberattacks.
Researchers propose a new approach to reduce the tradeoff between overhead and protecting machines against vulnerabilities. The 'Vulnerability-Adaptive Protection Paradigm' applies different protection strategies to different parts of the system, allocating resources more wisely.
Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C)
Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C) keeps Macs, tablets, and meters powered during extended observing runs and remote surveys.
Karen Jo Matsler, a UTA professor, is being honored for her extensive contributions to physics education and her efforts to support educators nationwide. Her Quantum for All initiative aims to integrate quantum concepts into high school science instruction, preparing students for careers in quantum technology.
Researchers at MIT developed a security protocol that leverages quantum mechanics to guarantee secure data transmission during deep-learning computations. The protocol encodes data into laser light, making it impossible for attackers to copy or intercept information without detection.
A Kennesaw State University researcher is developing secure AI models that not only protect personal information but also reduce energy use. Her goal is to create a federated learning system that overcomes specific vulnerabilities of current systems, improving data transmission security and confining AI training to individual devices.
A recent study found that hospitals with standardized data governance platforms were 47% less likely to be breached. The research proposes building enterprise-wide data analytics platforms to manage data sharing among diverse systems, simplifying the system and reducing breaches. Practitioners should embrace IT complexity as long as it...
GoPro HERO13 Black
GoPro HERO13 Black records stabilized 5.3K video for instrument deployments, field notes, and outreach, even in harsh weather and underwater conditions.
Massimiliano Albanese receives $87,833 from the US Department of Defense to improve cybersecurity enrollment, retention, and graduation rates at George Mason University. The program aims to enhance academic programs in cybersecurity, building on the university's National Center of Academic Excellence in Cybersecurity designation.
Hassan's research focuses on creating advanced techniques for collecting and integrating data provenance to enhance threat detection. The project also includes educational initiatives to prepare the next generation of cybersecurity professionals.
Researchers Maria Eichlseder and Fariba Karimi will study keyless encryption and AI's impact on online social networks to promote fair algorithms. Their projects aim to address open problems in cryptographic systems and quantify intersectional inequality.
CalDigit TS4 Thunderbolt 4 Dock
CalDigit TS4 Thunderbolt 4 Dock simplifies serious desks with 18 ports for high-speed storage, monitors, and instruments across Mac and PC setups.
A new study reveals that giving users the option to delay security tasks and nudging them to commit later significantly increases completion rates. The study found that participants who made promises or requested reminders were more likely to follow through on their commitment.
A comprehensive analysis by researchers at TU Graz found that numerous Android manufacturers use insecure kernels, leaving devices susceptible to one-day exploits. The study revealed that only between 29-55% of tested smartphones prevented attacks, with manufacturer kernels performing up to 4.6 times worse than the Generic Kernel Image.
Researchers at UMass Amherst discovered a vulnerability in digital wallet security that can be exploited by malicious actors even if the rightful cardholder doesn't use a digital wallet. The study found that banks prioritize convenience over security, leaving users' credit cards susceptible to unauthorized transactions.
Aranet4 Home CO2 Monitor
Aranet4 Home CO2 Monitor tracks ventilation quality in labs, classrooms, and conference rooms with long battery life and clear e-ink readouts.
Liza Wilson Durant, Associate Dean at George Mason University, received funding for the Commonwealth Cyber Initiative Traineeship Program, providing a 7-week training program in cybersecurity and apprenticeships with industry partners. The program aims to develop and diversify data analytics and cybersecurity expertise in Virginia's wo...