Quantum Base, a Lancaster University spin-out, has successfully floated on the London Stock Exchange with a £4.8 million fundraising. The company aims to harness quantum technology to address real-world challenges through its patented Q-ID solution for anti-counterfeiting.
A recent study from UTSA researchers reveals that large language models (LLMs) can pose a serious threat to programmers who use them to help write code. The study found that up to 97% of software developers incorporate generative AI into their workflow, and 30% of code written today is AI-generated.
Researchers successfully demonstrated the UK’s first long-distance ultra-secure transfer of data over a quantum communications network, enabling secure video calls and encrypted medical data transmission. The network uses standard fibreoptic infrastructure and quantum phenomena to enable ultra-secure data transfer.
AmScope B120C-5M Compound Microscope
AmScope B120C-5M Compound Microscope supports teaching labs and QA checks with LED illumination, mechanical stage, and included 5MP camera.
The University of Arizona College of Engineering has received a $1 million endowment to support its electrical and computer engineering department. The Thomas R. Brown Family Private Foundation donated the funds to create a leadership chair, which will focus on artificial intelligence and cybersecurity research.
A new security protocol has been developed to protect miniaturized wireless medical implants from cyber threats, ensuring patient safety. The protocol uses a quirk of wireless power transfer to authenticate device access and prevent hacking.
Hebrew University alumni Assaf Rappaport, Ami Lotbek, and Yinon Costica have achieved the largest exit in Israel's history with the acquisition of WIZ by Google. The trio is proud graduates of the university, with Lotbek also holding a master's degree from the School of Engineering and Computer Science.
Kestrel 3000 Pocket Weather Meter
Kestrel 3000 Pocket Weather Meter measures wind, temperature, and humidity in real time for site assessments, aviation checks, and safety briefings.
A team led by Dr. Marcus Botacin is creating a large language model (LLM) to automatically identify malware and write rules to defend against it. The LLM will use signatures to complement human analysts' skills, identifying malware faster and more accurately.
The Third Annual FBI & KU Cybersecurity Conference will address the growing threat of cybersecurity to national security and the economy. The event will bring together government, industry, workforce, and research experts to share knowledge and address this challenge.
Researchers at Mizzou have developed a proactive approach using artificial intelligence to address evolving threats against smart grids. The CIBR-Fort system can predict cyberattacks with 91.88% accuracy and defend against them in real-time, enabling scalable security for power grids of the future.
Daniel G. Graham, author of 'Ethical Hacking', has contributed expertise to the new edition of 'Metasploit: The Penetration Tester's Guide'. This comprehensive resource covers key topics such as penetration testing in cloud environments and advanced evasion techniques.
Fluke 87V Industrial Digital Multimeter
Fluke 87V Industrial Digital Multimeter is a trusted meter for precise measurements during instrument integration, repairs, and field diagnostics.
YuraScanner harnesses LLMs to navigate web applications like humans do, identifying tasks and workflows. It detects previously unknown XSS vulnerabilities, surpassing existing scanners.
Researchers at Johannes Gutenberg University Mainz are working on a subproject to investigate theoretical modeling and experimental realization of concepts for quantum repeaters. They aim to reduce transmission losses and generate high-quality quantum states to build secure quantum networks.
Researchers have developed a new form of QR code that can protect users from phishing attacks by signaling whether a link is safe or not. The SDMQR codes provide an added layer of security without interfering with existing functionality, allowing companies to replace traditional barcodes with more sophisticated QR codes.
The University of Bath's new Institute for Digital Security and Behavior aims to put people at the heart of research into digital security and behavior. Researchers will study factors that make individuals, organizations, and societies safer and more secure.
Rigol DP832 Triple-Output Bench Power Supply
Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.
Researchers introduce 'fitness centrality,' a faster method to identify crucial elements in any network, with practical applications in supply chains, ecological conservation, and cybersecurity. The approach streamlines analysis, making it practical for vast networks.
The project aims to establish a new EAGLE SFS program at George Mason University to support students in gaining interdisciplinary education, hands-on research experience, and leadership skills. Graduates will serve in key government roles, advancing national defense, public safety, and technological innovation.
The University of Texas at San Antonio has launched the Center for Space Technology and Operations Research, which will advance engineering, technology, and operations supporting space missions. The center will address growing demands from civil, commercial, and national security space agencies and companies.
Researchers discovered a key security weakness in AMD computer processors due to 'BadRAM', rogue memory modules providing false information to the processor. This allows attackers to bypass CPU memory protections and access sensitive data or cause disruptions in shared cloud environments.
SAMSUNG T9 Portable SSD 2TB
SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.
A recent study by the Society for Risk Analysis found that employees who visit adult or gambling sites are more likely to encounter seven types of malware, including coinminers and ransomware. Visiting these types of websites increases the risk of infection by two-fold.
Researchers at Tokyo University of Science have developed a new method called black-box forgetting, which enables selective removal of unnecessary information from large pre-trained AI models. This approach enhances model efficiency and improves privacy by reducing computational resources and information leakage.
Researchers are developing a system to instantly conceal and anonymize voices through computer-generated speech. The technology will allow users to control factors like age, gender, and dialect in real-time conversations.
Research by SMU's School of Accountancy found that data breaches rose nearly eight times between 2005 and 2018, with average costs reaching US$388 million. To mitigate this issue, managers should realign incentives and foster a corporate culture valuing long-term sustainability over short-term gains.
Researchers at Universitat Oberta de Catalunya have designed ZIRCON, a system to guarantee the integrity and origin of data in IoT networks. The innovative method uses a zero-watermarking technique without modifying the original data, ensuring tamper-proof transmission over the network.
Apple iPhone 17 Pro
Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.
A new report by IFI CLAIMS Patent Services analyzes leading cybersecurity innovations and patents. The study highlights the growing threat of cyberattacks and cyber spying, emphasizing the need for advanced technology solutions.
A recent study from Drexel University and Arizona State University reveals that most Fortune 100 companies offer inadequate reporting channels for phishing attacks, with only 3% of reported sites ever being blocked. The research also found that nearly 30% of reported websites were never accessed as part of an investigation.
A comprehensive framework for securing mobile money applications has been ratified by the United Nations, marking a significant step toward safer digital financial transactions. The framework includes 120 detailed recommendations and controls to ensure comprehensive protection for users and transactions.
Apple Watch Series 11 (GPS, 46mm)
Apple Watch Series 11 (GPS, 46mm) tracks health metrics and safety alerts during long observing sessions, fieldwork, and remote expeditions.
The Cyber-Resilience Resource Center will provide training and support to organizations across West Virginia, with a focus on small and medium-sized businesses. Over 200 students will gain real-world cybersecurity experience through the center.
A new study reveals a surge in cryptocurrency fraud committed by young, tech-savvy male offenders, with 55% of cases involving American targets, posing significant challenges to traditional law enforcement.
A team of researchers created PenGym, an effective and reliable realistic training framework for RL pentesting agents that enables actual actions on realistic hosts in network environments. This approach yields promising results compared to simulated environments.
Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C)
Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C) keeps Macs, tablets, and meters powered during extended observing runs and remote surveys.
Penn Engineering researchers found that certain features of AI-governed robots have security vulnerabilities, putting safety at risk. The 'jailbreak' rate of OpenAI's ChatGPT was 100% in just days, bypassing safety guardrails and allowing manipulation or hacking.
Karimian's research will investigate common hardware-based attacks on biometric systems, including spoofing, template, side-channel, and fault-injection attacks. He also aims to develop a hardware-based biometric template protection system that addresses bias in facial recognition software.
Researchers at KTH Royal Institute of Technology have developed a novel 3D printing method to fabricate glass micro-supercapacitors with enhanced performance. The approach utilizes ultrashort laser pulses to create electrodes with increased surface area and rapid ion transport, leading to improved energy storage capabilities.
Researchers used LSTM networks to detect cyber threats in SWaT plant industrial control systems, capturing complex time-dependent patterns missed by traditional methods. The study demonstrates the effectiveness of LSTM technology in safeguarding industrial control systems from cyberattacks.
Researchers propose a new approach to reduce the tradeoff between overhead and protecting machines against vulnerabilities. The 'Vulnerability-Adaptive Protection Paradigm' applies different protection strategies to different parts of the system, allocating resources more wisely.
Meta Quest 3 512GB
Meta Quest 3 512GB enables immersive mission planning, terrain rehearsal, and interactive STEM demos with high-resolution mixed-reality experiences.
Karen Jo Matsler, a UTA professor, is being honored for her extensive contributions to physics education and her efforts to support educators nationwide. Her Quantum for All initiative aims to integrate quantum concepts into high school science instruction, preparing students for careers in quantum technology.
Researchers at MIT developed a security protocol that leverages quantum mechanics to guarantee secure data transmission during deep-learning computations. The protocol encodes data into laser light, making it impossible for attackers to copy or intercept information without detection.
A Kennesaw State University researcher is developing secure AI models that not only protect personal information but also reduce energy use. Her goal is to create a federated learning system that overcomes specific vulnerabilities of current systems, improving data transmission security and confining AI training to individual devices.
Sony Alpha a7 IV (Body Only)
Sony Alpha a7 IV (Body Only) delivers reliable low-light performance and rugged build for astrophotography, lab documentation, and field expeditions.
A recent study found that hospitals with standardized data governance platforms were 47% less likely to be breached. The research proposes building enterprise-wide data analytics platforms to manage data sharing among diverse systems, simplifying the system and reducing breaches. Practitioners should embrace IT complexity as long as it...
Massimiliano Albanese receives $87,833 from the US Department of Defense to improve cybersecurity enrollment, retention, and graduation rates at George Mason University. The program aims to enhance academic programs in cybersecurity, building on the university's National Center of Academic Excellence in Cybersecurity designation.
Hassan's research focuses on creating advanced techniques for collecting and integrating data provenance to enhance threat detection. The project also includes educational initiatives to prepare the next generation of cybersecurity professionals.
GoPro HERO13 Black
GoPro HERO13 Black records stabilized 5.3K video for instrument deployments, field notes, and outreach, even in harsh weather and underwater conditions.
Researchers Maria Eichlseder and Fariba Karimi will study keyless encryption and AI's impact on online social networks to promote fair algorithms. Their projects aim to address open problems in cryptographic systems and quantify intersectional inequality.
A new study reveals that giving users the option to delay security tasks and nudging them to commit later significantly increases completion rates. The study found that participants who made promises or requested reminders were more likely to follow through on their commitment.
A comprehensive analysis by researchers at TU Graz found that numerous Android manufacturers use insecure kernels, leaving devices susceptible to one-day exploits. The study revealed that only between 29-55% of tested smartphones prevented attacks, with manufacturer kernels performing up to 4.6 times worse than the Generic Kernel Image.
Researchers at UMass Amherst discovered a vulnerability in digital wallet security that can be exploited by malicious actors even if the rightful cardholder doesn't use a digital wallet. The study found that banks prioritize convenience over security, leaving users' credit cards susceptible to unauthorized transactions.
Liza Wilson Durant, Associate Dean at George Mason University, received funding for the Commonwealth Cyber Initiative Traineeship Program, providing a 7-week training program in cybersecurity and apprenticeships with industry partners. The program aims to develop and diversify data analytics and cybersecurity expertise in Virginia's wo...
GQ GMC-500Plus Geiger Counter
GQ GMC-500Plus Geiger Counter logs beta, gamma, and X-ray levels for environmental monitoring, training labs, and safety demonstrations.
Wang will develop an educational simulation game, CyberShield H2O, to enhance awareness and understanding of cybersecurity risks associated with public water systems. The project aims to foster critical systems thinking and prepare students to address cyber risks in municipal water systems.
Research by University of East Anglia and University of Texas found that stricter data privacy laws significantly reduced breaches, but negatively affected firms' market value. Companies compliant with GDPR invested more in data protection and were less likely to experience data breaches.
A new study identifies six best practices for addressing non-functional requirements (NFRs) to ensure software security and performance. The research highlights the importance of NFRs in determining software quality and success, and how developers discuss and manage these requirements.
Researchers at Graz University of Technology discovered a security loophole that enables tracking users' online activities in detail by monitoring internet connection speed fluctuations. The 'SnailLoad' attack can bypass protective measures like firewalls and browser privacy modes without malicious code or data traffic interception.
A new study by the Society for Risk Analysis explores the impact of AI-driven cyberattacks on global economies, supply chains, and trade. The research found that these attacks can cause significant declines in real GDP, trade prices, and volumes, as well as disruptions to trade routes, particularly among heavily reliant digital economies.
Nikon Monarch 5 8x42 Binoculars
Nikon Monarch 5 8x42 Binoculars deliver bright, sharp views for wildlife surveys, eclipse chases, and quick star-field scans at dark sites.
A WPI researcher has received a CAREER Award to develop new technologies to monitor and protect computer chips from malicious attacks. The project aims to create better metrics to verify the integrity of components and advance understanding of side-channel attacks.
Ransomware attacks on targeted hospitals led to a temporary decrease in emergency department visits and inpatient admissions. Nearby unattacked hospitals experienced a corresponding increase in ED visits, suggesting a broader impact of such attacks.
Researchers propose a new scheme to enhance cybersecurity with 'moving trees', addressing shortcomings of existing OTP methods. The dynamic group time-based one-time passwords (DGTOTP) scheme provides user identity privacy while ensuring security and scalability, making it suitable for real-world applications.
Researchers collected an unprecedented amount of data on SMS phishing attacks, identifying 35,128 unique campaigns and 600 distinct operations. They also found that phishers use mainstream servers, URL-shortening apps, and web infrastructure to support their operations.
UCF assistant professors Li Fang and Fan Yao have been awarded the 2024 NSF Faculty Early Career Development program award for their research projects. Fang is studying photo-induced ultrafast electron-nuclear dynamics in molecules, while Yao is identifying lapses in computer processing security at the micro level.
Celestron NexStar 8SE Computerized Telescope
Celestron NexStar 8SE Computerized Telescope combines portable Schmidt-Cassegrain optics with GoTo pointing for outreach nights and field campaigns.
Model disgorgement is a set of techniques that force generative models to remove content leading to copyright infringement or biased responses. Researchers propose this approach to address issues like stylistic infringement, where models reproduce copyrighted works in the style of famous artists.
A UBC study reveals that Facebook Marketplace users are concerned about physical and financial safety, as well as their own well-being when trading with strangers. Despite these risks, many participants continued to use the platform due to its simplicity and wide audience reach.
A new tool called VFCFinder analyzes open-source software updates to pinpoint specific code sections being modified to address security vulnerabilities. This helps programmers determine which updates are necessary without unnecessary changes.
A new study conducted by North Carolina State University found that many parents are not taking adequate steps to address security and privacy risks associated with virtual reality (VR) apps. Parents were primarily concerned about physiological development issues, but lacked awareness of data surveillance and collection risks.
CalDigit TS4 Thunderbolt 4 Dock
CalDigit TS4 Thunderbolt 4 Dock simplifies serious desks with 18 ports for high-speed storage, monitors, and instruments across Mac and PC setups.
A study reviewed 100 US institutions with National Center of Academic Excellence in Cybersecurity designations, finding significant variation in program types, credits, and learning outcomes. The research aims to improve industry-readiness and graduate employability by highlighting areas for improvement in cybersecurity education.