Bluesky Facebook Reddit Email

Wang receives funding for Experiential Learning Program

Wang will develop an educational simulation game, CyberShield H2O, to enhance awareness and understanding of cybersecurity risks associated with public water systems. The project aims to foster critical systems thinking and prepare students to address cyber risks in municipal water systems.

Data protection laws reduced breaches but affected firms’ value

Research by University of East Anglia and University of Texas found that stricter data privacy laws significantly reduced breaches, but negatively affected firms' market value. Companies compliant with GDPR invested more in data protection and were less likely to experience data breaches.

Six NFR strategies to improve software performance and security

A new study identifies six best practices for addressing non-functional requirements (NFRs) to ensure software security and performance. The research highlights the importance of NFRs in determining software quality and success, and how developers discuss and manage these requirements.

SAMSUNG T9 Portable SSD 2TB

SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.

Enhancing cybersecurity with “moving trees”

Researchers propose a new scheme to enhance cybersecurity with 'moving trees', addressing shortcomings of existing OTP methods. The dynamic group time-based one-time passwords (DGTOTP) scheme provides user identity privacy while ensuring security and scalability, making it suitable for real-world applications.

Creality K1 Max 3D Printer

Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.

Study sheds light on shady world of text message phishing scams

Researchers collected an unprecedented amount of data on SMS phishing attacks, identifying 35,128 unique campaigns and 600 distinct operations. They also found that phishers use mainstream servers, URL-shortening apps, and web infrastructure to support their operations.

Two promising UCF researchers earn 2024 NSF CAREER Awards

UCF assistant professors Li Fang and Fan Yao have been awarded the 2024 NSF Faculty Early Career Development program award for their research projects. Fang is studying photo-induced ultrafast electron-nuclear dynamics in molecules, while Yao is identifying lapses in computer processing security at the micro level.

Apple iPhone 17 Pro

Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.

Cybersecurity education varies widely in US

A study reviewed 100 US institutions with National Center of Academic Excellence in Cybersecurity designations, finding significant variation in program types, credits, and learning outcomes. The research aims to improve industry-readiness and graduate employability by highlighting areas for improvement in cybersecurity education.

Fluke 87V Industrial Digital Multimeter

Fluke 87V Industrial Digital Multimeter is a trusted meter for precise measurements during instrument integration, repairs, and field diagnostics.

Breakthrough promises secure quantum computing at home

A new study published in Physical Review Letters has developed a method for secure quantum computing, enabling users to access remote quantum computers while maintaining data authenticity and security. This breakthrough promises to unlock the transformative potential of cloud-based quantum computing.

Most cybercriminal threats are concentrated in just a few countries

The study finds that cybercriminal threats are primarily concentrated in a small number of countries, with China, Russia, Ukraine, the US, Romania, and Nigeria ranking high in various categories. The World Cybercrime Index provides a useful tool for targeting investigative and preventive efforts more efficiently.

Sky-Watcher EQ6-R Pro Equatorial Mount

Sky-Watcher EQ6-R Pro Equatorial Mount provides precise tracking capacity for deep-sky imaging rigs during long astrophotography sessions.

Scientists put forth a smarter way to protect a smarter grid

A team of experts at PNNL developed a new tool that sorts and prioritizes cyber threats on the fly, giving grid operators a clear blueprint to identify and address the biggest threats first. The approach uses hybrid attack graphs and optimization to reduce the number of potential attacks from thousands to fewer than 100.

Rigol DP832 Triple-Output Bench Power Supply

Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.

Guarding against coding vulnerabilities

A new research project led by Professor David Lo aims to develop an approach to find cybersecurity weaknesses in software applications' source code. The project proposes building a localised and specialised LLM solution to discover vulnerabilities in government code base, leveraging open-source projects and communities.

GoPro HERO13 Black

GoPro HERO13 Black records stabilized 5.3K video for instrument deployments, field notes, and outreach, even in harsh weather and underwater conditions.

Digital emblem for humanitarian law in cyberspace

The ETH Zurich-developed Authentic Digital EMblem (ADEM) aims to protect humanitarian organizations' digital infrastructure from cyberattacks. The system uses a combination of security protocols, including web PKI and CT ecosystem, to ensure authenticity, accountability, and covert inspection.

Apple Watch Series 11 (GPS, 46mm)

Apple Watch Series 11 (GPS, 46mm) tracks health metrics and safety alerts during long observing sessions, fieldwork, and remote expeditions.

Reducing cyberattacks on Canadian health systems

A recent cyberattack in southwestern Ontario highlights the need for clinicians and hospitals to improve their cybersecurity practices. Experts recommend navigating trade-offs between efficiency and risk reduction using the US National Institute of Standards and Technology's Cybersecurity Framework.

Davis Instruments Vantage Pro2 Weather Station

Davis Instruments Vantage Pro2 Weather Station offers research-grade local weather data for networked stations, campuses, and community observatories.

AI should be better understood and managed – new research warns

A Lancaster University academic argues that AI and algorithms contribute to polarization, radicalism, and political violence, posing a threat to national security. The paper examines how AI has been securitized throughout its history, highlighting the need for better understanding and management of its risks.

Monitoring nuclear weapons stockpiles with radio waves

A new monitoring system uses radio waves to track changes in a room's nuclear weapons stockpile, providing a secure way to verify compliance with disarmament treaties. The system combines cyber-physical security assessments with cross-system physics to enable new levels of trust in the Internet of Things.

Apple’s Safari browser is still vulnerable to Spectre attacks

A recent study has shown that Apple's Safari browser is still vulnerable to Spectre attacks, allowing hackers to access sensitive data such as passwords and emails. Researchers from Ruhr-University Bochum found that attackers can bypass security measures in the browser to intercept and exploit user data.

Apple MacBook Pro 14-inch (M4 Pro)

Apple MacBook Pro 14-inch (M4 Pro) powers local ML workloads, large datasets, and multi-display analysis for field and lab teams.

NSF backs Rice processor design, chip security research

Researchers aim to develop programmable formal specification-based data stream processor and hardware monitor to enhance microchip security and prevent malfunctions. They will explore novel technologies for real-time monitoring of physical and biological systems, including signal patterns within computer chips.

AI: Elias puts UniTrento on the European map of innovation

The University of Trento coordinates a European research network, Elias, aiming to establish Europe as a leader in AI research. The project focuses on developing new computational systems and models for sustainable innovation, social cohesion, and reliable AI.

DJI Air 3 (RC-N2)

DJI Air 3 (RC-N2) captures 4K mapping passes and environmental surveys with dual cameras, long flight time, and omnidirectional obstacle sensing.

Better cybersecurity with new material

Researchers at Linköping University develop a new type of quantum random number generator based on perovskite light emitting diodes, providing improved randomness and security. The technology has the potential to be cheaper and more environmentally friendly than traditional methods.

Virtual institute at the University of Kansas to combat cyber threats

The University of Kansas has established a virtual institute to train leaders in cybersecurity and electromagnetic spectrum research, partnering with Ohio State and Purdue universities. The VICEROY Virtual Institute will offer courses, scholarships, and hands-on training to combat growing cyber threats.

Aranet4 Home CO2 Monitor

Aranet4 Home CO2 Monitor tracks ventilation quality in labs, classrooms, and conference rooms with long battery life and clear e-ink readouts.

Celestron NexStar 8SE Computerized Telescope

Celestron NexStar 8SE Computerized Telescope combines portable Schmidt-Cassegrain optics with GoTo pointing for outreach nights and field campaigns.

Smart devices: Putting a premium on peace of mind

A new program aims to label smart devices with certain cybersecurity standards, allowing consumers to make informed choices. However, the effectiveness of these labels in protecting consumers from cyber threats is uncertain.

Researchers strengthen defenses against common cyberattack

Scientists at PNNL developed a new technique to detect denial-of-service attacks, which improved detection accuracy by 90% compared to current methods. The technique focuses on the evolution of entropy, a measure of disorder in a system, and is automated, requiring minimal computing power or network resources.

Nikon Monarch 5 8x42 Binoculars

Nikon Monarch 5 8x42 Binoculars deliver bright, sharp views for wildlife surveys, eclipse chases, and quick star-field scans at dark sites.

Why computer security advice is more confusing than it should be

A new study highlights the key problem with how computer security guidelines are created, citing complexity and lack of prioritization as major issues. Researchers recommend curating information and using clear messaging to make guidelines more accessible and user-friendly.

Meta Quest 3 512GB

Meta Quest 3 512GB enables immersive mission planning, terrain rehearsal, and interactive STEM demos with high-resolution mixed-reality experiences.

A new way to look at data privacy

Researchers create a new privacy metric, Probably Approximately Correct (PAC) Privacy, that enables the addition of minimal noise to protect sensitive data. The algorithm automatically determines the optimal amount of noise needed without requiring knowledge of the inner workings of the model or training process.

Satellite security lags decades behind the state of the art

Researchers found that many satellites lack basic security concepts, such as separation of code and data, and rely on obscurity to ensure security. The team conducted a thorough analysis of three low-earth orbit satellites and identified vulnerabilities that could be exploited by hackers.