Wang will develop an educational simulation game, CyberShield H2O, to enhance awareness and understanding of cybersecurity risks associated with public water systems. The project aims to foster critical systems thinking and prepare students to address cyber risks in municipal water systems.
Research by University of East Anglia and University of Texas found that stricter data privacy laws significantly reduced breaches, but negatively affected firms' market value. Companies compliant with GDPR invested more in data protection and were less likely to experience data breaches.
A new study identifies six best practices for addressing non-functional requirements (NFRs) to ensure software security and performance. The research highlights the importance of NFRs in determining software quality and success, and how developers discuss and manage these requirements.
SAMSUNG T9 Portable SSD 2TB
SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.
Researchers at Graz University of Technology discovered a security loophole that enables tracking users' online activities in detail by monitoring internet connection speed fluctuations. The 'SnailLoad' attack can bypass protective measures like firewalls and browser privacy modes without malicious code or data traffic interception.
A new study by the Society for Risk Analysis explores the impact of AI-driven cyberattacks on global economies, supply chains, and trade. The research found that these attacks can cause significant declines in real GDP, trade prices, and volumes, as well as disruptions to trade routes, particularly among heavily reliant digital economies.
A WPI researcher has received a CAREER Award to develop new technologies to monitor and protect computer chips from malicious attacks. The project aims to create better metrics to verify the integrity of components and advance understanding of side-channel attacks.
Researchers propose a new scheme to enhance cybersecurity with 'moving trees', addressing shortcomings of existing OTP methods. The dynamic group time-based one-time passwords (DGTOTP) scheme provides user identity privacy while ensuring security and scalability, making it suitable for real-world applications.
Ransomware attacks on targeted hospitals led to a temporary decrease in emergency department visits and inpatient admissions. Nearby unattacked hospitals experienced a corresponding increase in ED visits, suggesting a broader impact of such attacks.
Creality K1 Max 3D Printer
Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.
Researchers collected an unprecedented amount of data on SMS phishing attacks, identifying 35,128 unique campaigns and 600 distinct operations. They also found that phishers use mainstream servers, URL-shortening apps, and web infrastructure to support their operations.
UCF assistant professors Li Fang and Fan Yao have been awarded the 2024 NSF Faculty Early Career Development program award for their research projects. Fang is studying photo-induced ultrafast electron-nuclear dynamics in molecules, while Yao is identifying lapses in computer processing security at the micro level.
Model disgorgement is a set of techniques that force generative models to remove content leading to copyright infringement or biased responses. Researchers propose this approach to address issues like stylistic infringement, where models reproduce copyrighted works in the style of famous artists.
Apple iPhone 17 Pro
Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.
A UBC study reveals that Facebook Marketplace users are concerned about physical and financial safety, as well as their own well-being when trading with strangers. Despite these risks, many participants continued to use the platform due to its simplicity and wide audience reach.
A new tool called VFCFinder analyzes open-source software updates to pinpoint specific code sections being modified to address security vulnerabilities. This helps programmers determine which updates are necessary without unnecessary changes.
A study reviewed 100 US institutions with National Center of Academic Excellence in Cybersecurity designations, finding significant variation in program types, credits, and learning outcomes. The research aims to improve industry-readiness and graduate employability by highlighting areas for improvement in cybersecurity education.
A new study conducted by North Carolina State University found that many parents are not taking adequate steps to address security and privacy risks associated with virtual reality (VR) apps. Parents were primarily concerned about physiological development issues, but lacked awareness of data surveillance and collection risks.
Fluke 87V Industrial Digital Multimeter
Fluke 87V Industrial Digital Multimeter is a trusted meter for precise measurements during instrument integration, repairs, and field diagnostics.
Iowa State University has established a new cybersecurity center to address the growing threat of cyberattacks on renewable energy systems and microgrids. The center will develop robust algorithms and tools to detect and mitigate cyberattacks, as well as strengthen the grid industry's cybersecurity workforce.
Researchers at Graz University of Technology discovered three side-channel attacks on WebGPU browser interface, allowing them to access a computer's cache memory and extract sensitive information. The attacks were fast enough to succeed during normal surfing behavior, highlighting the need for browsers to address GPU security and priva...
A new study published in Physical Review Letters has developed a method for secure quantum computing, enabling users to access remote quantum computers while maintaining data authenticity and security. This breakthrough promises to unlock the transformative potential of cloud-based quantum computing.
The World Cybercrime Index ranks countries by cybercrime threat level, identifying Russia as the top hotspot. The study's findings suggest that a small number of countries house the greatest cybercrime threats, with the UK coming in at number eight.
The study finds that cybercriminal threats are primarily concentrated in a small number of countries, with China, Russia, Ukraine, the US, Romania, and Nigeria ranking high in various categories. The World Cybercrime Index provides a useful tool for targeting investigative and preventive efforts more efficiently.
Sky-Watcher EQ6-R Pro Equatorial Mount
Sky-Watcher EQ6-R Pro Equatorial Mount provides precise tracking capacity for deep-sky imaging rigs during long astrophotography sessions.
A new USF study finds that language barriers limit the effectiveness of cybersecurity resources, with many limited English proficiency users engaging in risky online behaviors. The research highlights the need for providing cybersecurity information and resources in multiple formats to accommodate diverse literacy levels.
A method has been developed to protect and manage personal data on the internet using blockchain technology and smart contracts. The system allows users to control who has their information and what it is used for, enabling more secure browsing and compliance with European data protection law.
Researchers developed an approach called Quantum Noise Injection for Adversarial Defense (QNAD) to protect quantum computers from attacks. The method introduces noise into the quantum neural network, making it more accurate during an attack.
A team of experts at PNNL developed a new tool that sorts and prioritizes cyber threats on the fly, giving grid operators a clear blueprint to identify and address the biggest threats first. The approach uses hybrid attack graphs and optimization to reduce the number of potential attacks from thousands to fewer than 100.
Rigol DP832 Triple-Output Bench Power Supply
Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.
A new research project led by Professor David Lo aims to develop an approach to find cybersecurity weaknesses in software applications' source code. The project proposes building a localised and specialised LLM solution to discover vulnerabilities in government code base, leveraging open-source projects and communities.
The Heidelberg Laureate Forum Foundation offers limited international journalist travel grants to report on the event. Journalists can apply until April 28, 2024, and will cover travel and visa costs, as well as room and board during their stay in Heidelberg.
Researcher Vijay Shah is developing a robust framework for comprehensive validation and testing of deployed Open Radio Access Network (O-RAN) systems using distinctive power signatures and electromagnetic emanations. This technology has the potential to increase efficiency and cost-effectiveness in supply chain risk management.
A study by Lancaster University forecasts exponential growth in Artificial Intelligence over the next 15 years, with experts warning of corners being cut in safe AI development. The experts also predict that advances in technology will make it harder to distinguish truth from fiction, with potential ramifications for democracies.
FAU Engineering has received a $2.6 million NSF grant to establish a CyberCorps student scholarship program, increasing the nation's cybersecurity workforce. The program provides full scholarships and stipends to students pursuing studies in cybersecurity and AI.
GoPro HERO13 Black
GoPro HERO13 Black records stabilized 5.3K video for instrument deployments, field notes, and outreach, even in harsh weather and underwater conditions.
Research found mobile phone users process information faster but are more likely to fall for misinformation compared to personal computers. PC users, however, are more susceptible to phishing attempts, highlighting the importance of device-specific responses.
The National DigiFoundry aims to establish global standards for digital asset use and exchange through blockchain technologies. The consortium will develop a resilient framework to address cybersecurity challenges in digital asset management.
A new study reveals AI tools are more vulnerable than thought to targeted attacks that force AI systems to make bad decisions. Researchers developed a software called QuadAttac K to test for vulnerabilities in deep neural networks.
The ETH Zurich-developed Authentic Digital EMblem (ADEM) aims to protect humanitarian organizations' digital infrastructure from cyberattacks. The system uses a combination of security protocols, including web PKI and CT ecosystem, to ensure authenticity, accountability, and covert inspection.
Apple Watch Series 11 (GPS, 46mm)
Apple Watch Series 11 (GPS, 46mm) tracks health metrics and safety alerts during long observing sessions, fieldwork, and remote expeditions.
A recent cyberattack in southwestern Ontario highlights the need for clinicians and hospitals to improve their cybersecurity practices. Experts recommend navigating trade-offs between efficiency and risk reduction using the US National Institute of Standards and Technology's Cybersecurity Framework.
A new special issue of Criminology & Public Policy explores cybercrime and cybersecurity, highlighting the need for empirical testing and systematic analysis. The 11 studies in the issue build the knowledge base for understanding and addressing cybercrime, improving cybersecurity through theories and methods in criminology.
Research reveals fake Australian IDs are widely sold on dark web marketplaces, used by crime rings and terrorists for various illicit activities. The study aims to inform law enforcement and security organisations in targeting specific types of fraud.
Davis Instruments Vantage Pro2 Weather Station
Davis Instruments Vantage Pro2 Weather Station offers research-grade local weather data for networked stations, campuses, and community observatories.
A team of researchers will develop a validated curriculum and assessment methods to increase ethical responsibility in the future cybersecurity workforce. The project aims to address social and ethical risks associated with AI technologies designed for security-related problems.
Venkat's project aims to reduce attack response time and protect programs from other attacks by developing a 'decoupled' security response system. His approach could help stop emerging zero-day cyberattacks within 24-48 hours, reducing time and dollar costs of frequent patching.
A Lancaster University academic argues that AI and algorithms contribute to polarization, radicalism, and political violence, posing a threat to national security. The paper examines how AI has been securitized throughout its history, highlighting the need for better understanding and management of its risks.
A new monitoring system uses radio waves to track changes in a room's nuclear weapons stockpile, providing a secure way to verify compliance with disarmament treaties. The system combines cyber-physical security assessments with cross-system physics to enable new levels of trust in the Internet of Things.
A recent study has shown that Apple's Safari browser is still vulnerable to Spectre attacks, allowing hackers to access sensitive data such as passwords and emails. Researchers from Ruhr-University Bochum found that attackers can bypass security measures in the browser to intercept and exploit user data.
Apple MacBook Pro 14-inch (M4 Pro)
Apple MacBook Pro 14-inch (M4 Pro) powers local ML workloads, large datasets, and multi-display analysis for field and lab teams.
The University of Texas at San Antonio has been selected to establish a Secure Manufacturing Tech Hub with a $500,000 grant from the US Economic Development Administration. The consortium aims to grow a skilled workforce, enhance business competitiveness, and promote secure manufacturing strategies across South Texas.
Researchers aim to develop programmable formal specification-based data stream processor and hardware monitor to enhance microchip security and prevent malfunctions. They will explore novel technologies for real-time monitoring of physical and biological systems, including signal patterns within computer chips.
The University of Trento coordinates a European research network, Elias, aiming to establish Europe as a leader in AI research. The project focuses on developing new computational systems and models for sustainable innovation, social cohesion, and reliable AI.
DJI Air 3 (RC-N2)
DJI Air 3 (RC-N2) captures 4K mapping passes and environmental surveys with dual cameras, long flight time, and omnidirectional obstacle sensing.
Researchers at Linköping University develop a new type of quantum random number generator based on perovskite light emitting diodes, providing improved randomness and security. The technology has the potential to be cheaper and more environmentally friendly than traditional methods.
The University of Kansas has established a virtual institute to train leaders in cybersecurity and electromagnetic spectrum research, partnering with Ohio State and Purdue universities. The VICEROY Virtual Institute will offer courses, scholarships, and hands-on training to combat growing cyber threats.
The University of Missouri is using a $1 million grant to develop an Industry 4.0 lab, providing engineering students with hands-on learning experiences in the latest industrial revolution's technology-centered job market. The lab will integrate skills at a higher level and keep students at the state-of-the-art level for industry.
Aranet4 Home CO2 Monitor
Aranet4 Home CO2 Monitor tracks ventilation quality in labs, classrooms, and conference rooms with long battery life and clear e-ink readouts.
The University of Texas at El Paso researchers Laura Alvarez and Deepak K. Tosh have been awarded $550,000 and $492,000 NSF CAREER grants for their research on river landscapes and cyber resiliency.
Researchers aim to connect manufacturers and cybersecurity experts to create a community interested in solving digital manufacturing security issues. The team plans to build a website for communication and hosting workshops, conferences, and student design competitions.
The NYU Tandon School of Engineering has been awarded a $1.2 million grant from the National Science Foundation to develop new technologies for securing the digital legal supply chain. The project aims to protect official laws and legal information from cyberattacks and malicious actors.
Celestron NexStar 8SE Computerized Telescope
Celestron NexStar 8SE Computerized Telescope combines portable Schmidt-Cassegrain optics with GoTo pointing for outreach nights and field campaigns.
A new program aims to label smart devices with certain cybersecurity standards, allowing consumers to make informed choices. However, the effectiveness of these labels in protecting consumers from cyber threats is uncertain.
Scientists at PNNL developed a new technique to detect denial-of-service attacks, which improved detection accuracy by 90% compared to current methods. The technique focuses on the evolution of entropy, a measure of disorder in a system, and is automated, requiring minimal computing power or network resources.
A recent study involving over 500 participants found that humans can only detect speech deepfakes 73% of the time. While training participants showed minimal effects, automated detectors performed better and were comparable to human detection abilities.
Researchers found a novel method to read data from CPUs by analyzing power consumption, dubbed Collide+Power. This attack consumes power and causes delays, allowing attackers to derive targeted data.
Nikon Monarch 5 8x42 Binoculars
Nikon Monarch 5 8x42 Binoculars deliver bright, sharp views for wildlife surveys, eclipse chases, and quick star-field scans at dark sites.
Researchers at Tohoku University have developed a new cipher system called SCARF, which enhances computer security by protecting against cache side-channel attacks. The innovative system offers exceptional performance and can complete randomization with only half the latency of existing techniques.
A new study highlights the key problem with how computer security guidelines are created, citing complexity and lack of prioritization as major issues. Researchers recommend curating information and using clear messaging to make guidelines more accessible and user-friendly.
A study by University of Maryland security experts found that 61 out of 228 phones contained personal data like social security numbers and credit card information. The researchers accessed these phones using techniques that someone on the street might use, highlighting the ease with which personal data can be accessible.
Meta Quest 3 512GB
Meta Quest 3 512GB enables immersive mission planning, terrain rehearsal, and interactive STEM demos with high-resolution mixed-reality experiences.
Researchers create a new privacy metric, Probably Approximately Correct (PAC) Privacy, that enables the addition of minimal noise to protect sensitive data. The algorithm automatically determines the optimal amount of noise needed without requiring knowledge of the inner workings of the model or training process.
Lero is recruiting 16 top international post-doctoral researchers for a €2.9 million fellowship program focusing on privacy, trust, inclusion and fairness in software expertise. The program will provide discipline-specific skills training and enhance career development.
Researchers found that many satellites lack basic security concepts, such as separation of code and data, and rely on obscurity to ensure security. The team conducted a thorough analysis of three low-earth orbit satellites and identified vulnerabilities that could be exploited by hackers.