Iowa State University has established a new cybersecurity center to address the growing threat of cyberattacks on renewable energy systems and microgrids. The center will develop robust algorithms and tools to detect and mitigate cyberattacks, as well as strengthen the grid industry's cybersecurity workforce.
Researchers at Graz University of Technology discovered three side-channel attacks on WebGPU browser interface, allowing them to access a computer's cache memory and extract sensitive information. The attacks were fast enough to succeed during normal surfing behavior, highlighting the need for browsers to address GPU security and priva...
A new study published in Physical Review Letters has developed a method for secure quantum computing, enabling users to access remote quantum computers while maintaining data authenticity and security. This breakthrough promises to unlock the transformative potential of cloud-based quantum computing.
Apple iPhone 17 Pro
Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.
The study finds that cybercriminal threats are primarily concentrated in a small number of countries, with China, Russia, Ukraine, the US, Romania, and Nigeria ranking high in various categories. The World Cybercrime Index provides a useful tool for targeting investigative and preventive efforts more efficiently.
The World Cybercrime Index ranks countries by cybercrime threat level, identifying Russia as the top hotspot. The study's findings suggest that a small number of countries house the greatest cybercrime threats, with the UK coming in at number eight.
A new USF study finds that language barriers limit the effectiveness of cybersecurity resources, with many limited English proficiency users engaging in risky online behaviors. The research highlights the need for providing cybersecurity information and resources in multiple formats to accommodate diverse literacy levels.
A method has been developed to protect and manage personal data on the internet using blockchain technology and smart contracts. The system allows users to control who has their information and what it is used for, enabling more secure browsing and compliance with European data protection law.
Meta Quest 3 512GB
Meta Quest 3 512GB enables immersive mission planning, terrain rehearsal, and interactive STEM demos with high-resolution mixed-reality experiences.
Researchers developed an approach called Quantum Noise Injection for Adversarial Defense (QNAD) to protect quantum computers from attacks. The method introduces noise into the quantum neural network, making it more accurate during an attack.
A team of experts at PNNL developed a new tool that sorts and prioritizes cyber threats on the fly, giving grid operators a clear blueprint to identify and address the biggest threats first. The approach uses hybrid attack graphs and optimization to reduce the number of potential attacks from thousands to fewer than 100.
A new research project led by Professor David Lo aims to develop an approach to find cybersecurity weaknesses in software applications' source code. The project proposes building a localised and specialised LLM solution to discover vulnerabilities in government code base, leveraging open-source projects and communities.
Aranet4 Home CO2 Monitor
Aranet4 Home CO2 Monitor tracks ventilation quality in labs, classrooms, and conference rooms with long battery life and clear e-ink readouts.
The Heidelberg Laureate Forum Foundation offers limited international journalist travel grants to report on the event. Journalists can apply until April 28, 2024, and will cover travel and visa costs, as well as room and board during their stay in Heidelberg.
Researcher Vijay Shah is developing a robust framework for comprehensive validation and testing of deployed Open Radio Access Network (O-RAN) systems using distinctive power signatures and electromagnetic emanations. This technology has the potential to increase efficiency and cost-effectiveness in supply chain risk management.
A study by Lancaster University forecasts exponential growth in Artificial Intelligence over the next 15 years, with experts warning of corners being cut in safe AI development. The experts also predict that advances in technology will make it harder to distinguish truth from fiction, with potential ramifications for democracies.
FAU Engineering has received a $2.6 million NSF grant to establish a CyberCorps student scholarship program, increasing the nation's cybersecurity workforce. The program provides full scholarships and stipends to students pursuing studies in cybersecurity and AI.
Research found mobile phone users process information faster but are more likely to fall for misinformation compared to personal computers. PC users, however, are more susceptible to phishing attempts, highlighting the importance of device-specific responses.
SAMSUNG T9 Portable SSD 2TB
SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.
The National DigiFoundry aims to establish global standards for digital asset use and exchange through blockchain technologies. The consortium will develop a resilient framework to address cybersecurity challenges in digital asset management.
A new study reveals AI tools are more vulnerable than thought to targeted attacks that force AI systems to make bad decisions. Researchers developed a software called QuadAttac K to test for vulnerabilities in deep neural networks.
The ETH Zurich-developed Authentic Digital EMblem (ADEM) aims to protect humanitarian organizations' digital infrastructure from cyberattacks. The system uses a combination of security protocols, including web PKI and CT ecosystem, to ensure authenticity, accountability, and covert inspection.
Apple AirPods Pro (2nd Generation, USB-C)
Apple AirPods Pro (2nd Generation, USB-C) provide clear calls and strong noise reduction for interviews, conferences, and noisy field environments.
A recent cyberattack in southwestern Ontario highlights the need for clinicians and hospitals to improve their cybersecurity practices. Experts recommend navigating trade-offs between efficiency and risk reduction using the US National Institute of Standards and Technology's Cybersecurity Framework.
Research reveals fake Australian IDs are widely sold on dark web marketplaces, used by crime rings and terrorists for various illicit activities. The study aims to inform law enforcement and security organisations in targeting specific types of fraud.
A new special issue of Criminology & Public Policy explores cybercrime and cybersecurity, highlighting the need for empirical testing and systematic analysis. The 11 studies in the issue build the knowledge base for understanding and addressing cybercrime, improving cybersecurity through theories and methods in criminology.
A team of researchers will develop a validated curriculum and assessment methods to increase ethical responsibility in the future cybersecurity workforce. The project aims to address social and ethical risks associated with AI technologies designed for security-related problems.
Venkat's project aims to reduce attack response time and protect programs from other attacks by developing a 'decoupled' security response system. His approach could help stop emerging zero-day cyberattacks within 24-48 hours, reducing time and dollar costs of frequent patching.
Rigol DP832 Triple-Output Bench Power Supply
Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.
A Lancaster University academic argues that AI and algorithms contribute to polarization, radicalism, and political violence, posing a threat to national security. The paper examines how AI has been securitized throughout its history, highlighting the need for better understanding and management of its risks.
A new monitoring system uses radio waves to track changes in a room's nuclear weapons stockpile, providing a secure way to verify compliance with disarmament treaties. The system combines cyber-physical security assessments with cross-system physics to enable new levels of trust in the Internet of Things.
The University of Texas at San Antonio has been selected to establish a Secure Manufacturing Tech Hub with a $500,000 grant from the US Economic Development Administration. The consortium aims to grow a skilled workforce, enhance business competitiveness, and promote secure manufacturing strategies across South Texas.
Celestron NexStar 8SE Computerized Telescope
Celestron NexStar 8SE Computerized Telescope combines portable Schmidt-Cassegrain optics with GoTo pointing for outreach nights and field campaigns.
A recent study has shown that Apple's Safari browser is still vulnerable to Spectre attacks, allowing hackers to access sensitive data such as passwords and emails. Researchers from Ruhr-University Bochum found that attackers can bypass security measures in the browser to intercept and exploit user data.
Researchers aim to develop programmable formal specification-based data stream processor and hardware monitor to enhance microchip security and prevent malfunctions. They will explore novel technologies for real-time monitoring of physical and biological systems, including signal patterns within computer chips.
The University of Trento coordinates a European research network, Elias, aiming to establish Europe as a leader in AI research. The project focuses on developing new computational systems and models for sustainable innovation, social cohesion, and reliable AI.
Researchers at Linköping University develop a new type of quantum random number generator based on perovskite light emitting diodes, providing improved randomness and security. The technology has the potential to be cheaper and more environmentally friendly than traditional methods.
The University of Kansas has established a virtual institute to train leaders in cybersecurity and electromagnetic spectrum research, partnering with Ohio State and Purdue universities. The VICEROY Virtual Institute will offer courses, scholarships, and hands-on training to combat growing cyber threats.
Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C)
Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C) keeps Macs, tablets, and meters powered during extended observing runs and remote surveys.
The University of Missouri is using a $1 million grant to develop an Industry 4.0 lab, providing engineering students with hands-on learning experiences in the latest industrial revolution's technology-centered job market. The lab will integrate skills at a higher level and keep students at the state-of-the-art level for industry.
The University of Texas at El Paso researchers Laura Alvarez and Deepak K. Tosh have been awarded $550,000 and $492,000 NSF CAREER grants for their research on river landscapes and cyber resiliency.
Researchers aim to connect manufacturers and cybersecurity experts to create a community interested in solving digital manufacturing security issues. The team plans to build a website for communication and hosting workshops, conferences, and student design competitions.
A new program aims to label smart devices with certain cybersecurity standards, allowing consumers to make informed choices. However, the effectiveness of these labels in protecting consumers from cyber threats is uncertain.
Sony Alpha a7 IV (Body Only)
Sony Alpha a7 IV (Body Only) delivers reliable low-light performance and rugged build for astrophotography, lab documentation, and field expeditions.
The NYU Tandon School of Engineering has been awarded a $1.2 million grant from the National Science Foundation to develop new technologies for securing the digital legal supply chain. The project aims to protect official laws and legal information from cyberattacks and malicious actors.
Scientists at PNNL developed a new technique to detect denial-of-service attacks, which improved detection accuracy by 90% compared to current methods. The technique focuses on the evolution of entropy, a measure of disorder in a system, and is automated, requiring minimal computing power or network resources.
Researchers found a novel method to read data from CPUs by analyzing power consumption, dubbed Collide+Power. This attack consumes power and causes delays, allowing attackers to derive targeted data.
A recent study involving over 500 participants found that humans can only detect speech deepfakes 73% of the time. While training participants showed minimal effects, automated detectors performed better and were comparable to human detection abilities.
DJI Air 3 (RC-N2)
DJI Air 3 (RC-N2) captures 4K mapping passes and environmental surveys with dual cameras, long flight time, and omnidirectional obstacle sensing.
Researchers at Tohoku University have developed a new cipher system called SCARF, which enhances computer security by protecting against cache side-channel attacks. The innovative system offers exceptional performance and can complete randomization with only half the latency of existing techniques.
A new study highlights the key problem with how computer security guidelines are created, citing complexity and lack of prioritization as major issues. Researchers recommend curating information and using clear messaging to make guidelines more accessible and user-friendly.
A study by University of Maryland security experts found that 61 out of 228 phones contained personal data like social security numbers and credit card information. The researchers accessed these phones using techniques that someone on the street might use, highlighting the ease with which personal data can be accessible.
Researchers create a new privacy metric, Probably Approximately Correct (PAC) Privacy, that enables the addition of minimal noise to protect sensitive data. The algorithm automatically determines the optimal amount of noise needed without requiring knowledge of the inner workings of the model or training process.
Lero is recruiting 16 top international post-doctoral researchers for a €2.9 million fellowship program focusing on privacy, trust, inclusion and fairness in software expertise. The program will provide discipline-specific skills training and enhance career development.
Davis Instruments Vantage Pro2 Weather Station
Davis Instruments Vantage Pro2 Weather Station offers research-grade local weather data for networked stations, campuses, and community observatories.
Researchers found that many satellites lack basic security concepts, such as separation of code and data, and rely on obscurity to ensure security. The team conducted a thorough analysis of three low-earth orbit satellites and identified vulnerabilities that could be exploited by hackers.
The University of Houston's CYBER-CARE research center aims to prevent cyberattacks that could compromise the safe movement of people and goods in the US. The center will focus on four goals, including exploring advanced theories to mitigate the impact of large-scale cyberattacks.
A study by Pacific Northwest National Laboratory found that workers experiencing high levels of work-related distress are more likely to fall victim to phishing attacks. The researchers identified a statistically significant relationship between stress and response to simulated phishing emails, with every one-point increase in self-rep...
Creality K1 Max 3D Printer
Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.
Researchers developed AEGIS, the first technique to detect backdoor attacks in robust machine learning models. It improves the trustworthiness of artificial intelligence by analyzing robust models and detecting mixed input distributions for poisoned classes.
Researchers at the University of Waterloo discovered a method to bypass voice authentication security systems with high accuracy. They found that malicious actors can generate convincing copies of a victim's voice using deepfake software, evading existing spoofing countermeasures.
Lero is recruiting 16 world-class researchers to work on privacy, trust and inclusion in software development through the €2.9 million SyMeCo programme. The programme will attract outstanding international candidates from computer science and related fields.
A researcher at George Mason University is conducting threat hunting operations on large datasets of suspicious network traffic. The project aims to develop an alert system and improve incident response capabilities, with funding from the Virginia Innovation Partnership Authority.
Garmin GPSMAP 67i with inReach
Garmin GPSMAP 67i with inReach provides rugged GNSS navigation, satellite messaging, and SOS for backcountry geology and climate field teams.
FES2023 brings together leading researchers and industry experts to share groundbreaking research on AI-based energy solutions, smart grids, and renewable energy systems. The conference covers key themes including planning and operation of energy systems, electricity markets, and demand response.
The SEQUINS project aims to create a smart, equitable, and interoperable electrical grid in the Pacific Northwest. Over two years, it will develop plans to overcome obstacles through academic research, entrepreneurship, and workforce training.
Hospitals affected by ransomware may see increased patient loads and resource strain, impacting time-sensitive care for acute stroke patients. Targeted cyberattacks can have regional disaster implications on healthcare delivery.
GoPro HERO13 Black
GoPro HERO13 Black records stabilized 5.3K video for instrument deployments, field notes, and outreach, even in harsh weather and underwater conditions.
Researchers found that many cryptocurrencies take months or years to fix severe security vulnerabilities, with some taking over three years. Bitcoin fixed a vulnerability in just seven days, while others like Litecoin and Dogecoin took 114 days and 185 days respectively.
Researchers at Michigan State University have been awarded a $1.2 million NSF grant to enhance the security of cellular 911 calls, which were previously found to be vulnerable to cyberattacks that could steal service and disrupt emergency calls. The team will design and implement safer practices in modern emergency communication systems.
Researchers at University of Illinois Chicago develop a method inspired by quantum physics to improve wireless device identification and protect device-to-device communication. They create a hardware encryption system using a truly random and unique digital fingerprint, making it virtually unbreakable.
A recent project at KAUST has reported multifunctional logic gates that offer users a range of hardware security advantages, including tamper protection and watermarking. The gates use spintronic devices called magnetic tunnel junctions, which can be easily switchable and obscure their layout, making them hard to reverse engineer.
SymTrust project aims to develop new symmetric cryptography methods based on sound security arguments, balancing efficiency and security. Researchers will study existing ciphers and conditions of cryptanalysis to set new standards in information encryption.
Nikon Monarch 5 8x42 Binoculars
Nikon Monarch 5 8x42 Binoculars deliver bright, sharp views for wildlife surveys, eclipse chases, and quick star-field scans at dark sites.
A new study found that repeated requests for personal data increase disclosure, despite unchanged concerns about privacy. Researchers suggest practical measures to reduce this effect and encourage mutually beneficial sharing.