Research reveals fake Australian IDs are widely sold on dark web marketplaces, used by crime rings and terrorists for various illicit activities. The study aims to inform law enforcement and security organisations in targeting specific types of fraud.
Apple iPhone 17 Pro
Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.
A new special issue of Criminology & Public Policy explores cybercrime and cybersecurity, highlighting the need for empirical testing and systematic analysis. The 11 studies in the issue build the knowledge base for understanding and addressing cybercrime, improving cybersecurity through theories and methods in criminology.
A team of researchers will develop a validated curriculum and assessment methods to increase ethical responsibility in the future cybersecurity workforce. The project aims to address social and ethical risks associated with AI technologies designed for security-related problems.
Venkat's project aims to reduce attack response time and protect programs from other attacks by developing a 'decoupled' security response system. His approach could help stop emerging zero-day cyberattacks within 24-48 hours, reducing time and dollar costs of frequent patching.
A Lancaster University academic argues that AI and algorithms contribute to polarization, radicalism, and political violence, posing a threat to national security. The paper examines how AI has been securitized throughout its history, highlighting the need for better understanding and management of its risks.
Rigol DP832 Triple-Output Bench Power Supply
Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.
A new monitoring system uses radio waves to track changes in a room's nuclear weapons stockpile, providing a secure way to verify compliance with disarmament treaties. The system combines cyber-physical security assessments with cross-system physics to enable new levels of trust in the Internet of Things.
The University of Texas at San Antonio has been selected to establish a Secure Manufacturing Tech Hub with a $500,000 grant from the US Economic Development Administration. The consortium aims to grow a skilled workforce, enhance business competitiveness, and promote secure manufacturing strategies across South Texas.
A recent study has shown that Apple's Safari browser is still vulnerable to Spectre attacks, allowing hackers to access sensitive data such as passwords and emails. Researchers from Ruhr-University Bochum found that attackers can bypass security measures in the browser to intercept and exploit user data.
Researchers aim to develop programmable formal specification-based data stream processor and hardware monitor to enhance microchip security and prevent malfunctions. They will explore novel technologies for real-time monitoring of physical and biological systems, including signal patterns within computer chips.
The University of Trento coordinates a European research network, Elias, aiming to establish Europe as a leader in AI research. The project focuses on developing new computational systems and models for sustainable innovation, social cohesion, and reliable AI.
Sony Alpha a7 IV (Body Only)
Sony Alpha a7 IV (Body Only) delivers reliable low-light performance and rugged build for astrophotography, lab documentation, and field expeditions.
Researchers at Linköping University develop a new type of quantum random number generator based on perovskite light emitting diodes, providing improved randomness and security. The technology has the potential to be cheaper and more environmentally friendly than traditional methods.
The University of Kansas has established a virtual institute to train leaders in cybersecurity and electromagnetic spectrum research, partnering with Ohio State and Purdue universities. The VICEROY Virtual Institute will offer courses, scholarships, and hands-on training to combat growing cyber threats.
The University of Missouri is using a $1 million grant to develop an Industry 4.0 lab, providing engineering students with hands-on learning experiences in the latest industrial revolution's technology-centered job market. The lab will integrate skills at a higher level and keep students at the state-of-the-art level for industry.
SAMSUNG T9 Portable SSD 2TB
SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.
The University of Texas at El Paso researchers Laura Alvarez and Deepak K. Tosh have been awarded $550,000 and $492,000 NSF CAREER grants for their research on river landscapes and cyber resiliency.
Researchers aim to connect manufacturers and cybersecurity experts to create a community interested in solving digital manufacturing security issues. The team plans to build a website for communication and hosting workshops, conferences, and student design competitions.
The NYU Tandon School of Engineering has been awarded a $1.2 million grant from the National Science Foundation to develop new technologies for securing the digital legal supply chain. The project aims to protect official laws and legal information from cyberattacks and malicious actors.
A new program aims to label smart devices with certain cybersecurity standards, allowing consumers to make informed choices. However, the effectiveness of these labels in protecting consumers from cyber threats is uncertain.
Creality K1 Max 3D Printer
Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.
Scientists at PNNL developed a new technique to detect denial-of-service attacks, which improved detection accuracy by 90% compared to current methods. The technique focuses on the evolution of entropy, a measure of disorder in a system, and is automated, requiring minimal computing power or network resources.
A recent study involving over 500 participants found that humans can only detect speech deepfakes 73% of the time. While training participants showed minimal effects, automated detectors performed better and were comparable to human detection abilities.
Researchers found a novel method to read data from CPUs by analyzing power consumption, dubbed Collide+Power. This attack consumes power and causes delays, allowing attackers to derive targeted data.
Aranet4 Home CO2 Monitor
Aranet4 Home CO2 Monitor tracks ventilation quality in labs, classrooms, and conference rooms with long battery life and clear e-ink readouts.
Researchers at Tohoku University have developed a new cipher system called SCARF, which enhances computer security by protecting against cache side-channel attacks. The innovative system offers exceptional performance and can complete randomization with only half the latency of existing techniques.
A new study highlights the key problem with how computer security guidelines are created, citing complexity and lack of prioritization as major issues. Researchers recommend curating information and using clear messaging to make guidelines more accessible and user-friendly.
A study by University of Maryland security experts found that 61 out of 228 phones contained personal data like social security numbers and credit card information. The researchers accessed these phones using techniques that someone on the street might use, highlighting the ease with which personal data can be accessible.
Researchers create a new privacy metric, Probably Approximately Correct (PAC) Privacy, that enables the addition of minimal noise to protect sensitive data. The algorithm automatically determines the optimal amount of noise needed without requiring knowledge of the inner workings of the model or training process.
Lero is recruiting 16 top international post-doctoral researchers for a €2.9 million fellowship program focusing on privacy, trust, inclusion and fairness in software expertise. The program will provide discipline-specific skills training and enhance career development.
GoPro HERO13 Black
GoPro HERO13 Black records stabilized 5.3K video for instrument deployments, field notes, and outreach, even in harsh weather and underwater conditions.
Researchers found that many satellites lack basic security concepts, such as separation of code and data, and rely on obscurity to ensure security. The team conducted a thorough analysis of three low-earth orbit satellites and identified vulnerabilities that could be exploited by hackers.
The University of Houston's CYBER-CARE research center aims to prevent cyberattacks that could compromise the safe movement of people and goods in the US. The center will focus on four goals, including exploring advanced theories to mitigate the impact of large-scale cyberattacks.
A study by Pacific Northwest National Laboratory found that workers experiencing high levels of work-related distress are more likely to fall victim to phishing attacks. The researchers identified a statistically significant relationship between stress and response to simulated phishing emails, with every one-point increase in self-rep...
Researchers developed AEGIS, the first technique to detect backdoor attacks in robust machine learning models. It improves the trustworthiness of artificial intelligence by analyzing robust models and detecting mixed input distributions for poisoned classes.
Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C)
Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C) keeps Macs, tablets, and meters powered during extended observing runs and remote surveys.
Researchers at the University of Waterloo discovered a method to bypass voice authentication security systems with high accuracy. They found that malicious actors can generate convincing copies of a victim's voice using deepfake software, evading existing spoofing countermeasures.
Lero is recruiting 16 world-class researchers to work on privacy, trust and inclusion in software development through the €2.9 million SyMeCo programme. The programme will attract outstanding international candidates from computer science and related fields.
A researcher at George Mason University is conducting threat hunting operations on large datasets of suspicious network traffic. The project aims to develop an alert system and improve incident response capabilities, with funding from the Virginia Innovation Partnership Authority.
FES2023 brings together leading researchers and industry experts to share groundbreaking research on AI-based energy solutions, smart grids, and renewable energy systems. The conference covers key themes including planning and operation of energy systems, electricity markets, and demand response.
The SEQUINS project aims to create a smart, equitable, and interoperable electrical grid in the Pacific Northwest. Over two years, it will develop plans to overcome obstacles through academic research, entrepreneurship, and workforce training.
Apple iPad Pro 11-inch (M4)
Apple iPad Pro 11-inch (M4) runs demanding GIS, imaging, and annotation workflows on the go for surveys, briefings, and lab notebooks.
Hospitals affected by ransomware may see increased patient loads and resource strain, impacting time-sensitive care for acute stroke patients. Targeted cyberattacks can have regional disaster implications on healthcare delivery.
Researchers found that many cryptocurrencies take months or years to fix severe security vulnerabilities, with some taking over three years. Bitcoin fixed a vulnerability in just seven days, while others like Litecoin and Dogecoin took 114 days and 185 days respectively.
Researchers at Michigan State University have been awarded a $1.2 million NSF grant to enhance the security of cellular 911 calls, which were previously found to be vulnerable to cyberattacks that could steal service and disrupt emergency calls. The team will design and implement safer practices in modern emergency communication systems.
Researchers at University of Illinois Chicago develop a method inspired by quantum physics to improve wireless device identification and protect device-to-device communication. They create a hardware encryption system using a truly random and unique digital fingerprint, making it virtually unbreakable.
A recent project at KAUST has reported multifunctional logic gates that offer users a range of hardware security advantages, including tamper protection and watermarking. The gates use spintronic devices called magnetic tunnel junctions, which can be easily switchable and obscure their layout, making them hard to reverse engineer.
Davis Instruments Vantage Pro2 Weather Station
Davis Instruments Vantage Pro2 Weather Station offers research-grade local weather data for networked stations, campuses, and community observatories.
SymTrust project aims to develop new symmetric cryptography methods based on sound security arguments, balancing efficiency and security. Researchers will study existing ciphers and conditions of cryptanalysis to set new standards in information encryption.
A new study found that repeated requests for personal data increase disclosure, despite unchanged concerns about privacy. Researchers suggest practical measures to reduce this effect and encourage mutually beneficial sharing.
A new course at Norwegian University of Science and Technology teaches risk management and resilience in maritime digital security. Despite the importance of training, many deck officers reported uncertainty about handling cyber incidents on board.
Researchers at Ruhr University Bochum detected deviations in 37 out of 40 chips, with a high detection rate achieved through clean room conditions and optimized algorithms. The team released their findings and analysis tools online for further study.
A study found that only 8.91% of websites that obtain user consent comply correctly with GDPR regulations. Researchers used automated methods to analyze web-tracking techniques and detected nearly 7 tracking cookies per website on average.
GQ GMC-500Plus Geiger Counter
GQ GMC-500Plus Geiger Counter logs beta, gamma, and X-ray levels for environmental monitoring, training labs, and safety demonstrations.
Researchers detected 16 security vulnerabilities in DJI drones, including the ability to change serial numbers, override tracking mechanisms, and crash flying drones mid-air. The DJI Mini 2, Air 2, and Mavic 3 models were found to have four severe flaws.
Researchers at Sandia National Laboratories and Purdue University have developed a technique called moving target defense to protect against hackers taking control of military jets. This approach involves shuffling network addresses to make it difficult for attackers to access critical systems.
A new cybersecurity framework uses digital twin technology, machine learning, and human expertise to detect cyberattacks in manufacturing processes. The framework analyzes continuous data streams from physical machines and their digital twins to identify irregularities and flag potential threats.
Computer scientists designed a reconstruction attack that proves US Census data can be exposed and stolen with current privacy measures. The study demonstrates risks to individual respondents' privacy, highlighting the need for differential privacy techniques to protect sensitive information.
Kestrel 3000 Pocket Weather Meter
Kestrel 3000 Pocket Weather Meter measures wind, temperature, and humidity in real time for site assessments, aviation checks, and safety briefings.
The Heidelberg Laureate Forum Foundation offers journalist travel grants to cover the 10th HLF from September 24-29, 2023. Recipients of prestigious awards in mathematics and computer science will gather with young researchers for a week of interdisciplinary dialogue.
Researchers have developed a compact silicon photonic compute engine capable of computing tiled matrix multiplications at a record-high 50 GHz clock frequency. This achievement promises to contribute significantly to data center cybersecurity and enables real-time threat detection for malicious packets.
Dr. Sushil Jajodia is rethinking adaptive cyber defense with a focus on worst-case response time and adversary cost optimization
A study found that remote workers are more likely to protect IT resources when faced with fear and a clear understanding of potential security threats. Employers can encourage secure behaviors by clearly communicating threats and promoting self-efficacy, and also consider integrating stewardship theory to promote a sense of collectivism.
Apple MacBook Pro 14-inch (M4 Pro)
Apple MacBook Pro 14-inch (M4 Pro) powers local ML workloads, large datasets, and multi-display analysis for field and lab teams.
The University of Texas at El Paso has received a $5 million grant from the National Science Foundation to provide financial support and professional development experiences to talented computer science students. The program will fund partial scholarships for 26 UTEP students and 15 EPCC students.
Oregon State University has received $4.8 million from the National Science Foundation to support a cybersecurity workforce development program, targeting underrepresented groups in the field. The program will fund scholarships for up to 29 students and provide clinical rotations with underserved agencies across the Pacific Northwest.
The RITHMS project aims to enhance police forces' and customs authorities' capabilities in tackling illicit cultural trafficking with innovative technologies. The platform will utilize Social Network Analysis to identify organized criminal networks and provide valuable information to investigators.
Researchers at MIT have developed a scheme for private information retrieval that is about 30 times faster than other comparable methods. The technique enables users to search an online database without revealing their query to the server, with potential applications in private communication and targeted advertising.
Meta Quest 3 512GB
Meta Quest 3 512GB enables immersive mission planning, terrain rehearsal, and interactive STEM demos with high-resolution mixed-reality experiences.
A team of researchers proposes an intelligent routing scheme to optimize link load balancing in software-defined networks, achieving significant performance improvements. Their algorithms outperform traditional methods, reducing maximum bandwidth by 24.6 percent in real-world topologies.
Concordia researchers identify vulnerabilities in smart inverters to cyberattacks, including reconnaissance, replay, DDoS, and Man-in-the-Middle attacks. These attacks can disrupt energy flow and create power oscillations, severely impeding microgrid functionality.
Scientists at KAUST created a novel approach to secure microgrids by embedding hardware performance counters in solar inverters. This innovative solution can detect malware with over 97% accuracy using time series classifiers, providing an effective defense countermeasure for low-cost and low-complexity.
A team of researchers has developed a framework using blockchain technology to track device communications on the electric grid, detecting anomalies such as data manipulation and spoofing. This approach increases grid resiliency and allows for rapid response to cyberattacks or equipment failures.
Nikon Monarch 5 8x42 Binoculars
Nikon Monarch 5 8x42 Binoculars deliver bright, sharp views for wildlife surveys, eclipse chases, and quick star-field scans at dark sites.