Bluesky Facebook Reddit Email

Life Sciences

Comprehensive exploration of living organisms, biological systems, and life processes across all scales from molecules to ecosystems. Encompasses cutting-edge research in biology, genetics, molecular biology, ecology, biochemistry, microbiology, botany, zoology, evolutionary biology, genomics, and biotechnology. Investigates cellular mechanisms, organism development, genetic inheritance, biodiversity conservation, metabolic processes, protein synthesis, DNA sequencing, CRISPR gene editing, stem cell research, and the fundamental principles governing all forms of life on Earth.

447,757 articles | 2542 topics

Health and Medicine

Comprehensive medical research, clinical studies, and healthcare sciences focused on disease prevention, diagnosis, and treatment. Encompasses clinical medicine, public health, pharmacology, epidemiology, medical specialties, disease mechanisms, therapeutic interventions, healthcare innovation, precision medicine, telemedicine, medical devices, drug development, clinical trials, patient care, mental health, nutrition science, health policy, and the application of medical science to improve human health, wellbeing, and quality of life across diverse populations.

431,843 articles | 751 topics

Social Sciences

Comprehensive investigation of human society, behavior, relationships, and social structures through systematic research and analysis. Encompasses psychology, sociology, anthropology, economics, political science, linguistics, education, demography, communications, and social research methodologies. Examines human cognition, social interactions, cultural phenomena, economic systems, political institutions, language and communication, educational processes, population dynamics, and the complex social, cultural, economic, and political forces shaping human societies, communities, and civilizations throughout history and across the contemporary world.

260,756 articles | 745 topics

Physical Sciences

Fundamental study of the non-living natural world, matter, energy, and physical phenomena governing the universe. Encompasses physics, chemistry, earth sciences, atmospheric sciences, oceanography, materials science, and the investigation of physical laws, chemical reactions, geological processes, climate systems, and planetary dynamics. Explores everything from subatomic particles and quantum mechanics to planetary systems and cosmic phenomena, including energy transformations, molecular interactions, elemental properties, weather patterns, tectonic activity, and the fundamental forces and principles underlying the physical nature of reality.

257,913 articles | 1552 topics

Applied Sciences and Engineering

Practical application of scientific knowledge and engineering principles to solve real-world problems and develop innovative technologies. Encompasses all engineering disciplines, technology development, computer science, artificial intelligence, environmental sciences, agriculture, materials applications, energy systems, and industrial innovation. Bridges theoretical research with tangible solutions for infrastructure, manufacturing, computing, communications, transportation, construction, sustainable development, and emerging technologies that advance human capabilities, improve quality of life, and address societal challenges through scientific innovation and technological progress.

225,386 articles | 998 topics

Scientific Community

Study of the practice, culture, infrastructure, and social dimensions of science itself. Addresses how science is conducted, organized, communicated, and integrated into society. Encompasses research funding mechanisms, scientific publishing systems, peer review processes, academic ethics, science policy, research institutions, scientific collaboration networks, science education, career development, research programs, scientific methods, science communication, and the sociology of scientific discovery. Examines the human, institutional, and cultural aspects of scientific enterprise, knowledge production, and the translation of research into societal benefit.

193,043 articles | 157 topics

Space Sciences

Comprehensive study of the universe beyond Earth, encompassing celestial objects, cosmic phenomena, and space exploration. Includes astronomy, astrophysics, planetary science, cosmology, space physics, astrobiology, and space technology. Investigates stars, galaxies, planets, moons, asteroids, comets, black holes, nebulae, exoplanets, dark matter, dark energy, cosmic microwave background, stellar evolution, planetary formation, space weather, solar system dynamics, the search for extraterrestrial life, and humanity's efforts to explore, understand, and unlock the mysteries of the cosmos through observation, theory, and space missions.

29,662 articles | 175 topics

Research Methods

Comprehensive examination of tools, techniques, methodologies, and approaches used across scientific disciplines to conduct research, collect data, and analyze results. Encompasses experimental procedures, analytical methods, measurement techniques, instrumentation, imaging technologies, spectroscopic methods, laboratory protocols, observational studies, statistical analysis, computational methods, data visualization, quality control, and methodological innovations. Addresses the practical techniques and theoretical frameworks enabling scientists to investigate phenomena, test hypotheses, gather evidence, ensure reproducibility, and generate reliable knowledge through systematic, rigorous investigation across all areas of scientific inquiry.

21,889 articles | 139 topics

Mathematics

Study of abstract structures, patterns, quantities, relationships, and logical reasoning through pure and applied mathematical disciplines. Encompasses algebra, calculus, geometry, topology, number theory, analysis, discrete mathematics, mathematical logic, set theory, probability, statistics, and computational mathematics. Investigates mathematical structures, theorems, proofs, algorithms, functions, equations, and the rigorous logical frameworks underlying quantitative reasoning. Provides the foundational language and tools for all scientific fields, enabling precise description of natural phenomena, modeling of complex systems, and the development of technologies across physics, engineering, computer science, economics, and all quantitative sciences.

3,023 articles | 113 topics

Microlaser chip adds new dimensions to quantum communication

Researchers at Penn Engineering have created a chip that outstrips existing quantum communications hardware, communicating in qudits and doubling the quantum information space. The technology enables significant advances in quantum cryptography, raising the maximum secure key rate for information exchange.

Hard to crack hardware

Researchers at KAUST have developed a spintronics-based logic lock to defend chip security, which can be integrated into electronic chips to fend off malicious attacks. The design uses magnetic tunnel junctions to scramble the circuit's operation unless the correct key combination signal is supplied.

Apple iPhone 17 Pro

Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.

Are virtual private networks actually private?

Researchers from Arizona State University and the University of Michigan investigated the effectiveness of virtual private networks in protecting users' data. They found that traffic can still be attacked through VPN tunnels, making them vulnerable to redirection and malware attacks.

Sony Alpha a7 IV (Body Only)

Sony Alpha a7 IV (Body Only) delivers reliable low-light performance and rugged build for astrophotography, lab documentation, and field expeditions.

$637,000 Awarded to improve recovery of critical systems after cyber attacks

The National Centers of Academic Excellence in Cybersecurity awarded a $637,223 grant to Brajendra Panda to develop fast and accurate recovery mechanisms for critical infrastructure systems after cyber-attacks. The goal is to minimize delays and ensure continued operation of critical functions such as electricity.

Rigol DP832 Triple-Output Bench Power Supply

Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.

Thinking like a cyber-attacker to protect user data

MIT researchers found a vulnerable component in computer processors that can be exploited by malicious agents. They developed two mitigation strategies, including scheduling sensitive software on less vulnerable cores and reserving susceptible cores for trusted applications.

Google/Apple’s contact-tracing apps susceptible to digital attacks

Researchers found a flaw in Google/Apple's exposure notification framework that can be exploited for replay attacks, potentially causing false positive notifications and disrupting trust in the system. A patch, called GAEN+, has been developed to address this issue using coarse location data from Wi-Fi access points and cell phone towers.

‘Pulling back the curtain’ to reveal a molecular key to The Wizard of Oz

Scientists have created a durable molecular encryption key using sequence-defined polymers that can store and transport digital keys securely. They successfully decrypted a file with text from The Wonderful Wizard of Oz by extracting the key from ink in a letter, demonstrating the approach's potential for real-world applications.

New computing architecture protects sensitive private data

Researchers at Columbia University have developed a new verification technology for the Arm Confidential Compute Architecture, demonstrating the first formal verification of a prototype. This breakthrough enables the creation of confidential computing architectures that can protect sensitive user data.

SAMSUNG T9 Portable SSD 2TB

SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.

Your brain is better at busting deepfakes than you

A study by University of Sydney neuroscientists found that people's brains can detect AI-generated fake faces with a 54% accuracy rate. However, verbal identification was only successful 37% of the time, highlighting the potential for using brain activity to flag deepfakes on digital platforms.

How daycare apps can spy on parents and children

Researchers found serious security issues in 42 daycare apps, allowing access to private photos and personal data without consent. The analysis highlights inadequate privacy policies and recommendations for guidelines and checklists to ensure compliance with data protection regulations.

Sniffing out your identity with breath biometrics

A team of researchers from Kyushu University has developed an olfactory sensor capable of identifying individuals by analyzing the compounds in their breath. The system, combined with machine learning, achieved an average accuracy of over 97% in authenticating up to 20 individuals.

Apple AirPods Pro (2nd Generation, USB-C)

Apple AirPods Pro (2nd Generation, USB-C) provide clear calls and strong noise reduction for interviews, conferences, and noisy field environments.

Stronger security for smart devices

MIT researchers demonstrate two security methods that protect analog-to-digital converters from powerful attacks, including power and electromagnetic side-channel attacks. The techniques are more efficient and less expensive than other security methods, minimizing power consumption and cost for portable smart devices.

Long-lived things for the internet of things

Researchers at University of Virginia are developing long-lived sensors for the Internet of Things (IoT) to reduce maintenance costs and upgrade challenges. The goal is to create an ecosystem that enables sensors to adapt to changing environments, reducing electronic waste.

Keeping web-browsing data safe from hackers

Researchers at MIT identified a flawed analysis of website-fingerprinting attacks and developed new techniques to prevent them. They found that attackers can use machine-learning algorithms to decode signals leaked between software programs, enabling them to obtain private information.

GQ GMC-500Plus Geiger Counter

GQ GMC-500Plus Geiger Counter logs beta, gamma, and X-ray levels for environmental monitoring, training labs, and safety demonstrations.

Bluetooth signals can be used to identify and track smartphones

Researchers at UC San Diego demonstrated that Bluetooth signals can be used to track individuals' movements with high accuracy. The team developed an algorithm that estimates two values found in Bluetooth signals, providing a unique fingerprint for each device.

Radio waves for the detection of hardware tampering

Researchers develop a new method to detect hardware tampering by monitoring systems with radio waves. The technology can protect entire systems, not just individual components, and is suitable for both high-security applications and everyday problems.

Davis Instruments Vantage Pro2 Weather Station

Davis Instruments Vantage Pro2 Weather Station offers research-grade local weather data for networked stations, campuses, and community observatories.

How randomly moving electrons can improve cyber security

A team of researchers at Indian Institute of Science developed a record-breaking true random number generator (TRNG) that uses the random motion of electrons to generate secure random numbers. The device, which is more compact and faster than previous TRNGs, has exceeded NIST standards with a high min-entropy value of 0.98.

Forecast of food cyber attacks

Researchers warn that the increasing use of digital agriculture could lead to serious cyber-attacks, compromising food supply and production. Complex modeling studies have identified vulnerabilities in ag-tech applications, including side-channel attacks that can exploit physical access to devices.

New countermeasure against unwanted wireless surveillance

Researchers developed IRShield, a novel system protecting privacy in wireless communication by disguising wireless channels with random IRS configurations. The solution prevents state-of-the-art human motion detection attacks, achieving high channel obfuscation and compatibility with existing wireless infrastructures.

Accelerating the pace of machine learning

A new distributed learning technique, GD-SEC, reduces communication requirements in wireless architecture, improving efficiency and reducing computational cost. The method employs data compression to transmit only meaningful, usable data, enhancing the impact of machine learning while minimizing its limitations.

Kestrel 3000 Pocket Weather Meter

Kestrel 3000 Pocket Weather Meter measures wind, temperature, and humidity in real time for site assessments, aviation checks, and safety briefings.

New approach allows for faster ransomware detection

Researchers at North Carolina State University have developed FAXID, a hardware-based approach for detecting ransomware that is significantly faster than software-based methods. In proof-of-concept testing, FAXID demonstrated accuracy comparable to XGBoost but with speeds up to 65.8 times faster.

Eavesdroppers can hack 6G frequency with DIY metasurface

Researchers from Rice University and Brown University demonstrate a DIY method to hack 6G frequency using office paper, inkjet printer, metallic foil transfer, and laminator. The 'metasurface-in-the-middle' attack can redirect part of a high-frequency transmission between two users, threatening the security of next-gen wireless networks.

Cloud server leasing can leave sensitive data up for grabs

Researchers found that cloud tenants are vulnerable to receiving sensitive customer data when IP addresses are leased and released back to the public. To mitigate this risk, companies and cloud-service providers must implement practices such as preventing IP address reuse.

Aranet4 Home CO2 Monitor

Aranet4 Home CO2 Monitor tracks ventilation quality in labs, classrooms, and conference rooms with long battery life and clear e-ink readouts.

New technique offers faster security for non-volatile memory tech

Researchers have developed a new encryption technique that leverages hardware and software to improve file system security for next-generation non-volatile memories. This approach allows for faster performance than existing software security technologies, making it suitable for large data centers and cloud systems.

Tiny, cheap solution for quantum-secure encryption

A new protocol called SPoTKD offers a secure way to transmit data without relying on expensive equipment or dedicated channels. Tiny microchips with self-powered clocks can create secure channels, making it possible for devices to power themselves and stay secure.

Taking a systems approach to cyber security

A new study offers a framework for addressing cyber security challenges in critical infrastructure by explicitly representing multiple dimensions of potential impacts. The proposed Bayesian network model allows for the identification of optimal portfolios of security measures to minimize expected cyberattack impacts.

Garmin GPSMAP 67i with inReach

Garmin GPSMAP 67i with inReach provides rugged GNSS navigation, satellite messaging, and SOS for backcountry geology and climate field teams.

Researchers show they can steal data during homomorphic encryption

Researchers at North Carolina State University identified a vulnerability in homomorphic encryption that allows data to be stolen during the encryption process. This discovery highlights the need for protection against side-channel attacks, which can compromise even next-generation encryption technologies.

A security technique to fool would-be cyber attackers

Researchers developed DAGguise, a scheme that shapes memory requests into a predefined pattern to prevent contention attacks and enable faster computation. The technique represents programs' memory access requests as a graph, where each request is stored in a node, and the edges are time dependencies between requests.

Fluke 87V Industrial Digital Multimeter

Fluke 87V Industrial Digital Multimeter is a trusted meter for precise measurements during instrument integration, repairs, and field diagnostics.

Nathan Dautenhahn wins CAREER Award

Nathan Dautenhahn, a Rice University computer scientist, has received a prestigious CAREER Award to develop 'Least-Authority Virtual Architecture' (LAVA) strategy for retrofitting existing products with meaningful firewalling. This approach aims to systematically analyze and optimize security boundaries in complex systems.

$3.5 million NSF grant to fund 24 cybersecurity scholarships

The National Science Foundation's CyberCorps Scholarship for Service program will provide training and scholarships to the next generation of information technology experts and security managers. The Binghamton University partnership aims to diversify the workforce with a focus on attracting underrepresented minorities.

Identifying fake voice recordings

A new study has generated a massive dataset of artificial voice recordings, revealing subtle differences in high frequencies between real and fake files. The researchers developed algorithms that can distinguish between deepfakes and real speech, providing a starting point for other researchers to improve detection methods.

Nikon Monarch 5 8x42 Binoculars

Nikon Monarch 5 8x42 Binoculars deliver bright, sharp views for wildlife surveys, eclipse chases, and quick star-field scans at dark sites.

UTEP to advance cybersecurity talent pipeline with $4M grant

The University of Texas at El Paso has received a $4 million grant from the National Science Foundation and Department of Homeland Security to support highly qualified computer science students. The program aims to enhance the regional and national cybersecurity workforce with an emphasis on Hispanic and female students.

Apple Watch Series 11 (GPS, 46mm)

Apple Watch Series 11 (GPS, 46mm) tracks health metrics and safety alerts during long observing sessions, fieldwork, and remote expeditions.

Researchers unveil new cyber protections against “logic bombs”

Researchers propose new ways to protect 3D printed objects from stealthy logic bombs, which can cause catastrophic failures. Two strategies are proposed: designing a sensor to detect changes in raw materials or using high-resolution CT images to detect residual stresses.

14 new attacks on web browsers detected

Researchers from Ruhr-University Bochum identified 14 new types of cross-site leak (XS-Leak) attacks on web browsers. XS-Leaks allow malicious websites to grab personal data by interacting with other sites in the background, with popular browsers like Chrome and Firefox vulnerable to multiple attacks.

CalDigit TS4 Thunderbolt 4 Dock

CalDigit TS4 Thunderbolt 4 Dock simplifies serious desks with 18 ports for high-speed storage, monitors, and instruments across Mac and PC setups.

Deeper defense against cyber attacks

A KAUST team developed an improved method for detecting malicious intrusions using deep learning, achieving accuracy rates of up to 99% in simulations of different kinds of attacks. This stacked deep learning approach promises an effective defense against cyberattacks and could prevent outages in critical infrastructure.