Researchers at Penn Engineering have created a chip that outstrips existing quantum communications hardware, communicating in qudits and doubling the quantum information space. The technology enables significant advances in quantum cryptography, raising the maximum secure key rate for information exchange.
Australian citizens are concerned about the government's and businesses' response to cyber threats, with many wanting a more active role in building digital resilience. The study found low trust in institutions and skepticism towards social media companies and tech giants.
Researchers at KAUST have developed a spintronics-based logic lock to defend chip security, which can be integrated into electronic chips to fend off malicious attacks. The design uses magnetic tunnel junctions to scramble the circuit's operation unless the correct key combination signal is supplied.
Elias Bou-Harb, UTSA cyber security professor, has received $1.5 million in grants from the National Science Foundation to research Internet of Things (IoT) security and critical infrastructure protection. The projects aim to develop algorithms to fingerprint exploited IoT devices and improve internet security on IoT devices.
Apple iPhone 17 Pro
Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.
A novel AI-based malware detection and classification system has been developed for 5G-enabled Industrial Internet of Things (IIoT) systems. The system achieved an accuracy rate of 97% on benchmark datasets, enabling the secure connection of applications such as smart cities and autonomous vehicles.
A University of Groningen team created two machine learning models to predict app removal risks, achieving accuracy rates of up to 79.2%. The models can help developers avoid bans and users protect their data.
Researchers from Arizona State University and the University of Michigan investigated the effectiveness of virtual private networks in protecting users' data. They found that traffic can still be attacked through VPN tunnels, making them vulnerable to redirection and malware attacks.
Sony Alpha a7 IV (Body Only)
Sony Alpha a7 IV (Body Only) delivers reliable low-light performance and rugged build for astrophotography, lab documentation, and field expeditions.
The National Centers of Academic Excellence in Cybersecurity awarded a $637,223 grant to Brajendra Panda to develop fast and accurate recovery mechanisms for critical infrastructure systems after cyber-attacks. The goal is to minimize delays and ensure continued operation of critical functions such as electricity.
A University at Buffalo-led research team has been awarded a $5 million grant to develop digital tools that can help older adults recognize and protect themselves from online deceptions. The project, DART, aims to reduce online fraud among older adults, who lose billions of dollars each year due to scams.
The new initiative aims to create more equitable digital financial services, expanding access to mobile money and other services for low-income earners and marginalized communities. The Upanzi Network will leverage research and academia across the continent to develop secure and cost-effective open-source digital technologies.
Rigol DP832 Triple-Output Bench Power Supply
Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.
MIT researchers found a vulnerable component in computer processors that can be exploited by malicious agents. They developed two mitigation strategies, including scheduling sensitive software on less vulnerable cores and reserving susceptible cores for trusted applications.
Researchers found a flaw in Google/Apple's exposure notification framework that can be exploited for replay attacks, potentially causing false positive notifications and disrupting trust in the system. A patch, called GAEN+, has been developed to address this issue using coarse location data from Wi-Fi access points and cell phone towers.
Scientists have created a durable molecular encryption key using sequence-defined polymers that can store and transport digital keys securely. They successfully decrypted a file with text from The Wonderful Wizard of Oz by extracting the key from ink in a letter, demonstrating the approach's potential for real-world applications.
Researchers at Columbia University have developed a new verification technology for the Arm Confidential Compute Architecture, demonstrating the first formal verification of a prototype. This breakthrough enables the creation of confidential computing architectures that can protect sensitive user data.
Researchers developed a novel approach to detecting hidden malicious codes in websites by analyzing common attack patterns and user-side scripts. The method can identify malicious distribution patterns with high accuracy and speed, including zero-day attacks.
SAMSUNG T9 Portable SSD 2TB
SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.
A study by University of Sydney neuroscientists found that people's brains can detect AI-generated fake faces with a 54% accuracy rate. However, verbal identification was only successful 37% of the time, highlighting the potential for using brain activity to flag deepfakes on digital platforms.
Researchers found serious security issues in 42 daycare apps, allowing access to private photos and personal data without consent. The analysis highlights inadequate privacy policies and recommendations for guidelines and checklists to ensure compliance with data protection regulations.
Researchers at Carnegie Mellon University are developing a new approach to harness the power of nanosatellites, collecting data insights while in orbit and reducing latency issues. This initiative will lay groundwork for innovative applications in fields like carbon mapping, traffic management, and precision agriculture.
A team of researchers from Kyushu University has developed an olfactory sensor capable of identifying individuals by analyzing the compounds in their breath. The system, combined with machine learning, achieved an average accuracy of over 97% in authenticating up to 20 individuals.
Researchers at Iowa State University are developing a physics-based system using artificial intelligence to improve the cybersecurity of energy delivery systems. The 'GridDeep' project aims to prevent, detect, and mitigate attacks on renewable sources sending power to the grid.
Apple AirPods Pro (2nd Generation, USB-C)
Apple AirPods Pro (2nd Generation, USB-C) provide clear calls and strong noise reduction for interviews, conferences, and noisy field environments.
MIT researchers demonstrate two security methods that protect analog-to-digital converters from powerful attacks, including power and electromagnetic side-channel attacks. The techniques are more efficient and less expensive than other security methods, minimizing power consumption and cost for portable smart devices.
A Georgia Tech researcher argues that AI cannot replace human strategy and judgment in warfare, citing the unpredictable nature of war and the need for human sense-making and moral decision-making. The research highlights the importance of human intervention in making tactical and strategic decisions.
Researchers at University of Virginia are developing long-lived sensors for the Internet of Things (IoT) to reduce maintenance costs and upgrade challenges. The goal is to create an ecosystem that enables sensors to adapt to changing environments, reducing electronic waste.
Researchers at MIT identified a flawed analysis of website-fingerprinting attacks and developed new techniques to prevent them. They found that attackers can use machine-learning algorithms to decode signals leaked between software programs, enabling them to obtain private information.
GQ GMC-500Plus Geiger Counter
GQ GMC-500Plus Geiger Counter logs beta, gamma, and X-ray levels for environmental monitoring, training labs, and safety demonstrations.
Researchers at UC San Diego demonstrated that Bluetooth signals can be used to track individuals' movements with high accuracy. The team developed an algorithm that estimates two values found in Bluetooth signals, providing a unique fingerprint for each device.
Researchers develop a new method to detect hardware tampering by monitoring systems with radio waves. The technology can protect entire systems, not just individual components, and is suitable for both high-security applications and everyday problems.
The University of Jyväskylä's SAFE Project aims to replace insecure passwords with a more secure authentication method. The project, funded by Business Finland, has global market potential and promises seamless access to all systems worldwide.
A new research proposes a cloud model-based LDoS attack detection method with lower false positive and false negative rates, verified through NS2 simulation platform testing
Davis Instruments Vantage Pro2 Weather Station
Davis Instruments Vantage Pro2 Weather Station offers research-grade local weather data for networked stations, campuses, and community observatories.
A team of researchers at Indian Institute of Science developed a record-breaking true random number generator (TRNG) that uses the random motion of electrons to generate secure random numbers. The device, which is more compact and faster than previous TRNGs, has exceeded NIST standards with a high min-entropy value of 0.98.
Researchers warn that the increasing use of digital agriculture could lead to serious cyber-attacks, compromising food supply and production. Complex modeling studies have identified vulnerabilities in ag-tech applications, including side-channel attacks that can exploit physical access to devices.
Researchers developed IRShield, a novel system protecting privacy in wireless communication by disguising wireless channels with random IRS configurations. The solution prevents state-of-the-art human motion detection attacks, achieving high channel obfuscation and compatibility with existing wireless infrastructures.
A new distributed learning technique, GD-SEC, reduces communication requirements in wireless architecture, improving efficiency and reducing computational cost. The method employs data compression to transmit only meaningful, usable data, enhancing the impact of machine learning while minimizing its limitations.
Kestrel 3000 Pocket Weather Meter
Kestrel 3000 Pocket Weather Meter measures wind, temperature, and humidity in real time for site assessments, aviation checks, and safety briefings.
Researchers at North Carolina State University have developed FAXID, a hardware-based approach for detecting ransomware that is significantly faster than software-based methods. In proof-of-concept testing, FAXID demonstrated accuracy comparable to XGBoost but with speeds up to 65.8 times faster.
Researchers from Rice University and Brown University demonstrate a DIY method to hack 6G frequency using office paper, inkjet printer, metallic foil transfer, and laminator. The 'metasurface-in-the-middle' attack can redirect part of a high-frequency transmission between two users, threatening the security of next-gen wireless networks.
Researchers at NYU Tandon are developing novel methods to detect and mitigate hardware Trojans in next-generation wireless systems, as well as exploring analog side channels unique to 5G. The projects aim to make current and future wireless infrastructure more resilient to flaws and hacks.
Researchers developed a new set of privacy-preserving tools to automatically detect and filter spam on WhatsApp. These tools can safeguard users' privacy without compromising on safety goals.
Researchers found that cloud tenants are vulnerable to receiving sensitive customer data when IP addresses are leased and released back to the public. To mitigate this risk, companies and cloud-service providers must implement practices such as preventing IP address reuse.
Aranet4 Home CO2 Monitor
Aranet4 Home CO2 Monitor tracks ventilation quality in labs, classrooms, and conference rooms with long battery life and clear e-ink readouts.
Researchers have developed a new encryption technique that leverages hardware and software to improve file system security for next-generation non-volatile memories. This approach allows for faster performance than existing software security technologies, making it suitable for large data centers and cloud systems.
Behunin's project targets challenges in practical quantum computing by controlling noise and its impact on qubits. By manipulating sound waves, he hopes to quiet the noise that corrupts information stored in quantum computers.
A new protocol called SPoTKD offers a secure way to transmit data without relying on expensive equipment or dedicated channels. Tiny microchips with self-powered clocks can create secure channels, making it possible for devices to power themselves and stay secure.
A new study offers a framework for addressing cyber security challenges in critical infrastructure by explicitly representing multiple dimensions of potential impacts. The proposed Bayesian network model allows for the identification of optimal portfolios of security measures to minimize expected cyberattack impacts.
Garmin GPSMAP 67i with inReach
Garmin GPSMAP 67i with inReach provides rugged GNSS navigation, satellite messaging, and SOS for backcountry geology and climate field teams.
Researchers at North Carolina State University identified a vulnerability in homomorphic encryption that allows data to be stolen during the encryption process. This discovery highlights the need for protection against side-channel attacks, which can compromise even next-generation encryption technologies.
Researchers developed DAGguise, a scheme that shapes memory requests into a predefined pattern to prevent contention attacks and enable faster computation. The technique represents programs' memory access requests as a graph, where each request is stored in a node, and the edges are time dependencies between requests.
KAUST researchers simulate microgrid cyberattacks to assess impact and develop detection methods. Effective methods identify anomalous conditions associated with attacks, enabling swift isolation of affected subsystems.
Eric Osterweil, George Mason University Assistant Professor, receives $40,000 funding to develop an adaptive encryption platform and threat intelligence information sharing system. The project aims to enable usable cryptographic protections for email transactions and establish a foundation for future cybersecurity efforts.
A KU researcher has received a National Science Foundation CAREER award to investigate how to boost the effectiveness of security operations centers. The goal is to create a framework that tailors automation for operational environments and reflects human involvement in the process.
Fluke 87V Industrial Digital Multimeter
Fluke 87V Industrial Digital Multimeter is a trusted meter for precise measurements during instrument integration, repairs, and field diagnostics.
Nathan Dautenhahn, a Rice University computer scientist, has received a prestigious CAREER Award to develop 'Least-Authority Virtual Architecture' (LAVA) strategy for retrofitting existing products with meaningful firewalling. This approach aims to systematically analyze and optimize security boundaries in complex systems.
The National Science Foundation's CyberCorps Scholarship for Service program will provide training and scholarships to the next generation of information technology experts and security managers. The Binghamton University partnership aims to diversify the workforce with a focus on attracting underrepresented minorities.
Researchers at George Mason University, led by Duminda Wijesekera and Vijay Shah, have received $100,000 in funding to develop a multi-cloud environment with decentralized trust management for the manufacturing industry. The goal of this project is to implement OpenStack-SDN-based PoPs across multiple cloud environments.
The European Research Council has awarded €1.5 million in grants to three Saarbrücken-based researchers. Their projects focus on artificial intelligence and cybersecurity, with aims to develop fairer machine learning algorithms and secure computing methods.
A new study has generated a massive dataset of artificial voice recordings, revealing subtle differences in high frequencies between real and fake files. The researchers developed algorithms that can distinguish between deepfakes and real speech, providing a starting point for other researchers to improve detection methods.
Nikon Monarch 5 8x42 Binoculars
Nikon Monarch 5 8x42 Binoculars deliver bright, sharp views for wildlife surveys, eclipse chases, and quick star-field scans at dark sites.
The University of Texas at El Paso has received a $4 million grant from the National Science Foundation and Department of Homeland Security to support highly qualified computer science students. The program aims to enhance the regional and national cybersecurity workforce with an emphasis on Hispanic and female students.
Researchers Wijesekera and Menon aim to address building security governance and communication issues through a uniform secure platform. The project enables energy optimization, cyber-physical security posture, and incorporation of new technologies like solar rooftops and vehicle-to-grid charging.
Researchers simulated an attack that falsified mammogram images, fooling both AI breast cancer diagnosis models and human radiologist experts. The study highlights the need to develop ways to make AI models more robust to adversarial attacks, which could lead to incorrect cancer diagnoses.
Apple Watch Series 11 (GPS, 46mm)
Apple Watch Series 11 (GPS, 46mm) tracks health metrics and safety alerts during long observing sessions, fieldwork, and remote expeditions.
The program aims to build confidence in teachers to present cybersecurity in the classroom and create opportunities for peer sharing. Teachers participating in the cohort will receive a $1,000 stipend and complete various workshops and surveys.
Researchers propose new ways to protect 3D printed objects from stealthy logic bombs, which can cause catastrophic failures. Two strategies are proposed: designing a sensor to detect changes in raw materials or using high-resolution CT images to detect residual stresses.
A new study by the University of Plymouth has demonstrated the potential of gait authentication to protect smartphones from cyber crime. The system achieved an average accuracy rate of around 85% in recognizing individuals' stride patterns, with rates rising to almost 90% when participants were walking normally and fast.
Researchers from Ruhr-University Bochum identified 14 new types of cross-site leak (XS-Leak) attacks on web browsers. XS-Leaks allow malicious websites to grab personal data by interacting with other sites in the background, with popular browsers like Chrome and Firefox vulnerable to multiple attacks.
CalDigit TS4 Thunderbolt 4 Dock
CalDigit TS4 Thunderbolt 4 Dock simplifies serious desks with 18 ports for high-speed storage, monitors, and instruments across Mac and PC setups.
A KAUST team developed an improved method for detecting malicious intrusions using deep learning, achieving accuracy rates of up to 99% in simulations of different kinds of attacks. This stacked deep learning approach promises an effective defense against cyberattacks and could prevent outages in critical infrastructure.
A team of researchers has developed a simple and efficient method of quantum encryption using single photons, which can detect any attempt to hack the message. The breakthrough brings us closer to securing our data against quantum computers' potential attacks.