Bluesky Facebook Reddit Email

What do you do if a hacker takes over your ship?

A new course at Norwegian University of Science and Technology teaches risk management and resilience in maritime digital security. Despite the importance of training, many deck officers reported uncertainty about handling cyber incidents on board.

Detecting manipulations in microchips

Researchers at Ruhr University Bochum detected deviations in 37 out of 40 chips, with a high detection rate achieved through clean room conditions and optimized algorithms. The team released their findings and analysis tools online for further study.

Apple iPhone 17 Pro

Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.

Security vulnerabilities detected in drones made by DJI

Researchers detected 16 security vulnerabilities in DJI drones, including the ability to change serial numbers, override tracking mechanisms, and crash flying drones mid-air. The DJI Mini 2, Air 2, and Mavic 3 models were found to have four severe flaws.

How digital twins could protect manufacturers from cyberattacks

A new cybersecurity framework uses digital twin technology, machine learning, and human expertise to detect cyberattacks in manufacturing processes. The framework analyzes continuous data streams from physical machines and their digital twins to identify irregularities and flag potential threats.

US Census data vulnerable to attack without enhanced privacy measures

Computer scientists designed a reconstruction attack that proves US Census data can be exposed and stolen with current privacy measures. The study demonstrates risks to individual respondents' privacy, highlighting the need for differential privacy techniques to protect sensitive information.

Kestrel 3000 Pocket Weather Meter

Kestrel 3000 Pocket Weather Meter measures wind, temperature, and humidity in real time for site assessments, aviation checks, and safety briefings.

Matrix multiplications at the speed of light

Researchers have developed a compact silicon photonic compute engine capable of computing tiled matrix multiplications at a record-high 50 GHz clock frequency. This achievement promises to contribute significantly to data center cybersecurity and enables real-time threat detection for malicious packets.

Fear can inspire remote workers to protect IT resources

A study found that remote workers are more likely to protect IT resources when faced with fear and a clear understanding of potential security threats. Employers can encourage secure behaviors by clearly communicating threats and promoting self-efficacy, and also consider integrating stewardship theory to promote a sense of collectivism.

AmScope B120C-5M Compound Microscope

AmScope B120C-5M Compound Microscope supports teaching labs and QA checks with LED illumination, mechanical stage, and included 5MP camera.

Creality K1 Max 3D Printer

Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.

A faster way to preserve privacy online

Researchers at MIT have developed a scheme for private information retrieval that is about 30 times faster than other comparable methods. The technique enables users to search an online database without revealing their query to the server, with potential applications in private communication and targeted advertising.

Simple hardware to defend microgrid attacks

Scientists at KAUST created a novel approach to secure microgrids by embedding hardware performance counters in solar inverters. This innovative solution can detect malware with over 97% accuracy using time series classifiers, providing an effective defense countermeasure for low-cost and low-complexity.

SAMSUNG T9 Portable SSD 2TB

SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.

Researchers use blockchain to increase electric grid resiliency

A team of researchers has developed a framework using blockchain technology to track device communications on the electric grid, detecting anomalies such as data manipulation and spoofing. This approach increases grid resiliency and allows for rapid response to cyberattacks or equipment failures.

Microlaser chip adds new dimensions to quantum communication

Researchers at Penn Engineering have created a chip that outstrips existing quantum communications hardware, communicating in qudits and doubling the quantum information space. The technology enables significant advances in quantum cryptography, raising the maximum secure key rate for information exchange.

Fluke 87V Industrial Digital Multimeter

Fluke 87V Industrial Digital Multimeter is a trusted meter for precise measurements during instrument integration, repairs, and field diagnostics.

Hard to crack hardware

Researchers at KAUST have developed a spintronics-based logic lock to defend chip security, which can be integrated into electronic chips to fend off malicious attacks. The design uses magnetic tunnel junctions to scramble the circuit's operation unless the correct key combination signal is supplied.

Are virtual private networks actually private?

Researchers from Arizona State University and the University of Michigan investigated the effectiveness of virtual private networks in protecting users' data. They found that traffic can still be attacked through VPN tunnels, making them vulnerable to redirection and malware attacks.

Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C)

Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C) keeps Macs, tablets, and meters powered during extended observing runs and remote surveys.

$637,000 Awarded to improve recovery of critical systems after cyber attacks

The National Centers of Academic Excellence in Cybersecurity awarded a $637,223 grant to Brajendra Panda to develop fast and accurate recovery mechanisms for critical infrastructure systems after cyber-attacks. The goal is to minimize delays and ensure continued operation of critical functions such as electricity.

Celestron NexStar 8SE Computerized Telescope

Celestron NexStar 8SE Computerized Telescope combines portable Schmidt-Cassegrain optics with GoTo pointing for outreach nights and field campaigns.

Thinking like a cyber-attacker to protect user data

MIT researchers found a vulnerable component in computer processors that can be exploited by malicious agents. They developed two mitigation strategies, including scheduling sensitive software on less vulnerable cores and reserving susceptible cores for trusted applications.

Google/Apple’s contact-tracing apps susceptible to digital attacks

Researchers found a flaw in Google/Apple's exposure notification framework that can be exploited for replay attacks, potentially causing false positive notifications and disrupting trust in the system. A patch, called GAEN+, has been developed to address this issue using coarse location data from Wi-Fi access points and cell phone towers.

‘Pulling back the curtain’ to reveal a molecular key to The Wizard of Oz

Scientists have created a durable molecular encryption key using sequence-defined polymers that can store and transport digital keys securely. They successfully decrypted a file with text from The Wonderful Wizard of Oz by extracting the key from ink in a letter, demonstrating the approach's potential for real-world applications.

Aranet4 Home CO2 Monitor

Aranet4 Home CO2 Monitor tracks ventilation quality in labs, classrooms, and conference rooms with long battery life and clear e-ink readouts.

New computing architecture protects sensitive private data

Researchers at Columbia University have developed a new verification technology for the Arm Confidential Compute Architecture, demonstrating the first formal verification of a prototype. This breakthrough enables the creation of confidential computing architectures that can protect sensitive user data.

Your brain is better at busting deepfakes than you

A study by University of Sydney neuroscientists found that people's brains can detect AI-generated fake faces with a 54% accuracy rate. However, verbal identification was only successful 37% of the time, highlighting the potential for using brain activity to flag deepfakes on digital platforms.

How daycare apps can spy on parents and children

Researchers found serious security issues in 42 daycare apps, allowing access to private photos and personal data without consent. The analysis highlights inadequate privacy policies and recommendations for guidelines and checklists to ensure compliance with data protection regulations.

Apple AirPods Pro (2nd Generation, USB-C)

Apple AirPods Pro (2nd Generation, USB-C) provide clear calls and strong noise reduction for interviews, conferences, and noisy field environments.

Sniffing out your identity with breath biometrics

A team of researchers from Kyushu University has developed an olfactory sensor capable of identifying individuals by analyzing the compounds in their breath. The system, combined with machine learning, achieved an average accuracy of over 97% in authenticating up to 20 individuals.

Stronger security for smart devices

MIT researchers demonstrate two security methods that protect analog-to-digital converters from powerful attacks, including power and electromagnetic side-channel attacks. The techniques are more efficient and less expensive than other security methods, minimizing power consumption and cost for portable smart devices.

Apple Watch Series 11 (GPS, 46mm)

Apple Watch Series 11 (GPS, 46mm) tracks health metrics and safety alerts during long observing sessions, fieldwork, and remote expeditions.

Long-lived things for the internet of things

Researchers at University of Virginia are developing long-lived sensors for the Internet of Things (IoT) to reduce maintenance costs and upgrade challenges. The goal is to create an ecosystem that enables sensors to adapt to changing environments, reducing electronic waste.

Keeping web-browsing data safe from hackers

Researchers at MIT identified a flawed analysis of website-fingerprinting attacks and developed new techniques to prevent them. They found that attackers can use machine-learning algorithms to decode signals leaked between software programs, enabling them to obtain private information.

Bluetooth signals can be used to identify and track smartphones

Researchers at UC San Diego demonstrated that Bluetooth signals can be used to track individuals' movements with high accuracy. The team developed an algorithm that estimates two values found in Bluetooth signals, providing a unique fingerprint for each device.

Radio waves for the detection of hardware tampering

Researchers develop a new method to detect hardware tampering by monitoring systems with radio waves. The technology can protect entire systems, not just individual components, and is suitable for both high-security applications and everyday problems.

Apple MacBook Pro 14-inch (M4 Pro)

Apple MacBook Pro 14-inch (M4 Pro) powers local ML workloads, large datasets, and multi-display analysis for field and lab teams.

How randomly moving electrons can improve cyber security

A team of researchers at Indian Institute of Science developed a record-breaking true random number generator (TRNG) that uses the random motion of electrons to generate secure random numbers. The device, which is more compact and faster than previous TRNGs, has exceeded NIST standards with a high min-entropy value of 0.98.

Forecast of food cyber attacks

Researchers warn that the increasing use of digital agriculture could lead to serious cyber-attacks, compromising food supply and production. Complex modeling studies have identified vulnerabilities in ag-tech applications, including side-channel attacks that can exploit physical access to devices.

New countermeasure against unwanted wireless surveillance

Researchers developed IRShield, a novel system protecting privacy in wireless communication by disguising wireless channels with random IRS configurations. The solution prevents state-of-the-art human motion detection attacks, achieving high channel obfuscation and compatibility with existing wireless infrastructures.

DJI Air 3 (RC-N2)

DJI Air 3 (RC-N2) captures 4K mapping passes and environmental surveys with dual cameras, long flight time, and omnidirectional obstacle sensing.

Accelerating the pace of machine learning

A new distributed learning technique, GD-SEC, reduces communication requirements in wireless architecture, improving efficiency and reducing computational cost. The method employs data compression to transmit only meaningful, usable data, enhancing the impact of machine learning while minimizing its limitations.

New approach allows for faster ransomware detection

Researchers at North Carolina State University have developed FAXID, a hardware-based approach for detecting ransomware that is significantly faster than software-based methods. In proof-of-concept testing, FAXID demonstrated accuracy comparable to XGBoost but with speeds up to 65.8 times faster.

Eavesdroppers can hack 6G frequency with DIY metasurface

Researchers from Rice University and Brown University demonstrate a DIY method to hack 6G frequency using office paper, inkjet printer, metallic foil transfer, and laminator. The 'metasurface-in-the-middle' attack can redirect part of a high-frequency transmission between two users, threatening the security of next-gen wireless networks.

GQ GMC-500Plus Geiger Counter

GQ GMC-500Plus Geiger Counter logs beta, gamma, and X-ray levels for environmental monitoring, training labs, and safety demonstrations.

Cloud server leasing can leave sensitive data up for grabs

Researchers found that cloud tenants are vulnerable to receiving sensitive customer data when IP addresses are leased and released back to the public. To mitigate this risk, companies and cloud-service providers must implement practices such as preventing IP address reuse.

New technique offers faster security for non-volatile memory tech

Researchers have developed a new encryption technique that leverages hardware and software to improve file system security for next-generation non-volatile memories. This approach allows for faster performance than existing software security technologies, making it suitable for large data centers and cloud systems.

CalDigit TS4 Thunderbolt 4 Dock

CalDigit TS4 Thunderbolt 4 Dock simplifies serious desks with 18 ports for high-speed storage, monitors, and instruments across Mac and PC setups.

Tiny, cheap solution for quantum-secure encryption

A new protocol called SPoTKD offers a secure way to transmit data without relying on expensive equipment or dedicated channels. Tiny microchips with self-powered clocks can create secure channels, making it possible for devices to power themselves and stay secure.

Researchers show they can steal data during homomorphic encryption

Researchers at North Carolina State University identified a vulnerability in homomorphic encryption that allows data to be stolen during the encryption process. This discovery highlights the need for protection against side-channel attacks, which can compromise even next-generation encryption technologies.

Rigol DP832 Triple-Output Bench Power Supply

Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.