The University of Houston's CYBER-CARE research center aims to prevent cyberattacks that could compromise the safe movement of people and goods in the US. The center will focus on four goals, including exploring advanced theories to mitigate the impact of large-scale cyberattacks.
A study by Pacific Northwest National Laboratory found that workers experiencing high levels of work-related distress are more likely to fall victim to phishing attacks. The researchers identified a statistically significant relationship between stress and response to simulated phishing emails, with every one-point increase in self-rep...
GoPro HERO13 Black
GoPro HERO13 Black records stabilized 5.3K video for instrument deployments, field notes, and outreach, even in harsh weather and underwater conditions.
Researchers at the University of Waterloo discovered a method to bypass voice authentication security systems with high accuracy. They found that malicious actors can generate convincing copies of a victim's voice using deepfake software, evading existing spoofing countermeasures.
Researchers developed AEGIS, the first technique to detect backdoor attacks in robust machine learning models. It improves the trustworthiness of artificial intelligence by analyzing robust models and detecting mixed input distributions for poisoned classes.
Lero is recruiting 16 world-class researchers to work on privacy, trust and inclusion in software development through the €2.9 million SyMeCo programme. The programme will attract outstanding international candidates from computer science and related fields.
Apple iPhone 17 Pro
Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.
A researcher at George Mason University is conducting threat hunting operations on large datasets of suspicious network traffic. The project aims to develop an alert system and improve incident response capabilities, with funding from the Virginia Innovation Partnership Authority.
FES2023 brings together leading researchers and industry experts to share groundbreaking research on AI-based energy solutions, smart grids, and renewable energy systems. The conference covers key themes including planning and operation of energy systems, electricity markets, and demand response.
The SEQUINS project aims to create a smart, equitable, and interoperable electrical grid in the Pacific Northwest. Over two years, it will develop plans to overcome obstacles through academic research, entrepreneurship, and workforce training.
Researchers found that many cryptocurrencies take months or years to fix severe security vulnerabilities, with some taking over three years. Bitcoin fixed a vulnerability in just seven days, while others like Litecoin and Dogecoin took 114 days and 185 days respectively.
Hospitals affected by ransomware may see increased patient loads and resource strain, impacting time-sensitive care for acute stroke patients. Targeted cyberattacks can have regional disaster implications on healthcare delivery.
DJI Air 3 (RC-N2)
DJI Air 3 (RC-N2) captures 4K mapping passes and environmental surveys with dual cameras, long flight time, and omnidirectional obstacle sensing.
Researchers at Michigan State University have been awarded a $1.2 million NSF grant to enhance the security of cellular 911 calls, which were previously found to be vulnerable to cyberattacks that could steal service and disrupt emergency calls. The team will design and implement safer practices in modern emergency communication systems.
Researchers at University of Illinois Chicago develop a method inspired by quantum physics to improve wireless device identification and protect device-to-device communication. They create a hardware encryption system using a truly random and unique digital fingerprint, making it virtually unbreakable.
A recent project at KAUST has reported multifunctional logic gates that offer users a range of hardware security advantages, including tamper protection and watermarking. The gates use spintronic devices called magnetic tunnel junctions, which can be easily switchable and obscure their layout, making them hard to reverse engineer.
Apple MacBook Pro 14-inch (M4 Pro)
Apple MacBook Pro 14-inch (M4 Pro) powers local ML workloads, large datasets, and multi-display analysis for field and lab teams.
SymTrust project aims to develop new symmetric cryptography methods based on sound security arguments, balancing efficiency and security. Researchers will study existing ciphers and conditions of cryptanalysis to set new standards in information encryption.
A new study found that repeated requests for personal data increase disclosure, despite unchanged concerns about privacy. Researchers suggest practical measures to reduce this effect and encourage mutually beneficial sharing.
A new course at Norwegian University of Science and Technology teaches risk management and resilience in maritime digital security. Despite the importance of training, many deck officers reported uncertainty about handling cyber incidents on board.
Researchers at Ruhr University Bochum detected deviations in 37 out of 40 chips, with a high detection rate achieved through clean room conditions and optimized algorithms. The team released their findings and analysis tools online for further study.
Sky-Watcher EQ6-R Pro Equatorial Mount
Sky-Watcher EQ6-R Pro Equatorial Mount provides precise tracking capacity for deep-sky imaging rigs during long astrophotography sessions.
A study found that only 8.91% of websites that obtain user consent comply correctly with GDPR regulations. Researchers used automated methods to analyze web-tracking techniques and detected nearly 7 tracking cookies per website on average.
Researchers detected 16 security vulnerabilities in DJI drones, including the ability to change serial numbers, override tracking mechanisms, and crash flying drones mid-air. The DJI Mini 2, Air 2, and Mavic 3 models were found to have four severe flaws.
Researchers at Sandia National Laboratories and Purdue University have developed a technique called moving target defense to protect against hackers taking control of military jets. This approach involves shuffling network addresses to make it difficult for attackers to access critical systems.
A new cybersecurity framework uses digital twin technology, machine learning, and human expertise to detect cyberattacks in manufacturing processes. The framework analyzes continuous data streams from physical machines and their digital twins to identify irregularities and flag potential threats.
Kestrel 3000 Pocket Weather Meter
Kestrel 3000 Pocket Weather Meter measures wind, temperature, and humidity in real time for site assessments, aviation checks, and safety briefings.
Computer scientists designed a reconstruction attack that proves US Census data can be exposed and stolen with current privacy measures. The study demonstrates risks to individual respondents' privacy, highlighting the need for differential privacy techniques to protect sensitive information.
The Heidelberg Laureate Forum Foundation offers journalist travel grants to cover the 10th HLF from September 24-29, 2023. Recipients of prestigious awards in mathematics and computer science will gather with young researchers for a week of interdisciplinary dialogue.
Researchers have developed a compact silicon photonic compute engine capable of computing tiled matrix multiplications at a record-high 50 GHz clock frequency. This achievement promises to contribute significantly to data center cybersecurity and enables real-time threat detection for malicious packets.
Dr. Sushil Jajodia is rethinking adaptive cyber defense with a focus on worst-case response time and adversary cost optimization
SAMSUNG T9 Portable SSD 2TB
SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.
A study found that remote workers are more likely to protect IT resources when faced with fear and a clear understanding of potential security threats. Employers can encourage secure behaviors by clearly communicating threats and promoting self-efficacy, and also consider integrating stewardship theory to promote a sense of collectivism.
The University of Texas at El Paso has received a $5 million grant from the National Science Foundation to provide financial support and professional development experiences to talented computer science students. The program will fund partial scholarships for 26 UTEP students and 15 EPCC students.
Oregon State University has received $4.8 million from the National Science Foundation to support a cybersecurity workforce development program, targeting underrepresented groups in the field. The program will fund scholarships for up to 29 students and provide clinical rotations with underserved agencies across the Pacific Northwest.
The RITHMS project aims to enhance police forces' and customs authorities' capabilities in tackling illicit cultural trafficking with innovative technologies. The platform will utilize Social Network Analysis to identify organized criminal networks and provide valuable information to investigators.
Researchers at MIT have developed a scheme for private information retrieval that is about 30 times faster than other comparable methods. The technique enables users to search an online database without revealing their query to the server, with potential applications in private communication and targeted advertising.
Sony Alpha a7 IV (Body Only)
Sony Alpha a7 IV (Body Only) delivers reliable low-light performance and rugged build for astrophotography, lab documentation, and field expeditions.
A team of researchers proposes an intelligent routing scheme to optimize link load balancing in software-defined networks, achieving significant performance improvements. Their algorithms outperform traditional methods, reducing maximum bandwidth by 24.6 percent in real-world topologies.
Concordia researchers identify vulnerabilities in smart inverters to cyberattacks, including reconnaissance, replay, DDoS, and Man-in-the-Middle attacks. These attacks can disrupt energy flow and create power oscillations, severely impeding microgrid functionality.
Scientists at KAUST created a novel approach to secure microgrids by embedding hardware performance counters in solar inverters. This innovative solution can detect malware with over 97% accuracy using time series classifiers, providing an effective defense countermeasure for low-cost and low-complexity.
GQ GMC-500Plus Geiger Counter
GQ GMC-500Plus Geiger Counter logs beta, gamma, and X-ray levels for environmental monitoring, training labs, and safety demonstrations.
A team of researchers has developed a framework using blockchain technology to track device communications on the electric grid, detecting anomalies such as data manipulation and spoofing. This approach increases grid resiliency and allows for rapid response to cyberattacks or equipment failures.
Researchers at Penn Engineering have created a chip that outstrips existing quantum communications hardware, communicating in qudits and doubling the quantum information space. The technology enables significant advances in quantum cryptography, raising the maximum secure key rate for information exchange.
Australian citizens are concerned about the government's and businesses' response to cyber threats, with many wanting a more active role in building digital resilience. The study found low trust in institutions and skepticism towards social media companies and tech giants.
Researchers at KAUST have developed a spintronics-based logic lock to defend chip security, which can be integrated into electronic chips to fend off malicious attacks. The design uses magnetic tunnel junctions to scramble the circuit's operation unless the correct key combination signal is supplied.
Elias Bou-Harb, UTSA cyber security professor, has received $1.5 million in grants from the National Science Foundation to research Internet of Things (IoT) security and critical infrastructure protection. The projects aim to develop algorithms to fingerprint exploited IoT devices and improve internet security on IoT devices.
Celestron NexStar 8SE Computerized Telescope
Celestron NexStar 8SE Computerized Telescope combines portable Schmidt-Cassegrain optics with GoTo pointing for outreach nights and field campaigns.
A novel AI-based malware detection and classification system has been developed for 5G-enabled Industrial Internet of Things (IIoT) systems. The system achieved an accuracy rate of 97% on benchmark datasets, enabling the secure connection of applications such as smart cities and autonomous vehicles.
A University of Groningen team created two machine learning models to predict app removal risks, achieving accuracy rates of up to 79.2%. The models can help developers avoid bans and users protect their data.
Researchers from Arizona State University and the University of Michigan investigated the effectiveness of virtual private networks in protecting users' data. They found that traffic can still be attacked through VPN tunnels, making them vulnerable to redirection and malware attacks.
The National Centers of Academic Excellence in Cybersecurity awarded a $637,223 grant to Brajendra Panda to develop fast and accurate recovery mechanisms for critical infrastructure systems after cyber-attacks. The goal is to minimize delays and ensure continued operation of critical functions such as electricity.
A University at Buffalo-led research team has been awarded a $5 million grant to develop digital tools that can help older adults recognize and protect themselves from online deceptions. The project, DART, aims to reduce online fraud among older adults, who lose billions of dollars each year due to scams.
Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C)
Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C) keeps Macs, tablets, and meters powered during extended observing runs and remote surveys.
The new initiative aims to create more equitable digital financial services, expanding access to mobile money and other services for low-income earners and marginalized communities. The Upanzi Network will leverage research and academia across the continent to develop secure and cost-effective open-source digital technologies.
MIT researchers found a vulnerable component in computer processors that can be exploited by malicious agents. They developed two mitigation strategies, including scheduling sensitive software on less vulnerable cores and reserving susceptible cores for trusted applications.
Researchers found a flaw in Google/Apple's exposure notification framework that can be exploited for replay attacks, potentially causing false positive notifications and disrupting trust in the system. A patch, called GAEN+, has been developed to address this issue using coarse location data from Wi-Fi access points and cell phone towers.
Scientists have created a durable molecular encryption key using sequence-defined polymers that can store and transport digital keys securely. They successfully decrypted a file with text from The Wonderful Wizard of Oz by extracting the key from ink in a letter, demonstrating the approach's potential for real-world applications.
Researchers at Columbia University have developed a new verification technology for the Arm Confidential Compute Architecture, demonstrating the first formal verification of a prototype. This breakthrough enables the creation of confidential computing architectures that can protect sensitive user data.
Creality K1 Max 3D Printer
Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.
Researchers developed a novel approach to detecting hidden malicious codes in websites by analyzing common attack patterns and user-side scripts. The method can identify malicious distribution patterns with high accuracy and speed, including zero-day attacks.
A study by University of Sydney neuroscientists found that people's brains can detect AI-generated fake faces with a 54% accuracy rate. However, verbal identification was only successful 37% of the time, highlighting the potential for using brain activity to flag deepfakes on digital platforms.
Researchers found serious security issues in 42 daycare apps, allowing access to private photos and personal data without consent. The analysis highlights inadequate privacy policies and recommendations for guidelines and checklists to ensure compliance with data protection regulations.
Nikon Monarch 5 8x42 Binoculars
Nikon Monarch 5 8x42 Binoculars deliver bright, sharp views for wildlife surveys, eclipse chases, and quick star-field scans at dark sites.
Researchers at Carnegie Mellon University are developing a new approach to harness the power of nanosatellites, collecting data insights while in orbit and reducing latency issues. This initiative will lay groundwork for innovative applications in fields like carbon mapping, traffic management, and precision agriculture.
A team of researchers from Kyushu University has developed an olfactory sensor capable of identifying individuals by analyzing the compounds in their breath. The system, combined with machine learning, achieved an average accuracy of over 97% in authenticating up to 20 individuals.
Researchers at Iowa State University are developing a physics-based system using artificial intelligence to improve the cybersecurity of energy delivery systems. The 'GridDeep' project aims to prevent, detect, and mitigate attacks on renewable sources sending power to the grid.
MIT researchers demonstrate two security methods that protect analog-to-digital converters from powerful attacks, including power and electromagnetic side-channel attacks. The techniques are more efficient and less expensive than other security methods, minimizing power consumption and cost for portable smart devices.
A Georgia Tech researcher argues that AI cannot replace human strategy and judgment in warfare, citing the unpredictable nature of war and the need for human sense-making and moral decision-making. The research highlights the importance of human intervention in making tactical and strategic decisions.
AmScope B120C-5M Compound Microscope
AmScope B120C-5M Compound Microscope supports teaching labs and QA checks with LED illumination, mechanical stage, and included 5MP camera.
Researchers at University of Virginia are developing long-lived sensors for the Internet of Things (IoT) to reduce maintenance costs and upgrade challenges. The goal is to create an ecosystem that enables sensors to adapt to changing environments, reducing electronic waste.
Researchers at MIT identified a flawed analysis of website-fingerprinting attacks and developed new techniques to prevent them. They found that attackers can use machine-learning algorithms to decode signals leaked between software programs, enabling them to obtain private information.
Researchers at UC San Diego demonstrated that Bluetooth signals can be used to track individuals' movements with high accuracy. The team developed an algorithm that estimates two values found in Bluetooth signals, providing a unique fingerprint for each device.
Researchers develop a new method to detect hardware tampering by monitoring systems with radio waves. The technology can protect entire systems, not just individual components, and is suitable for both high-security applications and everyday problems.