Bluesky Facebook Reddit Email

Leading the way to cyber safety on roads and highways

The University of Houston's CYBER-CARE research center aims to prevent cyberattacks that could compromise the safe movement of people and goods in the US. The center will focus on four goals, including exploring advanced theories to mitigate the impact of large-scale cyberattacks.

Stressed for a bit? Then don’t click it, cybersecurity experts advise

A study by Pacific Northwest National Laboratory found that workers experiencing high levels of work-related distress are more likely to fall victim to phishing attacks. The researchers identified a statistically significant relationship between stress and response to simulated phishing emails, with every one-point increase in self-rep...

GoPro HERO13 Black

GoPro HERO13 Black records stabilized 5.3K video for instrument deployments, field notes, and outreach, even in harsh weather and underwater conditions.

How secure are voice authentication systems really?

Researchers at the University of Waterloo discovered a method to bypass voice authentication security systems with high accuracy. They found that malicious actors can generate convincing copies of a victim's voice using deepfake software, evading existing spoofing countermeasures.

Apple iPhone 17 Pro

Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.

Gebril hunting threats in computer network traffic

A researcher at George Mason University is conducting threat hunting operations on large datasets of suspicious network traffic. The project aims to develop an alert system and improve incident response capabilities, with funding from the Virginia Innovation Partnership Authority.

DJI Air 3 (RC-N2)

DJI Air 3 (RC-N2) captures 4K mapping passes and environmental surveys with dual cameras, long flight time, and omnidirectional obstacle sensing.

Using quantum physics to secure wireless devices

Researchers at University of Illinois Chicago develop a method inspired by quantum physics to improve wireless device identification and protect device-to-device communication. They create a hardware encryption system using a truly random and unique digital fingerprint, making it virtually unbreakable.

Simulating a secure future

A recent project at KAUST has reported multifunctional logic gates that offer users a range of hardware security advantages, including tamper protection and watermarking. The gates use spintronic devices called magnetic tunnel junctions, which can be easily switchable and obscure their layout, making them hard to reverse engineer.

Apple MacBook Pro 14-inch (M4 Pro)

Apple MacBook Pro 14-inch (M4 Pro) powers local ML workloads, large datasets, and multi-display analysis for field and lab teams.

A fresh approach to new and secure encryption

SymTrust project aims to develop new symmetric cryptography methods based on sound security arguments, balancing efficiency and security. Researchers will study existing ciphers and conditions of cryptanalysis to set new standards in information encryption.

What do you do if a hacker takes over your ship?

A new course at Norwegian University of Science and Technology teaches risk management and resilience in maritime digital security. Despite the importance of training, many deck officers reported uncertainty about handling cyber incidents on board.

Detecting manipulations in microchips

Researchers at Ruhr University Bochum detected deviations in 37 out of 40 chips, with a high detection rate achieved through clean room conditions and optimized algorithms. The team released their findings and analysis tools online for further study.

Sky-Watcher EQ6-R Pro Equatorial Mount

Sky-Watcher EQ6-R Pro Equatorial Mount provides precise tracking capacity for deep-sky imaging rigs during long astrophotography sessions.

Security vulnerabilities detected in drones made by DJI

Researchers detected 16 security vulnerabilities in DJI drones, including the ability to change serial numbers, override tracking mechanisms, and crash flying drones mid-air. The DJI Mini 2, Air 2, and Mavic 3 models were found to have four severe flaws.

How digital twins could protect manufacturers from cyberattacks

A new cybersecurity framework uses digital twin technology, machine learning, and human expertise to detect cyberattacks in manufacturing processes. The framework analyzes continuous data streams from physical machines and their digital twins to identify irregularities and flag potential threats.

Kestrel 3000 Pocket Weather Meter

Kestrel 3000 Pocket Weather Meter measures wind, temperature, and humidity in real time for site assessments, aviation checks, and safety briefings.

US Census data vulnerable to attack without enhanced privacy measures

Computer scientists designed a reconstruction attack that proves US Census data can be exposed and stolen with current privacy measures. The study demonstrates risks to individual respondents' privacy, highlighting the need for differential privacy techniques to protect sensitive information.

Matrix multiplications at the speed of light

Researchers have developed a compact silicon photonic compute engine capable of computing tiled matrix multiplications at a record-high 50 GHz clock frequency. This achievement promises to contribute significantly to data center cybersecurity and enables real-time threat detection for malicious packets.

SAMSUNG T9 Portable SSD 2TB

SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.

Fear can inspire remote workers to protect IT resources

A study found that remote workers are more likely to protect IT resources when faced with fear and a clear understanding of potential security threats. Employers can encourage secure behaviors by clearly communicating threats and promoting self-efficacy, and also consider integrating stewardship theory to promote a sense of collectivism.

A faster way to preserve privacy online

Researchers at MIT have developed a scheme for private information retrieval that is about 30 times faster than other comparable methods. The technique enables users to search an online database without revealing their query to the server, with potential applications in private communication and targeted advertising.

Sony Alpha a7 IV (Body Only)

Sony Alpha a7 IV (Body Only) delivers reliable low-light performance and rugged build for astrophotography, lab documentation, and field expeditions.

Simple hardware to defend microgrid attacks

Scientists at KAUST created a novel approach to secure microgrids by embedding hardware performance counters in solar inverters. This innovative solution can detect malware with over 97% accuracy using time series classifiers, providing an effective defense countermeasure for low-cost and low-complexity.

GQ GMC-500Plus Geiger Counter

GQ GMC-500Plus Geiger Counter logs beta, gamma, and X-ray levels for environmental monitoring, training labs, and safety demonstrations.

Researchers use blockchain to increase electric grid resiliency

A team of researchers has developed a framework using blockchain technology to track device communications on the electric grid, detecting anomalies such as data manipulation and spoofing. This approach increases grid resiliency and allows for rapid response to cyberattacks or equipment failures.

Microlaser chip adds new dimensions to quantum communication

Researchers at Penn Engineering have created a chip that outstrips existing quantum communications hardware, communicating in qudits and doubling the quantum information space. The technology enables significant advances in quantum cryptography, raising the maximum secure key rate for information exchange.

Hard to crack hardware

Researchers at KAUST have developed a spintronics-based logic lock to defend chip security, which can be integrated into electronic chips to fend off malicious attacks. The design uses magnetic tunnel junctions to scramble the circuit's operation unless the correct key combination signal is supplied.

Celestron NexStar 8SE Computerized Telescope

Celestron NexStar 8SE Computerized Telescope combines portable Schmidt-Cassegrain optics with GoTo pointing for outreach nights and field campaigns.

Are virtual private networks actually private?

Researchers from Arizona State University and the University of Michigan investigated the effectiveness of virtual private networks in protecting users' data. They found that traffic can still be attacked through VPN tunnels, making them vulnerable to redirection and malware attacks.

$637,000 Awarded to improve recovery of critical systems after cyber attacks

The National Centers of Academic Excellence in Cybersecurity awarded a $637,223 grant to Brajendra Panda to develop fast and accurate recovery mechanisms for critical infrastructure systems after cyber-attacks. The goal is to minimize delays and ensure continued operation of critical functions such as electricity.

Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C)

Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C) keeps Macs, tablets, and meters powered during extended observing runs and remote surveys.

Thinking like a cyber-attacker to protect user data

MIT researchers found a vulnerable component in computer processors that can be exploited by malicious agents. They developed two mitigation strategies, including scheduling sensitive software on less vulnerable cores and reserving susceptible cores for trusted applications.

Google/Apple’s contact-tracing apps susceptible to digital attacks

Researchers found a flaw in Google/Apple's exposure notification framework that can be exploited for replay attacks, potentially causing false positive notifications and disrupting trust in the system. A patch, called GAEN+, has been developed to address this issue using coarse location data from Wi-Fi access points and cell phone towers.

‘Pulling back the curtain’ to reveal a molecular key to The Wizard of Oz

Scientists have created a durable molecular encryption key using sequence-defined polymers that can store and transport digital keys securely. They successfully decrypted a file with text from The Wonderful Wizard of Oz by extracting the key from ink in a letter, demonstrating the approach's potential for real-world applications.

New computing architecture protects sensitive private data

Researchers at Columbia University have developed a new verification technology for the Arm Confidential Compute Architecture, demonstrating the first formal verification of a prototype. This breakthrough enables the creation of confidential computing architectures that can protect sensitive user data.

Creality K1 Max 3D Printer

Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.

Your brain is better at busting deepfakes than you

A study by University of Sydney neuroscientists found that people's brains can detect AI-generated fake faces with a 54% accuracy rate. However, verbal identification was only successful 37% of the time, highlighting the potential for using brain activity to flag deepfakes on digital platforms.

How daycare apps can spy on parents and children

Researchers found serious security issues in 42 daycare apps, allowing access to private photos and personal data without consent. The analysis highlights inadequate privacy policies and recommendations for guidelines and checklists to ensure compliance with data protection regulations.

Nikon Monarch 5 8x42 Binoculars

Nikon Monarch 5 8x42 Binoculars deliver bright, sharp views for wildlife surveys, eclipse chases, and quick star-field scans at dark sites.

Sniffing out your identity with breath biometrics

A team of researchers from Kyushu University has developed an olfactory sensor capable of identifying individuals by analyzing the compounds in their breath. The system, combined with machine learning, achieved an average accuracy of over 97% in authenticating up to 20 individuals.

Stronger security for smart devices

MIT researchers demonstrate two security methods that protect analog-to-digital converters from powerful attacks, including power and electromagnetic side-channel attacks. The techniques are more efficient and less expensive than other security methods, minimizing power consumption and cost for portable smart devices.

AmScope B120C-5M Compound Microscope

AmScope B120C-5M Compound Microscope supports teaching labs and QA checks with LED illumination, mechanical stage, and included 5MP camera.

Long-lived things for the internet of things

Researchers at University of Virginia are developing long-lived sensors for the Internet of Things (IoT) to reduce maintenance costs and upgrade challenges. The goal is to create an ecosystem that enables sensors to adapt to changing environments, reducing electronic waste.

Keeping web-browsing data safe from hackers

Researchers at MIT identified a flawed analysis of website-fingerprinting attacks and developed new techniques to prevent them. They found that attackers can use machine-learning algorithms to decode signals leaked between software programs, enabling them to obtain private information.

Bluetooth signals can be used to identify and track smartphones

Researchers at UC San Diego demonstrated that Bluetooth signals can be used to track individuals' movements with high accuracy. The team developed an algorithm that estimates two values found in Bluetooth signals, providing a unique fingerprint for each device.

Radio waves for the detection of hardware tampering

Researchers develop a new method to detect hardware tampering by monitoring systems with radio waves. The technology can protect entire systems, not just individual components, and is suitable for both high-security applications and everyday problems.