A new course at Norwegian University of Science and Technology teaches risk management and resilience in maritime digital security. Despite the importance of training, many deck officers reported uncertainty about handling cyber incidents on board.
Researchers at Ruhr University Bochum detected deviations in 37 out of 40 chips, with a high detection rate achieved through clean room conditions and optimized algorithms. The team released their findings and analysis tools online for further study.
A study found that only 8.91% of websites that obtain user consent comply correctly with GDPR regulations. Researchers used automated methods to analyze web-tracking techniques and detected nearly 7 tracking cookies per website on average.
Apple iPhone 17 Pro
Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.
Researchers detected 16 security vulnerabilities in DJI drones, including the ability to change serial numbers, override tracking mechanisms, and crash flying drones mid-air. The DJI Mini 2, Air 2, and Mavic 3 models were found to have four severe flaws.
Researchers at Sandia National Laboratories and Purdue University have developed a technique called moving target defense to protect against hackers taking control of military jets. This approach involves shuffling network addresses to make it difficult for attackers to access critical systems.
A new cybersecurity framework uses digital twin technology, machine learning, and human expertise to detect cyberattacks in manufacturing processes. The framework analyzes continuous data streams from physical machines and their digital twins to identify irregularities and flag potential threats.
Computer scientists designed a reconstruction attack that proves US Census data can be exposed and stolen with current privacy measures. The study demonstrates risks to individual respondents' privacy, highlighting the need for differential privacy techniques to protect sensitive information.
The Heidelberg Laureate Forum Foundation offers journalist travel grants to cover the 10th HLF from September 24-29, 2023. Recipients of prestigious awards in mathematics and computer science will gather with young researchers for a week of interdisciplinary dialogue.
Kestrel 3000 Pocket Weather Meter
Kestrel 3000 Pocket Weather Meter measures wind, temperature, and humidity in real time for site assessments, aviation checks, and safety briefings.
Researchers have developed a compact silicon photonic compute engine capable of computing tiled matrix multiplications at a record-high 50 GHz clock frequency. This achievement promises to contribute significantly to data center cybersecurity and enables real-time threat detection for malicious packets.
Dr. Sushil Jajodia is rethinking adaptive cyber defense with a focus on worst-case response time and adversary cost optimization
A study found that remote workers are more likely to protect IT resources when faced with fear and a clear understanding of potential security threats. Employers can encourage secure behaviors by clearly communicating threats and promoting self-efficacy, and also consider integrating stewardship theory to promote a sense of collectivism.
AmScope B120C-5M Compound Microscope
AmScope B120C-5M Compound Microscope supports teaching labs and QA checks with LED illumination, mechanical stage, and included 5MP camera.
The University of Texas at El Paso has received a $5 million grant from the National Science Foundation to provide financial support and professional development experiences to talented computer science students. The program will fund partial scholarships for 26 UTEP students and 15 EPCC students.
Oregon State University has received $4.8 million from the National Science Foundation to support a cybersecurity workforce development program, targeting underrepresented groups in the field. The program will fund scholarships for up to 29 students and provide clinical rotations with underserved agencies across the Pacific Northwest.
The RITHMS project aims to enhance police forces' and customs authorities' capabilities in tackling illicit cultural trafficking with innovative technologies. The platform will utilize Social Network Analysis to identify organized criminal networks and provide valuable information to investigators.
Creality K1 Max 3D Printer
Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.
Researchers at MIT have developed a scheme for private information retrieval that is about 30 times faster than other comparable methods. The technique enables users to search an online database without revealing their query to the server, with potential applications in private communication and targeted advertising.
A team of researchers proposes an intelligent routing scheme to optimize link load balancing in software-defined networks, achieving significant performance improvements. Their algorithms outperform traditional methods, reducing maximum bandwidth by 24.6 percent in real-world topologies.
Concordia researchers identify vulnerabilities in smart inverters to cyberattacks, including reconnaissance, replay, DDoS, and Man-in-the-Middle attacks. These attacks can disrupt energy flow and create power oscillations, severely impeding microgrid functionality.
Scientists at KAUST created a novel approach to secure microgrids by embedding hardware performance counters in solar inverters. This innovative solution can detect malware with over 97% accuracy using time series classifiers, providing an effective defense countermeasure for low-cost and low-complexity.
SAMSUNG T9 Portable SSD 2TB
SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.
A team of researchers has developed a framework using blockchain technology to track device communications on the electric grid, detecting anomalies such as data manipulation and spoofing. This approach increases grid resiliency and allows for rapid response to cyberattacks or equipment failures.
Researchers at Penn Engineering have created a chip that outstrips existing quantum communications hardware, communicating in qudits and doubling the quantum information space. The technology enables significant advances in quantum cryptography, raising the maximum secure key rate for information exchange.
Australian citizens are concerned about the government's and businesses' response to cyber threats, with many wanting a more active role in building digital resilience. The study found low trust in institutions and skepticism towards social media companies and tech giants.
Fluke 87V Industrial Digital Multimeter
Fluke 87V Industrial Digital Multimeter is a trusted meter for precise measurements during instrument integration, repairs, and field diagnostics.
Researchers at KAUST have developed a spintronics-based logic lock to defend chip security, which can be integrated into electronic chips to fend off malicious attacks. The design uses magnetic tunnel junctions to scramble the circuit's operation unless the correct key combination signal is supplied.
Elias Bou-Harb, UTSA cyber security professor, has received $1.5 million in grants from the National Science Foundation to research Internet of Things (IoT) security and critical infrastructure protection. The projects aim to develop algorithms to fingerprint exploited IoT devices and improve internet security on IoT devices.
A novel AI-based malware detection and classification system has been developed for 5G-enabled Industrial Internet of Things (IIoT) systems. The system achieved an accuracy rate of 97% on benchmark datasets, enabling the secure connection of applications such as smart cities and autonomous vehicles.
A University of Groningen team created two machine learning models to predict app removal risks, achieving accuracy rates of up to 79.2%. The models can help developers avoid bans and users protect their data.
Researchers from Arizona State University and the University of Michigan investigated the effectiveness of virtual private networks in protecting users' data. They found that traffic can still be attacked through VPN tunnels, making them vulnerable to redirection and malware attacks.
Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C)
Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C) keeps Macs, tablets, and meters powered during extended observing runs and remote surveys.
The National Centers of Academic Excellence in Cybersecurity awarded a $637,223 grant to Brajendra Panda to develop fast and accurate recovery mechanisms for critical infrastructure systems after cyber-attacks. The goal is to minimize delays and ensure continued operation of critical functions such as electricity.
A University at Buffalo-led research team has been awarded a $5 million grant to develop digital tools that can help older adults recognize and protect themselves from online deceptions. The project, DART, aims to reduce online fraud among older adults, who lose billions of dollars each year due to scams.
The new initiative aims to create more equitable digital financial services, expanding access to mobile money and other services for low-income earners and marginalized communities. The Upanzi Network will leverage research and academia across the continent to develop secure and cost-effective open-source digital technologies.
Celestron NexStar 8SE Computerized Telescope
Celestron NexStar 8SE Computerized Telescope combines portable Schmidt-Cassegrain optics with GoTo pointing for outreach nights and field campaigns.
MIT researchers found a vulnerable component in computer processors that can be exploited by malicious agents. They developed two mitigation strategies, including scheduling sensitive software on less vulnerable cores and reserving susceptible cores for trusted applications.
Researchers found a flaw in Google/Apple's exposure notification framework that can be exploited for replay attacks, potentially causing false positive notifications and disrupting trust in the system. A patch, called GAEN+, has been developed to address this issue using coarse location data from Wi-Fi access points and cell phone towers.
Scientists have created a durable molecular encryption key using sequence-defined polymers that can store and transport digital keys securely. They successfully decrypted a file with text from The Wonderful Wizard of Oz by extracting the key from ink in a letter, demonstrating the approach's potential for real-world applications.
Aranet4 Home CO2 Monitor
Aranet4 Home CO2 Monitor tracks ventilation quality in labs, classrooms, and conference rooms with long battery life and clear e-ink readouts.
Researchers at Columbia University have developed a new verification technology for the Arm Confidential Compute Architecture, demonstrating the first formal verification of a prototype. This breakthrough enables the creation of confidential computing architectures that can protect sensitive user data.
Researchers developed a novel approach to detecting hidden malicious codes in websites by analyzing common attack patterns and user-side scripts. The method can identify malicious distribution patterns with high accuracy and speed, including zero-day attacks.
A study by University of Sydney neuroscientists found that people's brains can detect AI-generated fake faces with a 54% accuracy rate. However, verbal identification was only successful 37% of the time, highlighting the potential for using brain activity to flag deepfakes on digital platforms.
Researchers found serious security issues in 42 daycare apps, allowing access to private photos and personal data without consent. The analysis highlights inadequate privacy policies and recommendations for guidelines and checklists to ensure compliance with data protection regulations.
Researchers at Carnegie Mellon University are developing a new approach to harness the power of nanosatellites, collecting data insights while in orbit and reducing latency issues. This initiative will lay groundwork for innovative applications in fields like carbon mapping, traffic management, and precision agriculture.
Apple AirPods Pro (2nd Generation, USB-C)
Apple AirPods Pro (2nd Generation, USB-C) provide clear calls and strong noise reduction for interviews, conferences, and noisy field environments.
A team of researchers from Kyushu University has developed an olfactory sensor capable of identifying individuals by analyzing the compounds in their breath. The system, combined with machine learning, achieved an average accuracy of over 97% in authenticating up to 20 individuals.
Researchers at Iowa State University are developing a physics-based system using artificial intelligence to improve the cybersecurity of energy delivery systems. The 'GridDeep' project aims to prevent, detect, and mitigate attacks on renewable sources sending power to the grid.
A Georgia Tech researcher argues that AI cannot replace human strategy and judgment in warfare, citing the unpredictable nature of war and the need for human sense-making and moral decision-making. The research highlights the importance of human intervention in making tactical and strategic decisions.
MIT researchers demonstrate two security methods that protect analog-to-digital converters from powerful attacks, including power and electromagnetic side-channel attacks. The techniques are more efficient and less expensive than other security methods, minimizing power consumption and cost for portable smart devices.
Apple Watch Series 11 (GPS, 46mm)
Apple Watch Series 11 (GPS, 46mm) tracks health metrics and safety alerts during long observing sessions, fieldwork, and remote expeditions.
Researchers at University of Virginia are developing long-lived sensors for the Internet of Things (IoT) to reduce maintenance costs and upgrade challenges. The goal is to create an ecosystem that enables sensors to adapt to changing environments, reducing electronic waste.
Researchers at MIT identified a flawed analysis of website-fingerprinting attacks and developed new techniques to prevent them. They found that attackers can use machine-learning algorithms to decode signals leaked between software programs, enabling them to obtain private information.
Researchers at UC San Diego demonstrated that Bluetooth signals can be used to track individuals' movements with high accuracy. The team developed an algorithm that estimates two values found in Bluetooth signals, providing a unique fingerprint for each device.
Researchers develop a new method to detect hardware tampering by monitoring systems with radio waves. The technology can protect entire systems, not just individual components, and is suitable for both high-security applications and everyday problems.
Apple MacBook Pro 14-inch (M4 Pro)
Apple MacBook Pro 14-inch (M4 Pro) powers local ML workloads, large datasets, and multi-display analysis for field and lab teams.
The University of Jyväskylä's SAFE Project aims to replace insecure passwords with a more secure authentication method. The project, funded by Business Finland, has global market potential and promises seamless access to all systems worldwide.
A new research proposes a cloud model-based LDoS attack detection method with lower false positive and false negative rates, verified through NS2 simulation platform testing
A team of researchers at Indian Institute of Science developed a record-breaking true random number generator (TRNG) that uses the random motion of electrons to generate secure random numbers. The device, which is more compact and faster than previous TRNGs, has exceeded NIST standards with a high min-entropy value of 0.98.
Researchers warn that the increasing use of digital agriculture could lead to serious cyber-attacks, compromising food supply and production. Complex modeling studies have identified vulnerabilities in ag-tech applications, including side-channel attacks that can exploit physical access to devices.
Researchers developed IRShield, a novel system protecting privacy in wireless communication by disguising wireless channels with random IRS configurations. The solution prevents state-of-the-art human motion detection attacks, achieving high channel obfuscation and compatibility with existing wireless infrastructures.
DJI Air 3 (RC-N2)
DJI Air 3 (RC-N2) captures 4K mapping passes and environmental surveys with dual cameras, long flight time, and omnidirectional obstacle sensing.
A new distributed learning technique, GD-SEC, reduces communication requirements in wireless architecture, improving efficiency and reducing computational cost. The method employs data compression to transmit only meaningful, usable data, enhancing the impact of machine learning while minimizing its limitations.
Researchers at North Carolina State University have developed FAXID, a hardware-based approach for detecting ransomware that is significantly faster than software-based methods. In proof-of-concept testing, FAXID demonstrated accuracy comparable to XGBoost but with speeds up to 65.8 times faster.
Researchers from Rice University and Brown University demonstrate a DIY method to hack 6G frequency using office paper, inkjet printer, metallic foil transfer, and laminator. The 'metasurface-in-the-middle' attack can redirect part of a high-frequency transmission between two users, threatening the security of next-gen wireless networks.
Researchers at NYU Tandon are developing novel methods to detect and mitigate hardware Trojans in next-generation wireless systems, as well as exploring analog side channels unique to 5G. The projects aim to make current and future wireless infrastructure more resilient to flaws and hacks.
GQ GMC-500Plus Geiger Counter
GQ GMC-500Plus Geiger Counter logs beta, gamma, and X-ray levels for environmental monitoring, training labs, and safety demonstrations.
Researchers developed a new set of privacy-preserving tools to automatically detect and filter spam on WhatsApp. These tools can safeguard users' privacy without compromising on safety goals.
Researchers found that cloud tenants are vulnerable to receiving sensitive customer data when IP addresses are leased and released back to the public. To mitigate this risk, companies and cloud-service providers must implement practices such as preventing IP address reuse.
Researchers have developed a new encryption technique that leverages hardware and software to improve file system security for next-generation non-volatile memories. This approach allows for faster performance than existing software security technologies, making it suitable for large data centers and cloud systems.
CalDigit TS4 Thunderbolt 4 Dock
CalDigit TS4 Thunderbolt 4 Dock simplifies serious desks with 18 ports for high-speed storage, monitors, and instruments across Mac and PC setups.
Behunin's project targets challenges in practical quantum computing by controlling noise and its impact on qubits. By manipulating sound waves, he hopes to quiet the noise that corrupts information stored in quantum computers.
A new protocol called SPoTKD offers a secure way to transmit data without relying on expensive equipment or dedicated channels. Tiny microchips with self-powered clocks can create secure channels, making it possible for devices to power themselves and stay secure.
Researchers at North Carolina State University identified a vulnerability in homomorphic encryption that allows data to be stolen during the encryption process. This discovery highlights the need for protection against side-channel attacks, which can compromise even next-generation encryption technologies.
Rigol DP832 Triple-Output Bench Power Supply
Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.