During the 2020 US presidential election, researchers collected data on over 1 million online political ads. The study found that these ads often used manipulative tactics to collect personal information, including fake polls and click-bait headlines. More than 56,000 of these ads were found on conservative-leaning websites.
A new nine-state regional coalition will develop and provide hands-on training, exercises, and materials for students and professionals to protect critical infrastructure from computer attacks. The coalition aims to grow a skilled workforce in the region's rural areas.
Apple iPhone 17 Pro
Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.
A new study maps out risk factors associated with misleading information and proposes practical ways to manage them in the business world. The research aims to bridge the divide between academic research and real-world practice of cyber risk management.
Researchers have developed a federated analytics system, FAMHE, that enables healthcare providers to collaborate on statistical analyses and machine learning models without exchanging underlying datasets. The system has been proven mathematically secure and accurately reproduced published studies in multi-centric settings.
A blockchain-based system allows leader robots to signal movements and add transactions to a chain, while malicious leaders forfeit tokens when caught in a lie. This limits the spread of incorrect information and enables follower robots to eventually reach their destination.
SAMSUNG T9 Portable SSD 2TB
SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.
Researchers have developed a novel process to manufacture extreme heat-resistant carbon-carbon composites, which will be tested on a U.S. Navy rocket launching with NASA this fall. Additionally, they created a technology that more realistically emulates user activities to improve cyber testbeds and prevent cyberattacks.
Researchers aim to create a flexible security feature that learns from past cyberattacks and requires minimal human intervention. They'll collaborate with device developers to share solutions and improve future responses to attacks.
Researchers from North Carolina State University developed a software toolkit to test Apple device security, identifying a previously unknown vulnerability called iTimed. The team used this toolkit to reverse-engineer key components of Apple hardware and demonstrated the vulnerability's potential impact.
Scientists created a reliable true random number generator using atomically thin two-dimensional films, overcoming long-term stability issues and power consumption concerns. The innovation uses memristors to produce fluctuating electronic signals with an exceptionally high degree of randomness.
Apple AirPods Pro (2nd Generation, USB-C)
Apple AirPods Pro (2nd Generation, USB-C) provide clear calls and strong noise reduction for interviews, conferences, and noisy field environments.
Researchers developed a novel resilient state estimation (RSE) method for cyber-physical systems that can withstand malicious attacks and external disturbances. This allows the system to maintain its functionality even when faced with faults or attacks, making it crucial for the design of control systems.
Researchers found that students express concern about sharing personal information with exam proctoring companies, citing a lack of trust. The study recommends institutions use the minimum number of monitoring types necessary to ensure student safety and privacy.
Researchers develop hands-on labs to educate high school students about AI and cybersecurity ethics issues, aiming to increase empathy for vulnerable populations. The project uses functional near-infrared spectroscopy to assess the impact of these labs on brain regions associated with empathy.
A research team found that the GEA-1 algorithm, used in mobile phones since the 1990s, is easy to break and likely a deliberate weak encryption. The vulnerability no longer poses a significant threat to users, as most data traffic now uses more secure networks.
A new NSF-funded project will focus on developing data-driven methods and algorithms to make cyberinfrastructure more resilient against ransomware attacks. The goal is to provide actionable cyber threat intelligence to mitigate this debilitating threat.
Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C)
Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C) keeps Macs, tablets, and meters powered during extended observing runs and remote surveys.
The Shadow Figment technology uses AI-powered deception to keep attackers engaged in a pretend world, rewarding them with false signals of success while defenders learn about the attackers' methods. This creates a distraction that allows defenders to take action and protect real systems.
Researchers at the University of Göttingen are developing a method to assess IT security measures and their costs for businesses. The ProBITS project aims to evaluate the business process effects of IT security measures, taking into account operational impacts on employee productivity and flexibility.
Researchers at Ruhr-Universität Bochum discovered two new attacks that break PDF certification signatures, enabling attackers to implant malicious code and insert fake content. The team tested 26 PDF applications, with 24 of them vulnerable to at least one attack.
The NIRVANA Kai platform has been enhanced to support IPv6, allowing real-time visualization of packets and improved alert collection. This update is expected to simplify security operations in IPv6 networks.
GoPro HERO13 Black
GoPro HERO13 Black records stabilized 5.3K video for instrument deployments, field notes, and outreach, even in harsh weather and underwater conditions.
Researchers from Peter the Great St.Petersburg Polytechnic University developed a methodology for assessing cyber risks in Smart City infrastructure. The new approach analyzes asset types, threats, and risk values using a quantitative approach, demonstrating superiority over existing methods.
The NYU Tandon School of Engineering has awarded the 2021 S&K Scholarships to four outstanding NYU Cyber Fellows, including women and underrepresented group members. The scholarships will provide an additional $500 tuition scholarship towards each course for the entire Cyber Fellows program.
George Mason University professors support a partnership between U.S. Department of Homeland Security (DHS) and the university to gather incident rate data using isolation architecture. The goal is to derive technical efficiency and cost effectiveness of this approach for Federal Civilian Executive Branch.
A new artificial intelligence system, WE-FORGE, generates fake documents to protect intellectual property and make it difficult for adversaries to identify the real document. The system, designed at Dartmouth College, uses natural language processing to create believable and incorrect documents.
Apple iPad Pro 11-inch (M4)
Apple iPad Pro 11-inch (M4) runs demanding GIS, imaging, and annotation workflows on the go for surveys, briefings, and lab notebooks.
A new paper suggests that traditional deterrence strategies in cybersecurity can lead to escalation and counterproductive responses. The authors propose a more judicious approach involving selective retaliation based on improved detection and information gathering.
George Mason University will lead a $111 million public-private partnership, Cybersecurity Manufacturing Innovation Institute (CyManII), to introduce cybersecure energy-ROI and drive American manufacturers. The university's well-recognized strength in cybersecurity research positions it well to support the five-year goals of CyManII.
The Phish Scale uses a rating system to analyze message content in phishing emails, providing insights into why users click or don't click. By understanding these cues, CISOs can optimize their phishing training programs for specific target audiences and improve user preparedness against real phishing scenarios.
Researchers studied AS interdependence, peering relationships, and cybersecurity threats. They found that organisations can't control their partners' choices, increasing the attack surface. However, some connections can reduce security threats by facilitating information sharing. Education and awareness are key to improving cybersecuri...
Researchers at Ruhr-University Bochum discovered a security gap in the LTE mobile network, enabling eavesdropping on calls. The vulnerability affected 80% of radio cells across Germany, but has been fixed by manufacturers and mobile phone providers.
Aranet4 Home CO2 Monitor
Aranet4 Home CO2 Monitor tracks ventilation quality in labs, classrooms, and conference rooms with long battery life and clear e-ink readouts.
A survey by WMG, University of Warwick found that UK consumers are unconvinced about the privacy and security of smart home devices, with anxiety about potential breaches. The study suggests that businesses must address these concerns to increase consumer trust and adoption.
A £19,000 government grant will fund a project to educate the public about posting sensitive personal information on social media. The initiative aims to teach individuals how to secure their Personal Identifiable Information (PII) and make informed choices about their online presence.
A Florida Tech student discovered systemic design flaws in several internet-connected doorbell and security camera systems, allowing malicious actors to retain access to camera systems indefinitely. The vulnerabilities could lead to substantial invasions of privacy or instances of electronic stalking.
Creality K1 Max 3D Printer
Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.
Researchers successfully demonstrated the feasibility of quantum key distribution systems to enhance cybersecurity and extend range, ensuring compatibility across different vendors. This technology provides a secure solution for utilities without administrative headaches, simplifying operations.
A new cybersecurity study found that people are more likely to fall for phishing scams because they underestimate their own risk and overestimate others', despite having access to base rate information. This self-enhancement bias can lead to a false sense of security and increase vulnerability to online attacks.
A critical 'Starbleed' vulnerability in FPGA chips has been discovered, allowing attackers to gain complete control over the chips and their functionalities. The bug is integrated into the hardware and can only be removed by replacing the chips.
A team of researchers led by Gang Tan aims to create parsers that provide provable guarantees about safety and are resistant to bugs. The SPARTA system focuses on securely opening PDFs, but the goal is to apply this technology to other formats as well.
Researchers investigated how users choose their mobile phone PINs and found that six-digit PINs do not provide more security than four-digit ones. The study also showed that Apple's blacklist could be optimized and would make sense on Android devices.
AmScope B120C-5M Compound Microscope
AmScope B120C-5M Compound Microscope supports teaching labs and QA checks with LED illumination, mechanical stage, and included 5MP camera.
Professor Gregory Ditzler is developing mathematical models and algorithms to recognize patterns and identify relevant features in machine learning. His research aims to prevent security threats in autonomous vehicles and other applications.
DEEP-Dig ushers intruders into a decoy site to learn from hackers' tactics, then trains computers to recognize and stop future attacks. The approach advances deception technology, which sets traps for hackers, providing valuable data to improve cybersecurity defenses.
A Wayne State University research team will develop algorithms to detect and prevent cyberattacks on chemical process control systems, enhancing production efficiency and safety. The three-year project aims to create stronger safeguards against automation system attacks.
The University of Kansas is launching a center to improve IoT security, partnering with private firms to develop secure products and practices. The center aims to provide frameworks for companies to address IoT cybersecurity threats, with potential follow-on research on proprietary projects.
Meta Quest 3 512GB
Meta Quest 3 512GB enables immersive mission planning, terrain rehearsal, and interactive STEM demos with high-resolution mixed-reality experiences.
A new study reveals that cultural values and human behavior shape cybersecurity regulations, with competitive nations like China enforcing stricter rules than the US or UK. The Global Cybersecurity Index assesses country commitments to regulation in five areas.
The CUHK faculty developed a browser-based analysis framework, Observer, to detect three types of click interception techniques. The research found that third-party scripts intercept user clicks on popular websites, leading to malicious activities such as ad click frauds and malware downloads.
Researchers at North Carolina State University found that companies that disclose their cybersecurity risk management efforts fare better than those that don't after a breach. By implementing voluntary reporting guidelines, companies can reduce the impact of the 'contagion effect' and increase investor attractiveness.
Apple MacBook Pro 14-inch (M4 Pro)
Apple MacBook Pro 14-inch (M4 Pro) powers local ML workloads, large datasets, and multi-display analysis for field and lab teams.
Companies can mitigate risks by strengthening every vendor handling their data, according to new research from American University. High-profile breaches have shown that even strong cybersecurity measures are not enough if vendors are weak.
The University of Arizona's two-year AZSecure Cybersecurity Fellowship program will continue to train students in cybersecurity, covering tuition and fees, with a stipend of $34,000 per year. The renewal funding will help about 20 more students over the next five to seven years.
Researchers are developing a form of cybersecurity inspired by human biological systems, detecting and addressing threats in their earliest stages. The team is also offering training and research opportunities to students from underrepresented backgrounds.
Rigol DP832 Triple-Output Bench Power Supply
Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.
West Virginia University is creating 40 annual scholarships to support students in cybersecurity roles. The program aims to address the growing demand for cybersecurity experts amid escalating cyber threats and unfilled positions globally.
The University of Arkansas has received a $4.6 million award to train the next generation of cybersecurity professionals. The program will provide education and job training for students, focusing on critical industries such as transportation and energy, and addressing a national shortage of skilled cybersecurity experts.
Researchers developed an AI program called Pluribus that defeated leading professionals in six-player no-limit Texas hold'em poker. The AI uses a limited-lookahead search algorithm to develop strategies for situations with incomplete information.
The new framework helps government and industry organizations visualize their ability to out-maneuver attacks by scoring their agility. Researchers used a honeypot system to attract and analyze malicious traffic, allowing them to better understand how cyberattacks evolve over time.
Fluke 87V Industrial Digital Multimeter
Fluke 87V Industrial Digital Multimeter is a trusted meter for precise measurements during instrument integration, repairs, and field diagnostics.
The University of Texas at San Antonio (UTSA) has developed the first cyber agility framework to score the agility of cyber attackers and defenders. This framework uses a honeypot to analyze malicious traffic over time, allowing defenders to visualize how well they out-maneuver attacks.
Researchers at UBC have developed a program to improve the security of smart meters and protect against software-interference attacks. The method addresses vulnerabilities that can be carried out by an attacker with low-cost equipment, found nine types of attacks within an hour through code-level analysis.
Researchers at the US Army Research Laboratory identified a new strategy to improve cybersecurity by compressing network traffic without losing malicious activity detection capabilities. The technique stops transmitting data after a set number of messages, reducing bandwidth usage and increasing security alert reliability.
DJI Air 3 (RC-N2)
DJI Air 3 (RC-N2) captures 4K mapping passes and environmental surveys with dual cameras, long flight time, and omnidirectional obstacle sensing.
Fanny Ye aims to design methods and algorithms for automating the analysis of online underground markets. She will also develop a novel framework for cross-market user identification and profiling to gain insights into cybercriminal social networks and secure cyberspace.
Researchers developed the free software 'CoinEater', which recognises and blocks crypto mining on websites without user approval. The software scans over 100,000 pages daily to detect cryptojacking and pop-up scams.
A multicenter study by Brigham and Women's Hospital found that hospital employees are susceptible to phishing attacks, with a high click rate of 14.2%, but also showed improvement in response rates with increasing campaigns and phishing awareness training.
The Goethe University co-ordinates a mega-project on cybersecurity and data protection, with a total grant of €16 million. The project aims to establish international standards in cybersecurity and boost the effectiveness of Europe's security capacities.
The University of Texas at San Antonio has developed a framework using deep neural networks to classify and detect malware. This system was recognized as the top prize winner in the AICS 2019 Challenge sponsored by Crowdstrike Foundation and MIT Lincoln Laboratory, showcasing UTSA's expertise in cybersecurity.
Davis Instruments Vantage Pro2 Weather Station
Davis Instruments Vantage Pro2 Weather Station offers research-grade local weather data for networked stations, campuses, and community observatories.
Virginia Tech has received a $3 million grant from the US Department of Energy to develop comprehensive solutions for electric vehicle charging infrastructure cybersecurity. The team will focus on mitigating threats and ensuring the reliability of EV transportation, including fast charging systems and user privacy.
A team of researchers has developed a new proactive defense technique called moving target defense (MTD) to protect computer systems from cyberattacks. MTD involves changing the IP address of computers frequently enough to confuse attackers and make it harder for them to exploit vulnerabilities.
Akatosh, a new security analysis tool, provides deeper context to existing IT infrastructure, automating the process of sorting through intrusion detection system (IDS) alerts. This reduces the time and cost required to identify the source of a security incident and neutralize threats.