Bluesky Facebook Reddit Email

Researchers show they can steal data during homomorphic encryption

Researchers at North Carolina State University identified a vulnerability in homomorphic encryption that allows data to be stolen during the encryption process. This discovery highlights the need for protection against side-channel attacks, which can compromise even next-generation encryption technologies.

A security technique to fool would-be cyber attackers

Researchers developed DAGguise, a scheme that shapes memory requests into a predefined pattern to prevent contention attacks and enable faster computation. The technique represents programs' memory access requests as a graph, where each request is stored in a node, and the edges are time dependencies between requests.

Apple AirPods Pro (2nd Generation, USB-C)

Apple AirPods Pro (2nd Generation, USB-C) provide clear calls and strong noise reduction for interviews, conferences, and noisy field environments.

Nathan Dautenhahn wins CAREER Award

Nathan Dautenhahn, a Rice University computer scientist, has received a prestigious CAREER Award to develop 'Least-Authority Virtual Architecture' (LAVA) strategy for retrofitting existing products with meaningful firewalling. This approach aims to systematically analyze and optimize security boundaries in complex systems.

$3.5 million NSF grant to fund 24 cybersecurity scholarships

The National Science Foundation's CyberCorps Scholarship for Service program will provide training and scholarships to the next generation of information technology experts and security managers. The Binghamton University partnership aims to diversify the workforce with a focus on attracting underrepresented minorities.

Nikon Monarch 5 8x42 Binoculars

Nikon Monarch 5 8x42 Binoculars deliver bright, sharp views for wildlife surveys, eclipse chases, and quick star-field scans at dark sites.

UTEP to advance cybersecurity talent pipeline with $4M grant

The University of Texas at El Paso has received a $4 million grant from the National Science Foundation and Department of Homeland Security to support highly qualified computer science students. The program aims to enhance the regional and national cybersecurity workforce with an emphasis on Hispanic and female students.

SAMSUNG T9 Portable SSD 2TB

SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.

Identifying fake voice recordings

A new study has generated a massive dataset of artificial voice recordings, revealing subtle differences in high frequencies between real and fake files. The researchers developed algorithms that can distinguish between deepfakes and real speech, providing a starting point for other researchers to improve detection methods.

Apple iPhone 17 Pro

Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.

Researchers unveil new cyber protections against “logic bombs”

Researchers propose new ways to protect 3D printed objects from stealthy logic bombs, which can cause catastrophic failures. Two strategies are proposed: designing a sensor to detect changes in raw materials or using high-resolution CT images to detect residual stresses.

14 new attacks on web browsers detected

Researchers from Ruhr-University Bochum identified 14 new types of cross-site leak (XS-Leak) attacks on web browsers. XS-Leaks allow malicious websites to grab personal data by interacting with other sites in the background, with popular browsers like Chrome and Firefox vulnerable to multiple attacks.

Deeper defense against cyber attacks

A KAUST team developed an improved method for detecting malicious intrusions using deep learning, achieving accuracy rates of up to 99% in simulations of different kinds of attacks. This stacked deep learning approach promises an effective defense against cyberattacks and could prevent outages in critical infrastructure.

Rigol DP832 Triple-Output Bench Power Supply

Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.

Apple iPad Pro 11-inch (M4)

Apple iPad Pro 11-inch (M4) runs demanding GIS, imaging, and annotation workflows on the go for surveys, briefings, and lab notebooks.

A cryptography game-changer for biomedical research at scale

Researchers have developed a federated analytics system, FAMHE, that enables healthcare providers to collaborate on statistical analyses and machine learning models without exchanging underlying datasets. The system has been proven mathematically secure and accurately reproduced published studies in multi-centric settings.

Apple Watch Series 11 (GPS, 46mm)

Apple Watch Series 11 (GPS, 46mm) tracks health metrics and safety alerts during long observing sessions, fieldwork, and remote expeditions.

Designing ‘smart’ security for smart devices

Researchers aim to create a flexible security feature that learns from past cyberattacks and requires minimal human intervention. They'll collaborate with device developers to share solutions and improve future responses to attacks.

Researchers develop toolkit to test apple security, find vulnerability

Researchers from North Carolina State University developed a software toolkit to test Apple device security, identifying a previously unknown vulnerability called iTimed. The team used this toolkit to reverse-engineer key components of Apple hardware and demonstrated the vulnerability's potential impact.

Keeping it random

Scientists created a reliable true random number generator using atomically thin two-dimensional films, overcoming long-term stability issues and power consumption concerns. The innovation uses memristors to produce fluctuating electronic signals with an exceptionally high degree of randomness.

Creality K1 Max 3D Printer

Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.

Garmin GPSMAP 67i with inReach

Garmin GPSMAP 67i with inReach provides rugged GNSS navigation, satellite messaging, and SOS for backcountry geology and climate field teams.

A backdoor in mobile phone encryption from the 90s still exists

A research team found that the GEA-1 algorithm, used in mobile phones since the 1990s, is easy to break and likely a deliberate weak encryption. The vulnerability no longer poses a significant threat to users, as most data traffic now uses more secure networks.

Kestrel 3000 Pocket Weather Meter

Kestrel 3000 Pocket Weather Meter measures wind, temperature, and humidity in real time for site assessments, aviation checks, and safety briefings.

What is the true cost to companies of IT security?

Researchers at the University of Göttingen are developing a method to assess IT security measures and their costs for businesses. The ProBITS project aims to evaluate the business process effects of IT security measures, taking into account operational impacts on employee productivity and flexibility.

Two new attacks break PDF certification

Researchers at Ruhr-Universität Bochum discovered two new attacks that break PDF certification signatures, enabling attackers to implant malicious code and insert fake content. The team tested 26 PDF applications, with 24 of them vulnerable to at least one attack.

Scientists will protect the "Smart City" from cyber threats

Researchers from Peter the Great St.Petersburg Polytechnic University developed a methodology for assessing cyber risks in Smart City infrastructure. The new approach analyzes asset types, threats, and risk values using a quantitative approach, demonstrating superiority over existing methods.

DJI Air 3 (RC-N2)

DJI Air 3 (RC-N2) captures 4K mapping passes and environmental surveys with dual cameras, long flight time, and omnidirectional obstacle sensing.

NYU Tandon announces 2021 S&K scholarship recipients

The NYU Tandon School of Engineering has awarded the 2021 S&K Scholarships to four outstanding NYU Cyber Fellows, including women and underrepresented group members. The scholarships will provide an additional $500 tuition scholarship towards each course for the entire Cyber Fellows program.

Cybersecurity researchers build a better 'canary trap'

A new artificial intelligence system, WE-FORGE, generates fake documents to protect intellectual property and make it difficult for adversaries to identify the real document. The system, designed at Dartmouth College, uses natural language processing to create believable and incorrect documents.

Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C)

Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C) keeps Macs, tablets, and meters powered during extended observing runs and remote surveys.

A better kind of cybersecurity strategy

A new paper suggests that traditional deterrence strategies in cybersecurity can lead to escalation and counterproductive responses. The authors propose a more judicious approach involving selective retaliation based on improved detection and information gathering.

Fluke 87V Industrial Digital Multimeter

Fluke 87V Industrial Digital Multimeter is a trusted meter for precise measurements during instrument integration, repairs, and field diagnostics.

Securing the internet

Researchers studied AS interdependence, peering relationships, and cybersecurity threats. They found that organisations can't control their partners' choices, increasing the attack surface. However, some connections can reduce security threats by facilitating information sharing. Education and awareness are key to improving cybersecuri...

Security gap allows eavesdropping on mobile phone calls

Researchers at Ruhr-University Bochum discovered a security gap in the LTE mobile network, enabling eavesdropping on calls. The vulnerability affected 80% of radio cells across Germany, but has been fixed by manufacturers and mobile phone providers.

Consumers don't fully trust smart home technologies

A survey by WMG, University of Warwick found that UK consumers are unconvinced about the privacy and security of smart home devices, with anxiety about potential breaches. The study suggests that businesses must address these concerns to increase consumer trust and adoption.

Apple MacBook Pro 14-inch (M4 Pro)

Apple MacBook Pro 14-inch (M4 Pro) powers local ML workloads, large datasets, and multi-display analysis for field and lab teams.

ORNL, LANL-developed quantum technologies go the distance

Researchers successfully demonstrated the feasibility of quantum key distribution systems to enhance cybersecurity and extend range, ensuring compatibility across different vendors. This technology provides a secure solution for utilities without administrative headaches, simplifying operations.

We believe we're less likely than others are to fall for online scams

A new cybersecurity study found that people are more likely to fall for phishing scams because they underestimate their own risk and overestimate others', despite having access to base rate information. This self-enhancement bias can lead to a false sense of security and increase vulnerability to online attacks.

Critical 'starbleed' vulnerability in FPGA chips identified

A critical 'Starbleed' vulnerability in FPGA chips has been discovered, allowing attackers to gain complete control over the chips and their functionalities. The bug is integrated into the hardware and can only be removed by replacing the chips.

AmScope B120C-5M Compound Microscope

AmScope B120C-5M Compound Microscope supports teaching labs and QA checks with LED illumination, mechanical stage, and included 5MP camera.

How secure are four and six-digit mobile phone PINs?

Researchers investigated how users choose their mobile phone PINs and found that six-digit PINs do not provide more security than four-digit ones. The study also showed that Apple's blacklist could be optimized and would make sense on Android devices.

Aranet4 Home CO2 Monitor

Aranet4 Home CO2 Monitor tracks ventilation quality in labs, classrooms, and conference rooms with long battery life and clear e-ink readouts.

Research center planned to help companies protect 'Internet of Things'

The University of Kansas is launching a center to improve IoT security, partnering with private firms to develop secure products and practices. The center aims to provide frameworks for companies to address IoT cybersecurity threats, with potential follow-on research on proprietary projects.