Bluesky Facebook Reddit Email

Life Sciences

Comprehensive exploration of living organisms, biological systems, and life processes across all scales from molecules to ecosystems. Encompasses cutting-edge research in biology, genetics, molecular biology, ecology, biochemistry, microbiology, botany, zoology, evolutionary biology, genomics, and biotechnology. Investigates cellular mechanisms, organism development, genetic inheritance, biodiversity conservation, metabolic processes, protein synthesis, DNA sequencing, CRISPR gene editing, stem cell research, and the fundamental principles governing all forms of life on Earth.

447,757 articles | 2542 topics

Health and Medicine

Comprehensive medical research, clinical studies, and healthcare sciences focused on disease prevention, diagnosis, and treatment. Encompasses clinical medicine, public health, pharmacology, epidemiology, medical specialties, disease mechanisms, therapeutic interventions, healthcare innovation, precision medicine, telemedicine, medical devices, drug development, clinical trials, patient care, mental health, nutrition science, health policy, and the application of medical science to improve human health, wellbeing, and quality of life across diverse populations.

431,843 articles | 751 topics

Social Sciences

Comprehensive investigation of human society, behavior, relationships, and social structures through systematic research and analysis. Encompasses psychology, sociology, anthropology, economics, political science, linguistics, education, demography, communications, and social research methodologies. Examines human cognition, social interactions, cultural phenomena, economic systems, political institutions, language and communication, educational processes, population dynamics, and the complex social, cultural, economic, and political forces shaping human societies, communities, and civilizations throughout history and across the contemporary world.

260,756 articles | 745 topics

Physical Sciences

Fundamental study of the non-living natural world, matter, energy, and physical phenomena governing the universe. Encompasses physics, chemistry, earth sciences, atmospheric sciences, oceanography, materials science, and the investigation of physical laws, chemical reactions, geological processes, climate systems, and planetary dynamics. Explores everything from subatomic particles and quantum mechanics to planetary systems and cosmic phenomena, including energy transformations, molecular interactions, elemental properties, weather patterns, tectonic activity, and the fundamental forces and principles underlying the physical nature of reality.

257,913 articles | 1552 topics

Applied Sciences and Engineering

Practical application of scientific knowledge and engineering principles to solve real-world problems and develop innovative technologies. Encompasses all engineering disciplines, technology development, computer science, artificial intelligence, environmental sciences, agriculture, materials applications, energy systems, and industrial innovation. Bridges theoretical research with tangible solutions for infrastructure, manufacturing, computing, communications, transportation, construction, sustainable development, and emerging technologies that advance human capabilities, improve quality of life, and address societal challenges through scientific innovation and technological progress.

225,386 articles | 998 topics

Scientific Community

Study of the practice, culture, infrastructure, and social dimensions of science itself. Addresses how science is conducted, organized, communicated, and integrated into society. Encompasses research funding mechanisms, scientific publishing systems, peer review processes, academic ethics, science policy, research institutions, scientific collaboration networks, science education, career development, research programs, scientific methods, science communication, and the sociology of scientific discovery. Examines the human, institutional, and cultural aspects of scientific enterprise, knowledge production, and the translation of research into societal benefit.

193,043 articles | 157 topics

Space Sciences

Comprehensive study of the universe beyond Earth, encompassing celestial objects, cosmic phenomena, and space exploration. Includes astronomy, astrophysics, planetary science, cosmology, space physics, astrobiology, and space technology. Investigates stars, galaxies, planets, moons, asteroids, comets, black holes, nebulae, exoplanets, dark matter, dark energy, cosmic microwave background, stellar evolution, planetary formation, space weather, solar system dynamics, the search for extraterrestrial life, and humanity's efforts to explore, understand, and unlock the mysteries of the cosmos through observation, theory, and space missions.

29,662 articles | 175 topics

Research Methods

Comprehensive examination of tools, techniques, methodologies, and approaches used across scientific disciplines to conduct research, collect data, and analyze results. Encompasses experimental procedures, analytical methods, measurement techniques, instrumentation, imaging technologies, spectroscopic methods, laboratory protocols, observational studies, statistical analysis, computational methods, data visualization, quality control, and methodological innovations. Addresses the practical techniques and theoretical frameworks enabling scientists to investigate phenomena, test hypotheses, gather evidence, ensure reproducibility, and generate reliable knowledge through systematic, rigorous investigation across all areas of scientific inquiry.

21,889 articles | 139 topics

Mathematics

Study of abstract structures, patterns, quantities, relationships, and logical reasoning through pure and applied mathematical disciplines. Encompasses algebra, calculus, geometry, topology, number theory, analysis, discrete mathematics, mathematical logic, set theory, probability, statistics, and computational mathematics. Investigates mathematical structures, theorems, proofs, algorithms, functions, equations, and the rigorous logical frameworks underlying quantitative reasoning. Provides the foundational language and tools for all scientific fields, enabling precise description of natural phenomena, modeling of complex systems, and the development of technologies across physics, engineering, computer science, economics, and all quantitative sciences.

3,023 articles | 113 topics

Security gaps identified in Internet protocol 'IPsec'

Researchers at Ruhr-University Bochum discovered vulnerabilities in IPsec's IKEv1 protocol, which enable attackers to intercept specific information. The Bleichenbacher attack was successful against four network equipment providers, prompting manufacturers to eliminate security gaps.

Apple iPhone 17 Pro

Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.

Claiming credit for cyberattacks

The study finds that both state and non-state actors face similar decisions when it comes to claiming credit for cyberattacks, but their strategies diverge due to different optics. The researchers highlight the importance of understanding how attackers' motives and identity can be revealed through credit claims.

Email encryption standards hacked

Researchers demonstrated that two common email encryption standards are vulnerable to attacks, compromising secure communication. The S/MIME standard is not suitable for secure communication due to outdated cryptography, while OpenPGP can be configured securely but often isn't.

Nikon Monarch 5 8x42 Binoculars

Nikon Monarch 5 8x42 Binoculars deliver bright, sharp views for wildlife surveys, eclipse chases, and quick star-field scans at dark sites.

An ionic black box

Researchers at UCSB are developing a chip that uses ionic memristor technology to create a physically unclonable device, rendering it vulnerable to cyber attacks. The technology aims to prevent cloning and hijacking of devices in networks, making them ideal for securing IoT devices.

Can your cardiac device be hacked?

Cybersecurity risks exist in cardiac devices due to software integration and wireless communications, according to the American College of Cardiology's Electrophysiology Council. The potential consequences include device malfunction, battery depletion, and interruptions in life-saving therapies.

NSF investments aim to address growing cybersecurity challenge

The NSF Secure and Trustworthy Cyberspace program aims to address the growing cybersecurity challenge through foundational research and education. The $74.5 million investment will support a wide range of research areas, including access control, cryptography, and human interaction, to develop safer and more secure cyber systems.

Apple MacBook Pro 14-inch (M4 Pro)

Apple MacBook Pro 14-inch (M4 Pro) powers local ML workloads, large datasets, and multi-display analysis for field and lab teams.

UTSA receives $5 million to support new cybersecurity education pipeline

The University of Texas at San Antonio has received a $5 million grant to create a multidisciplinary center focusing on cybersecurity and cloud computing. The Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) aims to develop well-trained professionals in the industry and strengthen San Antonio as a cybersecurity hub.

Berkeley Lab aims to strengthen the cybersecurity of the grid

Berkeley Lab is developing algorithms to monitor the grid for irregularities and dispatch safe settings to counter potential cyber attacks. The project aims to enhance grid resilience while maintaining security. It partners with industry leaders and utilities to leverage best practices and standards.

Letting programs manage their own processing resources

Researchers are working on a method to distribute processing power to programs based on their needs, enabling computers to cope with future requirements. This approach aims to prevent unpredictable delays and frequent interruptions by providing accurate information regarding application needs.

CalDigit TS4 Thunderbolt 4 Dock

CalDigit TS4 Thunderbolt 4 Dock simplifies serious desks with 18 ports for high-speed storage, monitors, and instruments across Mac and PC setups.

Researchers land $3 million to build cyberattack defenses

A nationwide team of security experts, led by Clemson University's Hongxin Hu, is developing a new operating system to fundamentally change how large computer and network systems are built, making data more secure. The S2OS system could be transformative for cloud computing, protecting users' data from cyber threats.

Lenvio Inc. exclusively licenses ORNL malware behavior detection technology

Lenvio Inc. has exclusively licensed Hyperion, a malware behavior detection technology from Oak Ridge National Laboratory (ORNL), to quickly identify malicious software behavior. This technology improves upon traditional signature detection methods, providing a new class of cyber protection against large-scale cybersecurity threats.

Android apps can conspire to mine information from your smartphone

Virginia Tech researchers discovered that Android apps collude to mine user information, compromising security. The study found thousands of pairs of apps that could leak sensitive data, with the biggest risks coming from seemingly innocuous apps like ringtones and widgets.

GQ GMC-500Plus Geiger Counter

GQ GMC-500Plus Geiger Counter logs beta, gamma, and X-ray levels for environmental monitoring, training labs, and safety demonstrations.

Protecting bulk power systems from hackers

Researchers from Michigan Technological University highlight the vulnerability of power grids to cyberattacks, citing a 'gap' between physical equipment and software. They propose using quantitative methods to prioritize cybersecurity protection and establishing metrics for grid 'health'.

Streamlining the Internet of Things and other cyber-physical systems

The study proposes a new approach to designing cyber-physical systems by integrating machine learning, real-time sensors, and effective communication interfaces. The team encourages combining model-based design with data-based learning to establish a durable design methodology for these complex systems.

Rigol DP832 Triple-Output Bench Power Supply

Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.

Mason researchers keep networks moving to stay safe from hacker attacks

Researchers at George Mason University are working on a new method called 'shuffling' to quickly separate hackers from legitimate users and isolate bad actors. The approach aims to prevent denial-of-service attacks that can cripple online businesses with downed websites, financial losses, and damaged client relationships.

Partnership prepares undergraduates to tackle cybersecurity

The Software Assurance Marketplace (SWAMP) partnership between Morgridge Institute for Research and Bowie State University integrates cybersecurity into undergraduate coding courses. This integration helps students develop prolific programming skills, including reading and interpreting code for errors. The program aims to address the h...

Breakthrough in cybersecurity is no phish story

A University at Buffalo researcher has developed a comprehensive model to explain why people fall for spear phishing attacks, accounting for user vulnerabilities and behavior patterns. The model proposes a new approach to training and education, using individual profiles to identify specific weaknesses, and enables organizations to dev...

SAMSUNG T9 Portable SSD 2TB

SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.

Android smartphone data spies exposed like bank robbers

A recent study by Appthority reveals that over 88% of Android apps secretly spy on user data. Researchers from Saarland University developed an app called TaintArtist to track and monitor suspicious app behavior, providing users with a sense of security.

With Boxmate malicious programs have no place left to hide

Boxmate systematically generates program inputs to investigate regular behavior, logging critical data access and resources. This approach catches hidden attacks and prevents them from executing, making malicious programs exposed and unusable.

GoPro HERO13 Black

GoPro HERO13 Black records stabilized 5.3K video for instrument deployments, field notes, and outreach, even in harsh weather and underwater conditions.

UTSA professor's new study explores the mind of a cyberterrorist

A new study by UTSA professor Max Kilger delves into the human component of cybersecurity, highlighting the unique motivations of cyberterrorists. The research reveals that financial gain is a primary motivator for these attacks, making them a significant and growing threat.

UK and Singapore collaborating to address cyber threats

The UK and Singapore are collaborating on six joint research projects to develop new cybersecurity solutions, with a focus on enhancing system resilience. The projects aim to improve the detection of cyber threats and create more robust systems for critical infrastructure.

Garmin GPSMAP 67i with inReach

Garmin GPSMAP 67i with inReach provides rugged GNSS navigation, satellite messaging, and SOS for backcountry geology and climate field teams.

Computer security tools for journalists lacking in a post-Snowden world

A new study by University of Washington and Columbia University researchers found significant security weaknesses in journalists' technological tools and ad-hoc workarounds. Despite the importance of protecting sensitive information, many journalists use insecure methods to organize notes and communicate with sources.

Companies are making cybersecurity a greater priority

A RAND Corporation study finds companies are paying more attention to cybersecurity, with CEOs listening to CISOs and new products improving security. However, CISOs worry about hackers' sophistication and the difficulty in quantifying data losses, making it hard to estimate costs.

Fighting the next generation of cyberattacks

A team of US computer scientists are working on an analyzer that can hunt down algorithmic attacks, a new form of vulnerability that is nearly impossible to find with today's technology. The software will perform a mathematical simulation of the software to predict what will happen in the event of an attack.

Apple Watch Series 11 (GPS, 46mm)

Apple Watch Series 11 (GPS, 46mm) tracks health metrics and safety alerts during long observing sessions, fieldwork, and remote expeditions.

Poor decision-making can lead to cybersecurity breaches

Research suggests that how people visualize hackers affects their cybersecurity decisions. Those who picture a teenage hacker make better decisions, while those who visualize a foreign hacker focus on more lucrative targets. This study aims to influence the development of cybersecurity by understanding social behaviors and rationales b...

Safe production in Industry 4.0

The Fraunhofer Institute's IT Security Laboratory provides a secured test environment to assess the security of industrial automation systems and develop new defense strategies. Real-time requirements in production facilities necessitate unique IT security measures.

UTSA to develop online cybersecurity training for communities

The University of Texas at San Antonio (UTSA) is developing online cybersecurity training for communities, addressing the lack of strategies to respond to cyber attacks. The training will include case studies, best practices, and templates to help municipal officials develop a cybersecurity strategy.

Meta Quest 3 512GB

Meta Quest 3 512GB enables immersive mission planning, terrain rehearsal, and interactive STEM demos with high-resolution mixed-reality experiences.

Cybersecurity experts discover lapses in Heartbleed bug fix

A study by University of Maryland cybersecurity experts found that only 13% of websites patched their software correctly and implemented additional security measures to secure systems. The team's analysis revealed a significant drop in revocation rates during weekends, highlighting the human factor's role in computer security.

UT Dallas Cybersecurity program earns $3.9 million award

The UT Dallas Cybersecurity program has received a $3.9 million award from the National Science Foundation to provide scholarships and support education in computer science related to cybersecurity. The program aims to fulfill the US government's needs for cybersecurity employees, with nearly 30 students expected to be supported.

Dartmouth's new ZEBRA bracelet strengthens computer security

Researchers at Dartmouth College have developed a new approach to computer security using a wearable device called ZEBRA, which authenticates users continuously and automatically logs them out when they leave. The technology has shown high accuracy rates in verifying the correct user and identifying adversaries.

Apple AirPods Pro (2nd Generation, USB-C)

Apple AirPods Pro (2nd Generation, USB-C) provide clear calls and strong noise reduction for interviews, conferences, and noisy field environments.

Sandia cyber-testing contributes to DHS Transition to Practice

The Transition to Practice program assists in bridging the gap between laboratory and practical cybersecurity technologies. The program uses testing and evaluation methods, such as dynamic testing of executable files, red-teaming, and implementation cost analysis, to help move research discoveries into practical use.

Shortage of cybersecurity professionals poses risk to national security

The US is facing a severe shortage of cybersecurity professionals, with demand far outpacing supply, particularly in the federal government. The RAND Corporation study calls for reforms, including waiving civil service rules and increasing funding for education programs to address the issue.

Columbia Engineering team finds thousands of secret keys in Android apps

The Columbia Engineering team found a critical security problem in Google Play, where developers store their secret keys in their apps, making them vulnerable to malicious attacks. The discovery was made using a new tool called PlayDrone, which downloaded over 1.1 million Android apps and identified thousands of secret keys.

UT Dallas professor to develop framework to protect computers' cores

A new defense framework will be developed by UT Dallas professor Dr. Zhiqiang Lin to detect, diagnose and repair kernel malware attacks and enforce a prevention mechanism. The framework aims to detect malicious code sequences in the core of computer operating systems and prevent kernel malware infections.

DJI Air 3 (RC-N2)

DJI Air 3 (RC-N2) captures 4K mapping passes and environmental surveys with dual cameras, long flight time, and omnidirectional obstacle sensing.

Personal touch signature makes mobile devices more secure

A new security system called LatentGesture continuously monitors how a user taps and swipes their mobile device, recognizing differences from the owner's tendencies. The system achieved nearly 98% accuracy on smartphones and 97% accuracy on tablets, making it an effective tool for enhancing mobile device security.

First clinical study of computer security conducted at Polytechnique Montreal

A team of researchers conducted the first-ever clinical study on computer security, exploring the impact of technological and human factors on malware attacks. The four-month study involved 50 subjects and found that technically sophisticated users were more at risk, contradicting the notion that they should have a 'Internet license'.