A series of articles and commentaries highlights the importance of process improvements, team culture, and enterprise cybersecurity in preventing cyberattacks. Healthcare executives discuss key components of effective cybersecurity strategies, including organization-wide training and shared responsibility.
Researchers at Ruhr-University Bochum discovered vulnerabilities in IPsec's IKEv1 protocol, which enable attackers to intercept specific information. The Bleichenbacher attack was successful against four network equipment providers, prompting manufacturers to eliminate security gaps.
Apple iPhone 17 Pro
Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.
The study finds that both state and non-state actors face similar decisions when it comes to claiming credit for cyberattacks, but their strategies diverge due to different optics. The researchers highlight the importance of understanding how attackers' motives and identity can be revealed through credit claims.
Researchers at UTSA created an authorization framework for connected cars to prevent cyber attacks and unauthorized access to sensors and data. The framework provides a conceptual overview of various access control decision and enforcement points needed for dynamic interaction in smart car ecosystems.
A multidisciplinary team at KU is tackling the fundamental science underpinning IoT security, focusing on solutions to side-channel attacks and securing information in the cloud. The team aims to improve resilience and trust between computers, essential for addressing growing cybersecurity concerns.
The use of digital recordings in medical visits holds great promise for improving healthcare outcomes, including enhanced patient engagement, shared decision-making, and education. However, the authors caution that there are pressing need to develop new policies on data collection, management, and storage.
Researchers demonstrated that two common email encryption standards are vulnerable to attacks, compromising secure communication. The S/MIME standard is not suitable for secure communication due to outdated cryptography, while OpenPGP can be configured securely but often isn't.
Nikon Monarch 5 8x42 Binoculars
Nikon Monarch 5 8x42 Binoculars deliver bright, sharp views for wildlife surveys, eclipse chases, and quick star-field scans at dark sites.
Researchers at UCSB are developing a chip that uses ionic memristor technology to create a physically unclonable device, rendering it vulnerable to cyber attacks. The technology aims to prevent cloning and hijacking of devices in networks, making them ideal for securing IoT devices.
Cybersecurity risks exist in cardiac devices due to software integration and wireless communications, according to the American College of Cardiology's Electrophysiology Council. The potential consequences include device malfunction, battery depletion, and interruptions in life-saving therapies.
Researchers from UC3M and CSIC have developed a system to analyze electromagnetic emissions from smartphones for security vulnerabilities. The study focuses on lateral movement attacks, where attackers try to exploit the energy emitted by devices to breach encryption.
The NSF Secure and Trustworthy Cyberspace program aims to address the growing cybersecurity challenge through foundational research and education. The $74.5 million investment will support a wide range of research areas, including access control, cryptography, and human interaction, to develop safer and more secure cyber systems.
Apple MacBook Pro 14-inch (M4 Pro)
Apple MacBook Pro 14-inch (M4 Pro) powers local ML workloads, large datasets, and multi-display analysis for field and lab teams.
The University of Texas at San Antonio has received a $5 million grant to create a multidisciplinary center focusing on cybersecurity and cloud computing. The Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) aims to develop well-trained professionals in the industry and strengthen San Antonio as a cybersecurity hub.
Berkeley Lab is developing algorithms to monitor the grid for irregularities and dispatch safe settings to counter potential cyber attacks. The project aims to enhance grid resilience while maintaining security. It partners with industry leaders and utilities to leverage best practices and standards.
Experts outline steps hospitals can take to reduce risk, including workforce training, patching operating systems, and reporting attacks promptly. However, full security is unlikely to be achievable due to the complexity of modern hospital systems.
Researchers are working on a method to distribute processing power to programs based on their needs, enabling computers to cope with future requirements. This approach aims to prevent unpredictable delays and frequent interruptions by providing accurate information regarding application needs.
Researchers found security gaps in open-source DNA processing programs, allowing unauthorized access to computer systems and potentially manipulated DNA results. They recommend strengthening computer security and privacy protections through best practices, adversarial thinking, and monitoring.
CalDigit TS4 Thunderbolt 4 Dock
CalDigit TS4 Thunderbolt 4 Dock simplifies serious desks with 18 ports for high-speed storage, monitors, and instruments across Mac and PC setups.
A nationwide team of security experts, led by Clemson University's Hongxin Hu, is developing a new operating system to fundamentally change how large computer and network systems are built, making data more secure. The S2OS system could be transformative for cloud computing, protecting users' data from cyber threats.
Lenvio Inc. has exclusively licensed Hyperion, a malware behavior detection technology from Oak Ridge National Laboratory (ORNL), to quickly identify malicious software behavior. This technology improves upon traditional signature detection methods, providing a new class of cyber protection against large-scale cybersecurity threats.
Virginia Tech researchers discovered that Android apps collude to mine user information, compromising security. The study found thousands of pairs of apps that could leak sensitive data, with the biggest risks coming from seemingly innocuous apps like ringtones and widgets.
CISPA researchers have developed an early warning system to detect and prevent mass cyber attacks, including DDoS attacks. The system uses honeypots to track and analyze attack patterns, providing valuable insights into the motivations behind these attacks.
GQ GMC-500Plus Geiger Counter
GQ GMC-500Plus Geiger Counter logs beta, gamma, and X-ray levels for environmental monitoring, training labs, and safety demonstrations.
Researchers from Michigan Technological University highlight the vulnerability of power grids to cyberattacks, citing a 'gap' between physical equipment and software. They propose using quantitative methods to prioritize cybersecurity protection and establishing metrics for grid 'health'.
The study proposes a new approach to designing cyber-physical systems by integrating machine learning, real-time sensors, and effective communication interfaces. The team encourages combining model-based design with data-based learning to establish a durable design methodology for these complex systems.
A new light-based technique creates secure, invisible watermarks that can be used to detect and prosecute counterfeiting. The technique uses a complex pattern of light as a unique watermark, which is embedded into the content to be protected.
Researchers have developed a tool to visualize network traffic data, allowing analysts to identify key changes and patterns. The tool has been used to inspect network traffic during DDoS attacks and map out malware distribution networks.
A study by NIST researchers found that security fatigue leads users to adopt risky computing behavior, causing costs to businesses. The study defines security fatigue as weariness or reluctance to deal with computer security.
Rigol DP832 Triple-Output Bench Power Supply
Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.
Saarland University's IT security team, saarsec, won the top European prize in an international competition that tested their skills in finding vulnerabilities and defending against cyber attacks. The team, comprising students with varying levels of education and expertise, demonstrated exceptional knowledge of IT security and encryption.
Researchers at George Mason University are working on a new method called 'shuffling' to quickly separate hackers from legitimate users and isolate bad actors. The approach aims to prevent denial-of-service attacks that can cripple online businesses with downed websites, financial losses, and damaged client relationships.
The Software Assurance Marketplace (SWAMP) partnership between Morgridge Institute for Research and Bowie State University integrates cybersecurity into undergraduate coding courses. This integration helps students develop prolific programming skills, including reading and interpreting code for errors. The program aims to address the h...
A University at Buffalo researcher has developed a comprehensive model to explain why people fall for spear phishing attacks, accounting for user vulnerabilities and behavior patterns. The model proposes a new approach to training and education, using individual profiles to identify specific weaknesses, and enables organizations to dev...
Stefan Savage's work has made significant contributions to network security, including combating spam and vulnerabilities in automotive systems. His research has also influenced international standards and cybersecurity initiatives.
SAMSUNG T9 Portable SSD 2TB
SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.
A recent study by Appthority reveals that over 88% of Android apps secretly spy on user data. Researchers from Saarland University developed an app called TaintArtist to track and monitor suspicious app behavior, providing users with a sense of security.
Boxmate systematically generates program inputs to investigate regular behavior, logging critical data access and resources. This approach catches hidden attacks and prevents them from executing, making malicious programs exposed and unusable.
RIT faculty will develop new cybersecurity curriculum on strategic thinking and tactics with a $25,000 Intel gift. The project aims to train future cybersecurity professionals in applying conventional warfare tactics for defense purposes.
The University of Kansas School of Engineering will educate cyberdefense experts dedicated to public service with a new $4.7 million grant. The initiative supports dozens of students, who commit to work at government cybersecurity jobs safeguarding critical infrastructure.
GoPro HERO13 Black
GoPro HERO13 Black records stabilized 5.3K video for instrument deployments, field notes, and outreach, even in harsh weather and underwater conditions.
The University of Massachusetts Amherst has received a $4.2 million grant to establish a CyberCorps Scholarship for Service program, which will support 28 students in their pursuit of careers in cybersecurity. The program aims to address the national shortage of highly trained experts in this field.
A new study by UTSA professor Max Kilger delves into the human component of cybersecurity, highlighting the unique motivations of cyberterrorists. The research reveals that financial gain is a primary motivator for these attacks, making them a significant and growing threat.
The UK and Singapore are collaborating on six joint research projects to develop new cybersecurity solutions, with a focus on enhancing system resilience. The projects aim to improve the detection of cyber threats and create more robust systems for critical infrastructure.
The NSF Secure and Trustworthy Cyberspace (SaTC) program supports research on vulnerabilities in hardware, software, and networking technologies. The awards also focus on human components of cybersecurity, education, and workforce development.
The NSF Secure and Trustworthy Cyberspace (SaTC) program invests $74.5 million in research grants to address vulnerabilities in hardware, software, and networking technologies. The funding supports interdisciplinary research, including the human components of cybersecurity and education initiatives.
Garmin GPSMAP 67i with inReach
Garmin GPSMAP 67i with inReach provides rugged GNSS navigation, satellite messaging, and SOS for backcountry geology and climate field teams.
A new study by University of Washington and Columbia University researchers found significant security weaknesses in journalists' technological tools and ad-hoc workarounds. Despite the importance of protecting sensitive information, many journalists use insecure methods to organize notes and communicate with sources.
A RAND Corporation study finds companies are paying more attention to cybersecurity, with CEOs listening to CISOs and new products improving security. However, CISOs worry about hackers' sophistication and the difficulty in quantifying data losses, making it hard to estimate costs.
A team of US computer scientists are working on an analyzer that can hunt down algorithmic attacks, a new form of vulnerability that is nearly impossible to find with today's technology. The software will perform a mathematical simulation of the software to predict what will happen in the event of an attack.
Researchers have developed a new method to protect computer chips using advanced 3D optical imaging and photon encryption, making them virtually uncounterfeitable. The system replaces traditional electronic part numbers with compressed QR codes that can be scaled down to the size of microns.
Apple Watch Series 11 (GPS, 46mm)
Apple Watch Series 11 (GPS, 46mm) tracks health metrics and safety alerts during long observing sessions, fieldwork, and remote expeditions.
The Journal of Cybersecurity is an open-access title that aims to tackle cybersecurity challenges through interdisciplinary approaches. It will publish high-impact research from various disciplines, including anthropology, computer science, economics, and psychology.
Research suggests that how people visualize hackers affects their cybersecurity decisions. Those who picture a teenage hacker make better decisions, while those who visualize a foreign hacker focus on more lucrative targets. This study aims to influence the development of cybersecurity by understanding social behaviors and rationales b...
The Fraunhofer Institute's IT Security Laboratory provides a secured test environment to assess the security of industrial automation systems and develop new defense strategies. Real-time requirements in production facilities necessitate unique IT security measures.
The University of Texas at San Antonio (UTSA) is developing online cybersecurity training for communities, addressing the lack of strategies to respond to cyber attacks. The training will include case studies, best practices, and templates to help municipal officials develop a cybersecurity strategy.
The University of Houston has been awarded a $1.5 million grant from the National Science Foundation to train students in cybersecurity. The program aims to attract talented graduate students and build a community of well-qualified scholars in this area.
Meta Quest 3 512GB
Meta Quest 3 512GB enables immersive mission planning, terrain rehearsal, and interactive STEM demos with high-resolution mixed-reality experiences.
A study by University of Maryland cybersecurity experts found that only 13% of websites patched their software correctly and implemented additional security measures to secure systems. The team's analysis revealed a significant drop in revocation rates during weekends, highlighting the human factor's role in computer security.
The UT Dallas Cybersecurity program has received a $3.9 million award from the National Science Foundation to provide scholarships and support education in computer science related to cybersecurity. The program aims to fulfill the US government's needs for cybersecurity employees, with nearly 30 students expected to be supported.
Researchers at Dartmouth College have developed a new approach to computer security using a wearable device called ZEBRA, which authenticates users continuously and automatically logs them out when they leave. The technology has shown high accuracy rates in verifying the correct user and identifying adversaries.
Apple AirPods Pro (2nd Generation, USB-C)
Apple AirPods Pro (2nd Generation, USB-C) provide clear calls and strong noise reduction for interviews, conferences, and noisy field environments.
The Transition to Practice program assists in bridging the gap between laboratory and practical cybersecurity technologies. The program uses testing and evaluation methods, such as dynamic testing of executable files, red-teaming, and implementation cost analysis, to help move research discoveries into practical use.
Researchers developed a modification to the core Android operating system that allows developers and users to plug in new security enhancements. The ASM framework enables custom security control modules to protect phones and enhance consumer privacy.
The US is facing a severe shortage of cybersecurity professionals, with demand far outpacing supply, particularly in the federal government. The RAND Corporation study calls for reforms, including waiving civil service rules and increasing funding for education programs to address the issue.
The Columbia Engineering team found a critical security problem in Google Play, where developers store their secret keys in their apps, making them vulnerable to malicious attacks. The discovery was made using a new tool called PlayDrone, which downloaded over 1.1 million Android apps and identified thousands of secret keys.
A new defense framework will be developed by UT Dallas professor Dr. Zhiqiang Lin to detect, diagnose and repair kernel malware attacks and enforce a prevention mechanism. The framework aims to detect malicious code sequences in the core of computer operating systems and prevent kernel malware infections.
DJI Air 3 (RC-N2)
DJI Air 3 (RC-N2) captures 4K mapping passes and environmental surveys with dual cameras, long flight time, and omnidirectional obstacle sensing.
The UTSA Center for Infrastructure Assurance and Security, along with partners, will develop a new training course and update five existing courses to enhance state preparedness for cyber attacks. The consortium aims to improve coordination among states in preventing, detecting, and responding to cyber threats.
A new security system called LatentGesture continuously monitors how a user taps and swipes their mobile device, recognizing differences from the owner's tendencies. The system achieved nearly 98% accuracy on smartphones and 97% accuracy on tablets, making it an effective tool for enhancing mobile device security.
Students at both universities will learn to break into and protect hardware, software, and data through hands-on experiments. The program aims to educate future users, developers, and controllers of computer systems on how to defend against cyber attacks.
A team of researchers conducted the first-ever clinical study on computer security, exploring the impact of technological and human factors on malware attacks. The four-month study involved 50 subjects and found that technically sophisticated users were more at risk, contradicting the notion that they should have a 'Internet license'.