Bluesky Facebook Reddit Email

Study finds companies may be wise to share cybersecurity efforts

Researchers at North Carolina State University found that companies that disclose their cybersecurity risk management efforts fare better than those that don't after a breach. By implementing voluntary reporting guidelines, companies can reduce the impact of the 'contagion effect' and increase investor attractiveness.

NSF renews grant for University of Arizona Cybersecurity Program

The University of Arizona's two-year AZSecure Cybersecurity Fellowship program will continue to train students in cybersecurity, covering tuition and fees, with a stipend of $34,000 per year. The renewal funding will help about 20 more students over the next five to seven years.

$3M grant to create cybersecurity modeled after human body

Researchers are developing a form of cybersecurity inspired by human biological systems, detecting and addressing threats in their earliest stages. The team is also offering training and research opportunities to students from underrepresented backgrounds.

Apple iPhone 17 Pro

Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.

$4.6 million award creates program to train cybersecurity professionals

The University of Arkansas has received a $4.6 million award to train the next generation of cybersecurity professionals. The program will provide education and job training for students, focusing on critical industries such as transportation and energy, and addressing a national shortage of skilled cybersecurity experts.

SAMSUNG T9 Portable SSD 2TB

SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.

UBC researchers find ways to hackproof smart meters

Researchers at UBC have developed a program to improve the security of smart meters and protect against software-interference attacks. The method addresses vulnerabilities that can be carried out by an attacker with low-cost equipment, found nine types of attacks within an hour through code-level analysis.

Meta Quest 3 512GB

Meta Quest 3 512GB enables immersive mission planning, terrain rehearsal, and interactive STEM demos with high-resolution mixed-reality experiences.

Army researchers identify new way to improve cybersecurity

Researchers at the US Army Research Laboratory identified a new strategy to improve cybersecurity by compressing network traffic without losing malicious activity detection capabilities. The technique stops transmitting data after a set number of messages, reducing bandwidth usage and increasing security alert reliability.

How susceptible are hospital employees to phishing attacks?

A multicenter study by Brigham and Women's Hospital found that hospital employees are susceptible to phishing attacks, with a high click rate of 14.2%, but also showed improvement in response rates with increasing campaigns and phishing awareness training.

Rigol DP832 Triple-Output Bench Power Supply

Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.

UTSA wins global cyber security challenge

The University of Texas at San Antonio has developed a framework using deep neural networks to classify and detect malware. This system was recognized as the top prize winner in the AICS 2019 Challenge sponsored by Crowdstrike Foundation and MIT Lincoln Laboratory, showcasing UTSA's expertise in cybersecurity.

Army research takes proactive approach to defending computer systems

A team of researchers has developed a new proactive defense technique called moving target defense (MTD) to protect computer systems from cyberattacks. MTD involves changing the IP address of computers frequently enough to confuse attackers and make it harder for them to exploit vulnerabilities.

Apple Watch Series 11 (GPS, 46mm)

Apple Watch Series 11 (GPS, 46mm) tracks health metrics and safety alerts during long observing sessions, fieldwork, and remote expeditions.

Security gaps identified in Internet protocol 'IPsec'

Researchers at Ruhr-University Bochum discovered vulnerabilities in IPsec's IKEv1 protocol, which enable attackers to intercept specific information. The Bleichenbacher attack was successful against four network equipment providers, prompting manufacturers to eliminate security gaps.

Claiming credit for cyberattacks

The study finds that both state and non-state actors face similar decisions when it comes to claiming credit for cyberattacks, but their strategies diverge due to different optics. The researchers highlight the importance of understanding how attackers' motives and identity can be revealed through credit claims.

Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C)

Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C) keeps Macs, tablets, and meters powered during extended observing runs and remote surveys.

Email encryption standards hacked

Researchers demonstrated that two common email encryption standards are vulnerable to attacks, compromising secure communication. The S/MIME standard is not suitable for secure communication due to outdated cryptography, while OpenPGP can be configured securely but often isn't.

An ionic black box

Researchers at UCSB are developing a chip that uses ionic memristor technology to create a physically unclonable device, rendering it vulnerable to cyber attacks. The technology aims to prevent cloning and hijacking of devices in networks, making them ideal for securing IoT devices.

Aranet4 Home CO2 Monitor

Aranet4 Home CO2 Monitor tracks ventilation quality in labs, classrooms, and conference rooms with long battery life and clear e-ink readouts.

Can your cardiac device be hacked?

Cybersecurity risks exist in cardiac devices due to software integration and wireless communications, according to the American College of Cardiology's Electrophysiology Council. The potential consequences include device malfunction, battery depletion, and interruptions in life-saving therapies.

NSF investments aim to address growing cybersecurity challenge

The NSF Secure and Trustworthy Cyberspace program aims to address the growing cybersecurity challenge through foundational research and education. The $74.5 million investment will support a wide range of research areas, including access control, cryptography, and human interaction, to develop safer and more secure cyber systems.

UTSA receives $5 million to support new cybersecurity education pipeline

The University of Texas at San Antonio has received a $5 million grant to create a multidisciplinary center focusing on cybersecurity and cloud computing. The Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) aims to develop well-trained professionals in the industry and strengthen San Antonio as a cybersecurity hub.

Apple AirPods Pro (2nd Generation, USB-C)

Apple AirPods Pro (2nd Generation, USB-C) provide clear calls and strong noise reduction for interviews, conferences, and noisy field environments.

Berkeley Lab aims to strengthen the cybersecurity of the grid

Berkeley Lab is developing algorithms to monitor the grid for irregularities and dispatch safe settings to counter potential cyber attacks. The project aims to enhance grid resilience while maintaining security. It partners with industry leaders and utilities to leverage best practices and standards.

Letting programs manage their own processing resources

Researchers are working on a method to distribute processing power to programs based on their needs, enabling computers to cope with future requirements. This approach aims to prevent unpredictable delays and frequent interruptions by providing accurate information regarding application needs.

GoPro HERO13 Black

GoPro HERO13 Black records stabilized 5.3K video for instrument deployments, field notes, and outreach, even in harsh weather and underwater conditions.

Researchers land $3 million to build cyberattack defenses

A nationwide team of security experts, led by Clemson University's Hongxin Hu, is developing a new operating system to fundamentally change how large computer and network systems are built, making data more secure. The S2OS system could be transformative for cloud computing, protecting users' data from cyber threats.

Lenvio Inc. exclusively licenses ORNL malware behavior detection technology

Lenvio Inc. has exclusively licensed Hyperion, a malware behavior detection technology from Oak Ridge National Laboratory (ORNL), to quickly identify malicious software behavior. This technology improves upon traditional signature detection methods, providing a new class of cyber protection against large-scale cybersecurity threats.

Android apps can conspire to mine information from your smartphone

Virginia Tech researchers discovered that Android apps collude to mine user information, compromising security. The study found thousands of pairs of apps that could leak sensitive data, with the biggest risks coming from seemingly innocuous apps like ringtones and widgets.

Davis Instruments Vantage Pro2 Weather Station

Davis Instruments Vantage Pro2 Weather Station offers research-grade local weather data for networked stations, campuses, and community observatories.

Protecting bulk power systems from hackers

Researchers from Michigan Technological University highlight the vulnerability of power grids to cyberattacks, citing a 'gap' between physical equipment and software. They propose using quantitative methods to prioritize cybersecurity protection and establishing metrics for grid 'health'.

Streamlining the Internet of Things and other cyber-physical systems

The study proposes a new approach to designing cyber-physical systems by integrating machine learning, real-time sensors, and effective communication interfaces. The team encourages combining model-based design with data-based learning to establish a durable design methodology for these complex systems.

Kestrel 3000 Pocket Weather Meter

Kestrel 3000 Pocket Weather Meter measures wind, temperature, and humidity in real time for site assessments, aviation checks, and safety briefings.

Mason researchers keep networks moving to stay safe from hacker attacks

Researchers at George Mason University are working on a new method called 'shuffling' to quickly separate hackers from legitimate users and isolate bad actors. The approach aims to prevent denial-of-service attacks that can cripple online businesses with downed websites, financial losses, and damaged client relationships.

Partnership prepares undergraduates to tackle cybersecurity

The Software Assurance Marketplace (SWAMP) partnership between Morgridge Institute for Research and Bowie State University integrates cybersecurity into undergraduate coding courses. This integration helps students develop prolific programming skills, including reading and interpreting code for errors. The program aims to address the h...

Creality K1 Max 3D Printer

Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.

Breakthrough in cybersecurity is no phish story

A University at Buffalo researcher has developed a comprehensive model to explain why people fall for spear phishing attacks, accounting for user vulnerabilities and behavior patterns. The model proposes a new approach to training and education, using individual profiles to identify specific weaknesses, and enables organizations to dev...

Android smartphone data spies exposed like bank robbers

A recent study by Appthority reveals that over 88% of Android apps secretly spy on user data. Researchers from Saarland University developed an app called TaintArtist to track and monitor suspicious app behavior, providing users with a sense of security.

Garmin GPSMAP 67i with inReach

Garmin GPSMAP 67i with inReach provides rugged GNSS navigation, satellite messaging, and SOS for backcountry geology and climate field teams.

With Boxmate malicious programs have no place left to hide

Boxmate systematically generates program inputs to investigate regular behavior, logging critical data access and resources. This approach catches hidden attacks and prevents them from executing, making malicious programs exposed and unusable.

AmScope B120C-5M Compound Microscope

AmScope B120C-5M Compound Microscope supports teaching labs and QA checks with LED illumination, mechanical stage, and included 5MP camera.

UK and Singapore collaborating to address cyber threats

The UK and Singapore are collaborating on six joint research projects to develop new cybersecurity solutions, with a focus on enhancing system resilience. The projects aim to improve the detection of cyber threats and create more robust systems for critical infrastructure.

UTSA professor's new study explores the mind of a cyberterrorist

A new study by UTSA professor Max Kilger delves into the human component of cybersecurity, highlighting the unique motivations of cyberterrorists. The research reveals that financial gain is a primary motivator for these attacks, making them a significant and growing threat.

Apple iPad Pro 11-inch (M4)

Apple iPad Pro 11-inch (M4) runs demanding GIS, imaging, and annotation workflows on the go for surveys, briefings, and lab notebooks.

Computer security tools for journalists lacking in a post-Snowden world

A new study by University of Washington and Columbia University researchers found significant security weaknesses in journalists' technological tools and ad-hoc workarounds. Despite the importance of protecting sensitive information, many journalists use insecure methods to organize notes and communicate with sources.

Companies are making cybersecurity a greater priority

A RAND Corporation study finds companies are paying more attention to cybersecurity, with CEOs listening to CISOs and new products improving security. However, CISOs worry about hackers' sophistication and the difficulty in quantifying data losses, making it hard to estimate costs.