Bluesky Facebook Reddit Email

Fighting the next generation of cyberattacks

A team of US computer scientists are working on an analyzer that can hunt down algorithmic attacks, a new form of vulnerability that is nearly impossible to find with today's technology. The software will perform a mathematical simulation of the software to predict what will happen in the event of an attack.

Aranet4 Home CO2 Monitor

Aranet4 Home CO2 Monitor tracks ventilation quality in labs, classrooms, and conference rooms with long battery life and clear e-ink readouts.

Poor decision-making can lead to cybersecurity breaches

Research suggests that how people visualize hackers affects their cybersecurity decisions. Those who picture a teenage hacker make better decisions, while those who visualize a foreign hacker focus on more lucrative targets. This study aims to influence the development of cybersecurity by understanding social behaviors and rationales b...

Safe production in Industry 4.0

The Fraunhofer Institute's IT Security Laboratory provides a secured test environment to assess the security of industrial automation systems and develop new defense strategies. Real-time requirements in production facilities necessitate unique IT security measures.

UTSA to develop online cybersecurity training for communities

The University of Texas at San Antonio (UTSA) is developing online cybersecurity training for communities, addressing the lack of strategies to respond to cyber attacks. The training will include case studies, best practices, and templates to help municipal officials develop a cybersecurity strategy.

AmScope B120C-5M Compound Microscope

AmScope B120C-5M Compound Microscope supports teaching labs and QA checks with LED illumination, mechanical stage, and included 5MP camera.

Cybersecurity experts discover lapses in Heartbleed bug fix

A study by University of Maryland cybersecurity experts found that only 13% of websites patched their software correctly and implemented additional security measures to secure systems. The team's analysis revealed a significant drop in revocation rates during weekends, highlighting the human factor's role in computer security.

UT Dallas Cybersecurity program earns $3.9 million award

The UT Dallas Cybersecurity program has received a $3.9 million award from the National Science Foundation to provide scholarships and support education in computer science related to cybersecurity. The program aims to fulfill the US government's needs for cybersecurity employees, with nearly 30 students expected to be supported.

Dartmouth's new ZEBRA bracelet strengthens computer security

Researchers at Dartmouth College have developed a new approach to computer security using a wearable device called ZEBRA, which authenticates users continuously and automatically logs them out when they leave. The technology has shown high accuracy rates in verifying the correct user and identifying adversaries.

Apple Watch Series 11 (GPS, 46mm)

Apple Watch Series 11 (GPS, 46mm) tracks health metrics and safety alerts during long observing sessions, fieldwork, and remote expeditions.

Sandia cyber-testing contributes to DHS Transition to Practice

The Transition to Practice program assists in bridging the gap between laboratory and practical cybersecurity technologies. The program uses testing and evaluation methods, such as dynamic testing of executable files, red-teaming, and implementation cost analysis, to help move research discoveries into practical use.

Shortage of cybersecurity professionals poses risk to national security

The US is facing a severe shortage of cybersecurity professionals, with demand far outpacing supply, particularly in the federal government. The RAND Corporation study calls for reforms, including waiving civil service rules and increasing funding for education programs to address the issue.

Apple iPhone 17 Pro

Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.

Columbia Engineering team finds thousands of secret keys in Android apps

The Columbia Engineering team found a critical security problem in Google Play, where developers store their secret keys in their apps, making them vulnerable to malicious attacks. The discovery was made using a new tool called PlayDrone, which downloaded over 1.1 million Android apps and identified thousands of secret keys.

UT Dallas professor to develop framework to protect computers' cores

A new defense framework will be developed by UT Dallas professor Dr. Zhiqiang Lin to detect, diagnose and repair kernel malware attacks and enforce a prevention mechanism. The framework aims to detect malicious code sequences in the core of computer operating systems and prevent kernel malware infections.

Personal touch signature makes mobile devices more secure

A new security system called LatentGesture continuously monitors how a user taps and swipes their mobile device, recognizing differences from the owner's tendencies. The system achieved nearly 98% accuracy on smartphones and 97% accuracy on tablets, making it an effective tool for enhancing mobile device security.

GQ GMC-500Plus Geiger Counter

GQ GMC-500Plus Geiger Counter logs beta, gamma, and X-ray levels for environmental monitoring, training labs, and safety demonstrations.

First clinical study of computer security conducted at Polytechnique Montreal

A team of researchers conducted the first-ever clinical study on computer security, exploring the impact of technological and human factors on malware attacks. The four-month study involved 50 subjects and found that technically sophisticated users were more at risk, contradicting the notion that they should have a 'Internet license'.

Breakthrough in cryptography could result in more secure computing

Researchers at the University of Bristol have made a significant breakthrough in cryptography, developing a new protocol that enables fast and secure Multi-Party Computation. This allows for complex computations on secret data without revealing inputs, with potential applications in finance, pharmaceuticals, and other industries.

Scholarship program to train students in cybersecurity

The National Science Foundation awards a $2.3 million scholarship program at Kansas State University to train students in cybersecurity, as the nation faces growing cyber threats. The program aims to develop experts capable of handling cybersecurity challenges and safeguard critical infrastructure.

SAMSUNG T9 Portable SSD 2TB

SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.

Internal relations

Researchers at Kansas State University are working on developing a flexible but standardized and secure communication network for medical devices. The team aims to enable devices to monitor and reason about patient health, reducing security problems as devices become more complex.

New cybersecurity tool suite demonstrated this week

The Idaho National Laboratory has demonstrated a suite of cybersecurity tools that provides situational awareness of networks and control systems. The Sophia software tool passively observes network communications, providing real-time and historical records of those communications.

Sony Alpha a7 IV (Body Only)

Sony Alpha a7 IV (Body Only) delivers reliable low-light performance and rugged build for astrophotography, lab documentation, and field expeditions.

What's in a name?

The US Department of Homeland Security's DNSSEC project authenticates data existence, ownership, and integrity, protecting against hackers' threats. By deploying DNSSEC in key zones, DHS builds a safer cyberspace with complete end-to-end chain protection.

Apple iPad Pro 11-inch (M4)

Apple iPad Pro 11-inch (M4) runs demanding GIS, imaging, and annotation workflows on the go for surveys, briefings, and lab notebooks.

Cyber workshop at Sandia Labs seeks potential responses to cyberattacks

Sandia National Laboratories is launching a Cyber Engineering Research Institute to coordinate with industry and universities, aiming to increase cybersecurity research. Experts discuss the need for shared threat information and innovative solutions, including prize competitions to stimulate radical security innovations.

RUB researchers break W3C standard

Researchers from Ruhr-University Bochum found a serious attack against XML Encryption, which is used by companies like IBM and Microsoft to protect data. The attack exploits a weakness in the CBC mode for chaining ciphertext blocks, rendering XML Encryption insecure.

NSF grant funds cybersecurity education at Stevens

The NSF grant will enhance existing cybersecurity curricula and expand the laboratory for hands-on instruction. The initiative aims to address a growing need for 10,000-30,000 cybersecurity professionals in the US.

Celestron NexStar 8SE Computerized Telescope

Celestron NexStar 8SE Computerized Telescope combines portable Schmidt-Cassegrain optics with GoTo pointing for outreach nights and field campaigns.

US needs new national strategy for era of cyber aggression, new paper concludes

A new research paper concludes that deterrence can no longer be the primary national cybersecurity strategy due to the unique characteristics of cyberspace. Experts propose a three-tiered approach to guide US strategy in responding to cyber threats, emphasizing war-fighting and offense-defense frameworks to contain damage and reduce harm.

Kestrel 3000 Pocket Weather Meter

Kestrel 3000 Pocket Weather Meter measures wind, temperature, and humidity in real time for site assessments, aviation checks, and safety briefings.

Hiding the honeypots

Researchers reveal that honeypot traps are susceptible to detection by advanced Botnet malware, allowing attackers to disable or ignore them. This vulnerability highlights the need for secure honeypot deployment and research into covert honeypot building techniques.

New computer security guide can help safeguard your small business

The NIST Small Business Information Security: The Fundamentals guide provides 10 necessary steps for small business security, including installing firewalls and backing up business data. By following these steps, small businesses can reduce their vulnerability to cyber threats and protect sensitive information.

Denial of service denial

A new passive protocol called IPACF blocks threats to gatekeeping computers and Authentication Servers, allowing legitimate users access private resources. The filter takes just 6 nanoseconds to reject non-legitimate information packets associated with DoS attacks.

Creality K1 Max 3D Printer

Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.

Mathematical advances strengthen IT security

A new approach based on mathematical theory of elliptic curves has emerged as a leading candidate for more efficient cryptography. Elliptic curve cryptography provides the same level of security as 1024-bit keys for RSA with smaller key sizes, making it computationally more efficient.

Stevens receives National Science Foundation grant for cybersecurity scholars

Stevens Institute of Technology has been awarded a $850,672 National Science Foundation grant to support students pursuing degree programs in cybersecurity. The scholarship program will provide 11 two-year scholarships covering tuition and a stipend, requiring students to work for the government for at least two years after graduation.

New intrusion tolerance software fortifies server security

The Self Cleansing Intrusion Tolerance (SCIT) technology developed by George Mason University researchers limits the damage caused by unknown cyber-attacks by restricting exposure time. By periodically cleansing servers, SCIT reduces the risk of data theft and provides an additional layer of defense against intrusions.

Davis Instruments Vantage Pro2 Weather Station

Davis Instruments Vantage Pro2 Weather Station offers research-grade local weather data for networked stations, campuses, and community observatories.

Dartmouth launches network security study

A team of Dartmouth researchers is launching the Dartmouth Internet Security Testbed (DIST) to examine live network activity and develop methods for detecting malicious activity. The project will provide valuable insights into securing wireless networks, improving network security technology and practices for all internet users.

Stevens honors cybersecurity experts at Convocation 2006

Susanne Wetzel and Rebecca Wright are recognized for their work on a new undergraduate degree program in cybersecurity at Stevens Institute of Technology. The program is designed to provide students with security expertise within a broad education, preparing them for careers in information assurance and computer security.

DJI Air 3 (RC-N2)

DJI Air 3 (RC-N2) captures 4K mapping passes and environmental surveys with dual cameras, long flight time, and omnidirectional obstacle sensing.

Wetzel and Wright awarded grant for cybersecurity lab

The new lab will provide practical training in security and information assurance, preparing students to meet the challenges in protecting the nation's information infrastructure. The lab will increase the number of IT professionals educated and trained in theoretical and practical aspects of information assurance and security.

NSF launches computer security center

The TRUST consortium, funded by NSF's Science and Technology Centers program, aims to create new technologies that make computer software and networks inherently secure. Researchers will focus on protecting against attacks, ensuring data integrity, and developing tools for building trustworthy systems.

UC Berkeley to lead $19 million NSF center on cybersecurity research

The Team for Research in Ubiquitous Secure Technology (TRUST) center aims to develop new technologies to design, build, and operate trustworthy information systems. The researchers will focus on developing secure embedded systems, integrating trusted components, and creating information management software tools.

XML-based language formats checklists for IT security

The XCCDF specification document provides a flexible, vendor-neutral format for measuring conformance to security benchmarks and generating records of benchmark tests. NIST is developing computer security checklists for widely used government agencies with the help of organizations like NSA and DHS.

Federal standard issued for improving IT security

The new standard provides detailed guidance on categorizing systems and assessing potential impact of security breaches. It will help agencies make informed decisions and implement cost-effective security measures, complemented by a companion standard specifying minimum federal system requirements.

Nikon Monarch 5 8x42 Binoculars

Nikon Monarch 5 8x42 Binoculars deliver bright, sharp views for wildlife surveys, eclipse chases, and quick star-field scans at dark sites.