The new Easy Email Encryption (E3) app automatically encrypts incoming emails on trusted devices, providing real-world security without requiring technical expertise. With receiver-controlled encryption and per-device key pairs, E3 makes email protection accessible to non-technical users.
Kestrel 3000 Pocket Weather Meter
Kestrel 3000 Pocket Weather Meter measures wind, temperature, and humidity in real time for site assessments, aviation checks, and safety briefings.
Fanny Ye aims to design methods and algorithms for automating the analysis of online underground markets. She will also develop a novel framework for cross-market user identification and profiling to gain insights into cybercriminal social networks and secure cyberspace.
The UK is set to lead wireless communications technology with the DLINK project, which aims to deliver 'fibre-in-air' communication links with unprecedented data rates and transmission distances. The project exploits a new portion of the wireless spectrum, called D-band, enabling high data rates of up to 45Gb/s.
Daily teen e-cigarette users are more likely to purchase from commercial sources like drug stores and vape shops, while non-daily users turn to friends and family. The study suggests restricting e-cigarette sales and informing parents about online purchases to prevent adolescent access.
Researchers developed the free software 'CoinEater', which recognises and blocks crypto mining on websites without user approval. The software scans over 100,000 pages daily to detect cryptojacking and pop-up scams.
SAMSUNG T9 Portable SSD 2TB
SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.
Researchers found that internet activity reflects seasonal patterns in nature, with certain species showing stronger trends. The study suggests using online data to monitor changes in biodiversity and inform conservation efforts.
The project aims to understand how the Internet has influenced Orthodox Christianity, particularly in terms of social media and online practices. Researchers plan to analyze blogs, interview churchgoers, and examine the role of social media in shaping Orthodox traditions.
Purdue University engineers have created a way to secure communication signals within the human body, using low-frequency carrier-less transmission to prevent interception. This technology enables covert communication channels, making it difficult for hackers to access sensitive information.
Apple iPhone 17 Pro
Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.
Researchers used Wikipedia pageview records to investigate seasonal patterns in online interest for plants and animals. They found that seasonal trends are widespread, with over a quarter of species showing seasonality in their pageviews.
Researchers analyzed 2.33 billion Wikipedia pageviews to find seasonal patterns in internet interest for plants and animals, revealing how much people care about nature. The study suggests new ways to monitor changes in biodiversity and targets conservation efforts.
Researchers at Rice University have developed a new PUF technology that provides a leap in reliability for IoT devices. The technology uses microchip physical imperfections to produce unique security keys, making it ideal for authentication and encryption.
Researchers at Tokyo Institute of Technology have developed a miniature 28 GHz transceiver integrating beamforming and dual-polarized MIMO technology. The device achieved a maximum data rate of 15 Gb/s, surpassing previous models by 25 percent.
Rigol DP832 Triple-Output Bench Power Supply
Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.
Researchers explore how arts and sciences collaboration can lead to increased discovery and innovation. A study found that patent production is correlated with metal- and wood-working practices among STEM professionals.
Researchers have demonstrated proof-of-principle for an all-photonic quantum repeater, a critical step in long-distance quantum communication. This technology could enable faster and more secure global quantum Internet applications.
Researchers at Michigan State University found that ideological cyberterrorist attacks by far-left groups are on the rise, targeting companies and organizations with data breaches, web defacements, and doxing. The attacks have a significant economic and emotional impact, making them a growing threat.
The Internet of Things Collaborative has received an additional $2.2 million grant from the Cleveland Foundation to build on its early successes and position Cleveland as a leader in digital innovation. The collaborative aims to harness IoT's vast potential across four sectors: manufacturing, health, energy, and municipal infrastructure.
DJI Air 3 (RC-N2)
DJI Air 3 (RC-N2) captures 4K mapping passes and environmental surveys with dual cameras, long flight time, and omnidirectional obstacle sensing.
The new AI system uses machine learning algorithms to identify early symptoms of urinary tract infections in people with dementia. This allows for earlier treatment and reduction in hospitalizations, according to researchers at the University of Surrey.
Researchers at UC Santa Barbara created an application to safeguard group members' anonymity while verifying the reliability of posts. The app allows communities to create secure groups on social media, enabling them to build trust with their readership over time.
Yale researchers used Google's algorithm to understand how information is transferred between enzyme sites, identifying crucial amino acids. This breakthrough could lead to new antibiotics, pesticides, and herbicides, combining data science with molecular dynamics simulations and NMR spectroscopy.
A UC San Francisco study found that homeless older adults often have limited access to stable phone numbers, leading to increased stress and social isolation. The lack of two-way communication also contributes to high emergency department usage and inadequate healthcare services.
A new study using functional MRI found that men with online gaming addiction have altered brain activity compared to healthy controls, particularly in the superior frontal gyrus. In contrast, women with IGD did not exhibit these changes. The study suggests a potential link between gender-specific brain function and online gaming disorder.
Apple iPad Pro 11-inch (M4)
Apple iPad Pro 11-inch (M4) runs demanding GIS, imaging, and annotation workflows on the go for surveys, briefings, and lab notebooks.
Researchers have successfully used remote servers in Japan to autonomously optimize conditions for synthesizing drugs in a British laboratory. The process was controlled over the internet by researchers in the USA, demonstrating the potential of cloud-based approaches for international collaboration and efficient production processes.
Researchers at Case Western Reserve University are developing a new system that uses changes in vibrations, sound, and electrical fields to improve energy consumption and monitor occupants' movements. The system has the potential to provide energy savings, track structural integrity, and enhance building safety.
Researchers are exploring new paradigms for relationship diversity, including asexuality, polyamory, and kink/fetish relationships. The study of queer intimacies is being redefined, with Phillip Hammack calling for a 'paradigm shift' in the field.
A study found that individuals with fear of missing out, internet addiction, and certain personality traits exhibit more extreme reactions to digital technology failures. People who are more neurotic and extroverted tend to have the most maladaptive responses when their devices stop working.
Researchers have discovered four new ways to 'history sniffing' attacks, which can profile a user's online activity in seconds and work across recent web browsers. The attacks can be used by hackers to learn which websites users have visited, and could also be deployed by legitimate companies for marketing and advertising purposes.
CalDigit TS4 Thunderbolt 4 Dock
CalDigit TS4 Thunderbolt 4 Dock simplifies serious desks with 18 ports for high-speed storage, monitors, and instruments across Mac and PC setups.
Researchers at the Niels Bohr Institute will receive funding for projects developing quantum technologies with applications in secure communication, supercomputing, and precision measurements. The EU's Flagship program aims to create a 'quantum internet' with unbreakable communication.
Ramesh Sitaraman and his team won the prestigious award for building the Akamai content delivery network, which serves a quarter of all Internet traffic. The team's work on CDNs has transformed the Internet and spawned a business sector valued at tens of billions of dollars.
Researchers at QuTech have developed a comprehensive guide towards a world-wide quantum internet, describing six phases of network development from simple qubit networks to fully quantum-connected computers. This will enable secure quantum communications and applications such as precise clock synchronization and virtual telescopes.
The European Problematic Use of the Internet (EU-PUI) Research Network has identified nine main areas of research to address issues such as problem use, health effects, and cultural influences. The network aims to develop evidence-based proposals for improving prevention and treatment strategies.
Homemade steroids have become a widespread issue, with online tools and cryptocurrency facilitating their rapid spread. Clemson researcher Bryan Denham's study examines the impact of these substances on public health, noting that purchasing black-market steroids is similar to buying other illicit substances.
Sony Alpha a7 IV (Body Only)
Sony Alpha a7 IV (Body Only) delivers reliable low-light performance and rugged build for astrophotography, lab documentation, and field expeditions.
The Centre for Tactile Internet with Human-in-the-Loop research focuses on developing intelligent and adaptive systems for real-time communication. The goal is to create a network that links people, learning from human insights to improve machines.
The open-source deal.II library has been awarded $1.7 million in National Science Foundation funding to continue its development and support a growing community of users. The new funding will enable researchers to expand documentation, training modules, and infrastructure to further improve the software.
Researchers Jeff Lei and Dimitris Simos are working on a three-year grant to develop a new approach to testing the security of blockchain and IoT systems. They will use interaction testing to generate test cases and check for security properties compromised. This approach aims to avoid common vulnerabilities in these systems.
A new study by Singapore Management University finds that the US and China have distinct stances on e-commerce regulation, with the US prioritizing digital barriers and China focusing on traditional trade barriers. The study suggests that policy makers should look for areas of common interest to bring down trade barriers.
Sky & Telescope Pocket Sky Atlas, 2nd Edition
Sky & Telescope Pocket Sky Atlas, 2nd Edition is a durable star atlas for planning sessions, identifying targets, and teaching celestial navigation.
A new screening tool at UBC evaluates online health ads for deception by assigning points based on persuasion techniques used. The tool found that bodybuilding, medicinal products, and lifestyle ads are most common deceptive types.
Researchers aim to understand how individuals protect their personal data in the digital age. The new study will develop survey instruments and conduct qualitative fieldwork to identify different strategies for navigating algorithmic privacy. It also plans to create experimental prototype tools to explore the design space around algori...
A team of researchers has developed a new proactive defense technique called moving target defense (MTD) to protect computer systems from cyberattacks. MTD involves changing the IP address of computers frequently enough to confuse attackers and make it harder for them to exploit vulnerabilities.
Researchers found a strong seasonal pattern in online search activity for cardiovascular disease, with higher volumes during winter months. US states with higher CVD mortality also showed increased search interest compared to regions with lower CVD mortality rates.
Researchers have developed printable metal tags that reflect WiFi signals, turning everyday objects into 'smart' Internet of Things devices. These tags can be attached to various objects and track user interactions, such as water bottle hydration levels or motor activity after a stroke.
Meta Quest 3 512GB
Meta Quest 3 512GB enables immersive mission planning, terrain rehearsal, and interactive STEM demos with high-resolution mixed-reality experiences.
Researchers at Ruhr-University Bochum discovered vulnerabilities in IPsec's IKEv1 protocol, which enable attackers to intercept specific information. The Bleichenbacher attack was successful against four network equipment providers, prompting manufacturers to eliminate security gaps.
A new study by Bocconi University scholars found that broadband internet access causes sleep deprivation, particularly among individuals with DSL lines. These individuals sleep 25 minutes less than those without DSL Internet and are less likely to reach the recommended amount of sleep, leading to significant economic losses in Germany.
A new study from Princeton University reveals that a large proportion of internet traffic passes through the US, despite efforts to reduce dependence. The Region-Aware Networking (RAN) tool allows users to reroute traffic, avoiding certain countries like Brazil, India, and Kenya.
Researchers developed a computer program that scans for warning signs in language used by participants at the start of a conversation to predict which civil conversations would go awry. Early exchanges with greetings and expressions of gratitude were more likely to remain civil.
GoPro HERO13 Black
GoPro HERO13 Black records stabilized 5.3K video for instrument deployments, field notes, and outreach, even in harsh weather and underwater conditions.
A new University of Guelph study found that exposure to positive comments on social media improved participants' attitudes about recovery from non-suicidal self-injury (NSSI). The study suggests that harnessing social media and online content can instill hope, foster recovery, and provide reliable resources.
The British Library Endangered Archives Programme has extended a UTA-led project to digitize colonial documents in Cuba by another six months. The project aims to capture over two million documents, shedding light on the African diaspora in Cuba between the 16th and 19th centuries.
A decade of research reveals most top websites fail to provide secure password advice, with some allowing single-character passwords and basic words. Experts warn that clear guidance is essential for users to ensure their data remains safe.
Researchers analyzed over 51 million tweets to find that people are more likely to interact with those geographically near, even in the age of digital technologies. This study challenges the idea that geography is dead and instead highlights the importance of distance in human interactions.
GQ GMC-500Plus Geiger Counter
GQ GMC-500Plus Geiger Counter logs beta, gamma, and X-ray levels for environmental monitoring, training labs, and safety demonstrations.
NASA's PACE mission will use Delay/Disruption Tolerant Networking (DTN) to demonstrate the first key opportunity of this revolutionary capability. DTN enables information to be sent through space and ground networks without a continuous path, making it ideal for remote locations with limited network connectivity.
A new study found that approximately half of news articles about the Montreal Cognitive Assessment (MoCA) in relation to President Trump embedded or hyperlinked to parts of the questionnaire. This has raised concerns among researchers about patients' prior exposure to the test, potentially affecting its validity.
A new study suggests that thousands of miles of buried fiber optic cable in densely populated coastal regions may be inundated by rising seas within 15 years. The study found that over 4,000 miles of conduit will be underwater and 1,100 traffic hubs will be surrounded by water by 2033, potentially disrupting global communications.
A researcher at MSU developed an algorithm to improve information security tools by reducing the complexity of scalar multiplication in elliptical curve transformations. The new algorithm achieves a 5% reduction in precomputation stage complexity and a 4% reduction in main stage complexity.
A new practical Quantum Random Number Generator (QRNG) has been developed, enabling secure communication and overcoming weaknesses of current encryption. This game-changing technology will revolutionize internet security, making attacks based on predicting 'random' events a thing of the past.
Nikon Monarch 5 8x42 Binoculars
Nikon Monarch 5 8x42 Binoculars deliver bright, sharp views for wildlife surveys, eclipse chases, and quick star-field scans at dark sites.
The article highlights predatory monetization schemes in video games, such as loot boxes, that can encourage repeated spending and blur the line between gaming and online gambling. These schemes have been linked to Internet gaming disorder and pose significant financial risks to vulnerable players.
Researchers at the University of Konstanz are analyzing denial-of-service attacks to understand their influence on politics and international attention. The study aims to map global patterns of cyberattacks, evaluate their relationship with traditional forms of contention, and identify consequences for protest dynamics.
Researchers analyzed over 5 terabytes of internet-scale data to provide a unique 24-hour view of cyberattacks in Florida and the U.S., revealing top infected states, cities, and industries. The 'FloridaSOAR' program aims to detect compromises, remediate privacy issues, and provide resiliency to critical infrastructure.
Researchers at QuTech in Delft successfully generated quantum entanglement between two quantum chips faster than it's lost, enabling the creation of a future quantum internet. The breakthrough allows for the connection of multiple quantum nodes and the establishment of the world's first quantum network.
The study finds that both state and non-state actors face similar decisions when it comes to claiming credit for cyberattacks, but their strategies diverge due to different optics. The researchers highlight the importance of understanding how attackers' motives and identity can be revealed through credit claims.
Apple MacBook Pro 14-inch (M4 Pro)
Apple MacBook Pro 14-inch (M4 Pro) powers local ML workloads, large datasets, and multi-display analysis for field and lab teams.
The new transmitter uses ultrafast 'frequency hopping' and data encryption to protect signals from being intercepted and jammed. This technology could secure medical devices, wearables, vehicles, and smart household technologies, making the internet of things a more secure place.
A new analysis of US internet search data found a strong association between anti-Muslim and pro-ISIS searches in ethnically alike communities with high poverty levels. The study suggests that counterterrorism policies targeting Muslims may inadvertently increase radicalization in these communities.