Bluesky Facebook Reddit Email

New app can secure all your saved emails

The new Easy Email Encryption (E3) app automatically encrypts incoming emails on trusted devices, providing real-world security without requiring technical expertise. With receiver-controlled encryption and per-device key pairs, E3 makes email protection accessible to non-technical users.

Kestrel 3000 Pocket Weather Meter

Kestrel 3000 Pocket Weather Meter measures wind, temperature, and humidity in real time for site assessments, aviation checks, and safety briefings.

Putting the UK at the forefront of wireless communications

The UK is set to lead wireless communications technology with the DLINK project, which aims to deliver 'fibre-in-air' communication links with unprecedented data rates and transmission distances. The project exploits a new portion of the wireless spectrum, called D-band, enabling high data rates of up to 45Gb/s.

Where are teens getting their electronic cigarettes?

Daily teen e-cigarette users are more likely to purchase from commercial sources like drug stores and vape shops, while non-daily users turn to friends and family. The study suggests restricting e-cigarette sales and informing parents about online purchases to prevent adolescent access.

SAMSUNG T9 Portable SSD 2TB

SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.

Researchers study how internet impacts orthodox Christianity

The project aims to understand how the Internet has influenced Orthodox Christianity, particularly in terms of social media and online practices. Researchers plan to analyze blogs, interview churchgoers, and examine the role of social media in shaping Orthodox traditions.

Your body is your internet -- and now it can't be hacked

Purdue University engineers have created a way to secure communication signals within the human body, using low-frequency carrier-less transmission to prevent interception. This technology enables covert communication channels, making it difficult for hackers to access sensitive information.

Apple iPhone 17 Pro

Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.

Rigol DP832 Triple-Output Bench Power Supply

Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.

Speed of light: Toward a future quantum internet

Researchers have demonstrated proof-of-principle for an all-photonic quantum repeater, a critical step in long-distance quantum communication. This technology could enable faster and more secure global quantum Internet applications.

Putting understudied terrorists under a microscope

Researchers at Michigan State University found that ideological cyberterrorist attacks by far-left groups are on the rise, targeting companies and organizations with data breaches, web defacements, and doxing. The attacks have a significant economic and emotional impact, making them a growing threat.

DJI Air 3 (RC-N2)

DJI Air 3 (RC-N2) captures 4K mapping passes and environmental surveys with dual cameras, long flight time, and omnidirectional obstacle sensing.

New AI can detect urinary tract infections

The new AI system uses machine learning algorithms to identify early symptoms of urinary tract infections in people with dementia. This allows for earlier treatment and reduction in hospitalizations, according to researchers at the University of Surrey.

Anonymous yet trustworthy

Researchers at UC Santa Barbara created an application to safeguard group members' anonymity while verifying the reliability of posts. The app allows communities to create secure groups on social media, enabling them to build trust with their readership over time.

Yale chemists find a new tool for understanding enzymes -- Google

Yale researchers used Google's algorithm to understand how information is transferred between enzyme sites, identifying crucial amino acids. This breakthrough could lead to new antibiotics, pesticides, and herbicides, combining data science with molecular dynamics simulations and NMR spectroscopy.

Online gaming addiction in men affects brain's impulse control

A new study using functional MRI found that men with online gaming addiction have altered brain activity compared to healthy controls, particularly in the superior frontal gyrus. In contrast, women with IGD did not exhibit these changes. The study suggests a potential link between gender-specific brain function and online gaming disorder.

Apple iPad Pro 11-inch (M4)

Apple iPad Pro 11-inch (M4) runs demanding GIS, imaging, and annotation workflows on the go for surveys, briefings, and lab notebooks.

Chemistry freed from space and time

Researchers have successfully used remote servers in Japan to autonomously optimize conditions for synthesizing drugs in a British laboratory. The process was controlled over the internet by researchers in the USA, demonstrating the potential of cloud-based approaches for international collaboration and efficient production processes.

What's next for smart homes: An 'Internet of Ears?'

Researchers at Case Western Reserve University are developing a new system that uses changes in vibrations, sound, and electrical fields to improve energy consumption and monitor occupants' movements. The system has the potential to provide energy savings, track structural integrity, and enhance building safety.

People with Internet addiction react the worst when WiFi fails

A study found that individuals with fear of missing out, internet addiction, and certain personality traits exhibit more extreme reactions to digital technology failures. People who are more neurotic and extroverted tend to have the most maladaptive responses when their devices stop working.

These new techniques expose your browsing history to attackers

Researchers have discovered four new ways to 'history sniffing' attacks, which can profile a user's online activity in seconds and work across recent web browsers. The attacks can be used by hackers to learn which websites users have visited, and could also be deployed by legitimate companies for marketing and advertising purposes.

CalDigit TS4 Thunderbolt 4 Dock

CalDigit TS4 Thunderbolt 4 Dock simplifies serious desks with 18 ports for high-speed storage, monitors, and instruments across Mac and PC setups.

A billion Euros for quantum research

Researchers at the Niels Bohr Institute will receive funding for projects developing quantum technologies with applications in secure communication, supercomputing, and precision measurements. The EU's Flagship program aims to create a 'quantum internet' with unbreakable communication.

QuTech researchers put forward a roadmap for quantum internet development

Researchers at QuTech have developed a comprehensive guide towards a world-wide quantum internet, describing six phases of network development from simple qubit networks to fully quantum-connected computers. This will enable secure quantum communications and applications such as precise clock synchronization and virtual telescopes.

Clemson researcher warns of spread of homemade steroids

Homemade steroids have become a widespread issue, with online tools and cryptocurrency facilitating their rapid spread. Clemson researcher Bryan Denham's study examines the impact of these substances on public health, noting that purchasing black-market steroids is similar to buying other illicit substances.

Sony Alpha a7 IV (Body Only)

Sony Alpha a7 IV (Body Only) delivers reliable low-light performance and rugged build for astrophotography, lab documentation, and field expeditions.

Simulation software with humble beginnings receives $1.7 million from NSF

The open-source deal.II library has been awarded $1.7 million in National Science Foundation funding to continue its development and support a growing community of users. The new funding will enable researchers to expand documentation, training modules, and infrastructure to further improve the software.

UTA computer scientist working to test security of IoT systems, blockchains

Researchers Jeff Lei and Dimitris Simos are working on a three-year grant to develop a new approach to testing the security of blockchain and IoT systems. They will use interaction testing to generate test cases and check for security properties compromised. This approach aims to avoid common vulnerabilities in these systems.

Study sheds light on why the US and China don't see eye-to-eye on e-commerce

A new study by Singapore Management University finds that the US and China have distinct stances on e-commerce regulation, with the US prioritizing digital barriers and China focusing on traditional trade barriers. The study suggests that policy makers should look for areas of common interest to bring down trade barriers.

Sky & Telescope Pocket Sky Atlas, 2nd Edition

Sky & Telescope Pocket Sky Atlas, 2nd Edition is a durable star atlas for planning sessions, identifying targets, and teaching celestial navigation.

What's your data privacy style?

Researchers aim to understand how individuals protect their personal data in the digital age. The new study will develop survey instruments and conduct qualitative fieldwork to identify different strategies for navigating algorithmic privacy. It also plans to create experimental prototype tools to explore the design space around algori...

Army research takes proactive approach to defending computer systems

A team of researchers has developed a new proactive defense technique called moving target defense (MTD) to protect computer systems from cyberattacks. MTD involves changing the IP address of computers frequently enough to confuse attackers and make it harder for them to exploit vulnerabilities.

These tags turn everyday objects into smart, connected devices

Researchers have developed printable metal tags that reflect WiFi signals, turning everyday objects into 'smart' Internet of Things devices. These tags can be attached to various objects and track user interactions, such as water bottle hydration levels or motor activity after a stroke.

Meta Quest 3 512GB

Meta Quest 3 512GB enables immersive mission planning, terrain rehearsal, and interactive STEM demos with high-resolution mixed-reality experiences.

Security gaps identified in Internet protocol 'IPsec'

Researchers at Ruhr-University Bochum discovered vulnerabilities in IPsec's IKEv1 protocol, which enable attackers to intercept specific information. The Bleichenbacher attack was successful against four network equipment providers, prompting manufacturers to eliminate security gaps.

Broadband Internet causes sleep deprivation, a new study finds

A new study by Bocconi University scholars found that broadband internet access causes sleep deprivation, particularly among individuals with DSL lines. These individuals sleep 25 minutes less than those without DSL Internet and are less likely to reach the recommended amount of sleep, leading to significant economic losses in Germany.

GoPro HERO13 Black

GoPro HERO13 Black records stabilized 5.3K video for instrument deployments, field notes, and outreach, even in harsh weather and underwater conditions.

Despite digital revolution, distance still matters

Researchers analyzed over 51 million tweets to find that people are more likely to interact with those geographically near, even in the age of digital technologies. This study challenges the idea that geography is dead and instead highlights the importance of distance in human interactions.

GQ GMC-500Plus Geiger Counter

GQ GMC-500Plus Geiger Counter logs beta, gamma, and X-ray levels for environmental monitoring, training labs, and safety demonstrations.

Disruption tolerant networking to demonstrate internet in space

NASA's PACE mission will use Delay/Disruption Tolerant Networking (DTN) to demonstrate the first key opportunity of this revolutionary capability. DTN enables information to be sent through space and ground networks without a continuous path, making it ideal for remote locations with limited network connectivity.

Public attention on cognitive evaluation test used on President Trump

A new study found that approximately half of news articles about the Montreal Cognitive Assessment (MoCA) in relation to President Trump embedded or hyperlinked to parts of the questionnaire. This has raised concerns among researchers about patients' prior exposure to the test, potentially affecting its validity.

Study suggests buried Internet infrastructure at risk as sea levels rise

A new study suggests that thousands of miles of buried fiber optic cable in densely populated coastal regions may be inundated by rising seas within 15 years. The study found that over 4,000 miles of conduit will be underwater and 1,100 traffic hubs will be surrounded by water by 2033, potentially disrupting global communications.

Game-changing invention to revolutionize Internet security

A new practical Quantum Random Number Generator (QRNG) has been developed, enabling secure communication and overcoming weaknesses of current encryption. This game-changing technology will revolutionize internet security, making attacks based on predicting 'random' events a thing of the past.

Nikon Monarch 5 8x42 Binoculars

Nikon Monarch 5 8x42 Binoculars deliver bright, sharp views for wildlife surveys, eclipse chases, and quick star-field scans at dark sites.

Microtransactions can move popular online games closer to online gambling

The article highlights predatory monetization schemes in video games, such as loot boxes, that can encourage repeated spending and blur the line between gaming and online gambling. These schemes have been linked to Internet gaming disorder and pose significant financial risks to vulnerable players.

The politics of cyberattacks

Researchers at the University of Konstanz are analyzing denial-of-service attacks to understand their influence on politics and international attention. The study aims to map global patterns of cyberattacks, evaluate their relationship with traditional forms of contention, and identify consequences for protest dynamics.

Report provides 24-hour view of cyberattacks in Florida, US

Researchers analyzed over 5 terabytes of internet-scale data to provide a unique 24-hour view of cyberattacks in Florida and the U.S., revealing top infected states, cities, and industries. The 'FloridaSOAR' program aims to detect compromises, remediate privacy issues, and provide resiliency to critical infrastructure.

Delft scientists make first 'on demand' entanglement link

Researchers at QuTech in Delft successfully generated quantum entanglement between two quantum chips faster than it's lost, enabling the creation of a future quantum internet. The breakthrough allows for the connection of multiple quantum nodes and the establishment of the world's first quantum network.

Claiming credit for cyberattacks

The study finds that both state and non-state actors face similar decisions when it comes to claiming credit for cyberattacks, but their strategies diverge due to different optics. The researchers highlight the importance of understanding how attackers' motives and identity can be revealed through credit claims.

Apple MacBook Pro 14-inch (M4 Pro)

Apple MacBook Pro 14-inch (M4 Pro) powers local ML workloads, large datasets, and multi-display analysis for field and lab teams.

Novel transmitter protects wireless devices from hackers

The new transmitter uses ultrafast 'frequency hopping' and data encryption to protect signals from being intercepted and jammed. This technology could secure medical devices, wearables, vehicles, and smart household technologies, making the internet of things a more secure place.