• Researchers Devise a Way to Evaluate Cybersecurity Methods

    A savvy hacker can obtain secret information, such as a password, by observing a computer program’s behavior, like how much time that program spends accessing the computer’s memory. Security approaches that completely block these “side-channel attacks” are so computationally expensive, so engineers often apply what are known as obfuscation schemes. MIT researchers have developed a system which analyzes the likelihood that an attacker could thwart a certain security scheme to steal secret information.

  • How Secure Are Voice Authentication Systems Really?

    Voice authentication has increasingly been used in remote banking, call centers and other security-critical scenarios. Attackers can break voice authentication with up to 99 percent success within six tries.

  • Energy Transition with Hydrogen Generated on Rooftops

    Efficient production of hydrogen, fuels, and even drinking water on roofs or in solar parks – this is what researchers want to achieve with low-cost photoreactor modules. Now, they have made major progress.

  • U.S. Agencies Buy Vast Quantities of Personal Information on the Open Market – a Legal Scholar Explains Why and What It Means for Privacy in the Age of AI

    The issues pf the protection of personal information in the digital age is increasingly urgent. Today’s commercially available information, coupled with the now-ubiquitous decision-making artificial intelligence and generative AI like ChatGPT, significantly increases the threat to privacy and civil liberties by giving the government access to sensitive personal information beyond even what it could collect through court-authorized surveillance.

  • Testing Next Generation Flood and Wildfire Alerting Technology

    DHS S&T conducted a demonstration of new technology that integrates unattended flood and wildfire sensors with Integrated Public Alert Warning System (IPAWS) with Open Platform for Emergency Networks (IPAWS-OPEN). These systems have the potential to provide life-saving critical emergency alerts to people in affected areas.

  • Extreme Heat Will Cost the U.S. $1 Billion in Health Care Costs — This Summer Alone

    Extreme heat — summertime temperatures and humidity that exceed the historical average — is being made more frequent and intense by climate change. High temperatures could lead to 235,000 ER visits and 56,000 hospital admissions for heat-related conditions annually.

  • Opportunities for Australia–ASEAN Collaboration on Critical Minerals

    Southeast Asia’s energy transition is coming to life as the development of green technologies accelerates across the region. Securing critical minerals will be crucial to this process, and Australia should work with Southeast Asia to realize their mutual goals in this area.

  • Climate Change Has Sent Temperatures Soaring in Texas

    Hotter days and nights. More record highs. Climate change has shifted the entire range of Texas heat upwards. Heat is one of the deadliest consequences of climate change. It’s already the most dangerous type of weather, typically killing more people annually than hurricanes, tornadoes or flooding.

  • Tidal Energy Project for Carbon Emission Reduction and Energy Security

    The University of Oxford will lead an ambitious £7 million project to help deliver scalable, affordable and sustainable tidal stream energy. The project will address the key challenges that are currently preventing the tidal energy sector from reaching its full potential, with the aim of boosting energy security.

  • FireDrone Supports the Firefighters

    Researchers are developing a heat-resistant drone that can analyze the source of danger at close range in the event of a building or forest fire. This allows firefighters to optimize the strategy of a high-risk operation before entering the danger zone.

  • Who Will Benefit from Australia’s Critical Minerals Strategy?

    Critical mineral projects will be favored for Australian federal government loans under its new critical minerals strategy, but there are to be no tailored tax breaks. Nor are there any plans to make downstream processing a condition of mining or export approvals.

  • Four Ways Criminals Could Use AI to Target More Victims

    Warnings about artificial intelligence (AI) are ubiquitous right now, but we have been using AI tools for a long time. AI is a tool to increase efficiency, process and sort large volumes of data, and offload decision making – and these tools are open to everyone, including criminals. Observing how criminals have adapted to, and adopted, technological advances in the past, can provide some clues as to how they might use AI.

  • Titan Destroyed by “Catastrophic Implosion”

    The U.S. Coast Guard announced Thursday afternoon that the Titan submersible was likely destroyed by a catastrophic implosion. The Titan joins a sad, and long, list of lethal maritime accidents.

  • Rare Earth Elements in Turkey: Emerging Prospects

    Turkey discovered the world’s second-largest deposit of rare earth elements (REEs) in 2022, with an estimated reserve size of 694 million tons, making it the world’s second largest REEs deposit after China’s reserves of 800 million tons. China accounts for 60 percent of the worldwide REEs mined production, 85 percent of the world’s REEs processing capacity, and 90 percent share of the manufacturing of high-strength rare earth permanent magnets.

  • Robots Could Help Verify Compliance with Nuclear Arms Agreements

    Ensuring that countries abide by future nuclear arms agreements will be a vital task. Inspectors may have to count warheads or confirm the removal of nuclear weapons from geographical areas. Those hotspots could include underground bunkers and require confirmation that no weapons exist in a location at all. Now, researchers have devised an automated way to ensure compliance.