-
New Approach Detects Adversarial Attacks in Multimodal AI Systems
New vulnerabilities have emerged with the rapid advancement and adoption of multimodal foundational AI models, significantly expanding the potential for cybersecurity attacks. Topological signatures key to revealing attacks, identifying origins of threats.
-
-
Groundwater Is Drying Out, Heating Up, and Causing Sea Level Rise
Overuse has created zones of “mega-drying” around the world —and caused more sea level rise than Greenland’s ice sheet.
-
-
How Poisoned Data Can Trick AI − and How to Stop It
The quality of the information that the AI offers depends on the quality of the data it learns from If someone tries to interfere with those systems by tampering with their training data –either the initial data used to build the system or data the system collects as it’s operating to improve –trouble could ensue.
-
-
First-of-its-Kind Industrial System Security Course
The University of Arkansas at Little Rock (UA Little Rock) is giving students the tools to protect the systems that power modern life through a new course focused on industrial system security.
-
-
Climate Models Reveal How Human Activity May Be Locking the Southwest into Permanent Drought
A new wave of climate research is sounding a stark warning: Human activity may be driving drought more intensely –and more directly –than previously understood. One example: The southwestern United States has been in a historic megadrought for much of the past two decades, with its reservoirs including lakes Mead and Powell dipping to record lows and legal disputes erupting over rights to use water from the Colorado Rive.
-
-
Filtered Data Stops Openly Available AI Models from Performing Dangerous Tasks
Researchers have reported a major advance in safeguarding open-weight language models. By filtering out potentially harmful knowledge during training, the researchers were able to build models that resist subsequent malicious updates – especially valuable in sensitive domains such as biothreat research.
-
-
Asteroid Hunting Using Heliostats?
Most planetary defense efforts use observatory-grade telescopes to produce images of the stars. Within those images, computational methods identify streaks, which are asteroids. This process is precise but time-consuming, and building new observatories is expensive. A Researcher says that heliostats, which typically turn solar energy into electricity, could help find asteroids at night. Most planetary defense efforts use observatory-grade telescopes to produce images of the stars. Within those images, computational methods identify streaks, which are asteroids. This process is precise but time-consuming, and building new observatories is expensive. A Researcher says that heliostats, which typically turn solar energy into electricity, could help find asteroids at night.
-
-
Risk Assessment with Machine Learning
Researchers utilize geological survey data and machine learning algorithms for accurately predicting liquefaction risk in earthquake-prone areas.
-
-
HHS Scraps Further Work on Life-Saving mRNA Vaccine Platform
In what experts say will hobble pandemic preparedness, HHS Secretary Robert F. Kennedy Jr. announced the dismantling of the country’s mRNA vaccine-development programs—the same innovation that allowed rapid scale-up of COVID-19 vaccines during the public health emergency.
-
-
RFK Jr Is Wrong About mRNA Vaccines – a Scientist Explains How They Make COVID Less Deadly
In announcing the cancellation of US government support for research into mRNA vaccines, Kennedy has claimed that mRNA vaccines “encourage new mutations and can actually prolong pandemics” – a misleading statement that contradicts the scientific consensus on viral evolution and effects of vaccination. The false assertions by RFK Jr. and other vaccine-skeptics notwithstanding, mRNA vaccines do not cause viruses to mutate. Mutations are part of viral evolution: a natural process that happens regardless of our intervention. What vaccines do is give us a fighting chance.
-
-
Incentives for U.S.-China Conflict, Competition, and Cooperation Across Artificial General Intelligence’s Five Hard National Security Problems
The prospect of either the United States or the People’s Republic of China —or both—achieving artificial general intelligence (AGI) is likely to heighten tensions and could even increase the risk of competition spiraling into conflict. But the emergence of AGI could also create incentives for risk reduction and cooperation. We argue that both will not only be possible but essential.
-
-
Securing South Korea's Critical Minerals Supply Chains Through Trilateral Cooperation
South Korea, Japan, and the United States’ trilateral partnership has expanded to include collaboration on economic security, including on critical minerals supply chains (CMSCs). A new report offers analysis and tools for supply chain net assessment, supply chain cooperation, and economic security.
-
-
Hundreds of Old EV Batteries Have New Jobs in Texas: Stabilizing the Power Grid
After reaching the end of their automotive lives, the batteries are being reused to provide lower-cost grid energy storage.
-
-
To Better Detect Chemical Weapons, Materials Scientists Are Exploring New Technologies
Chemical warfare is one of the most devastating forms of conflict. It leverages toxic chemicals to disable, harm or kill without any physical confrontation. Across various conflicts, it has caused tens of thousands of deaths and affected over a million people through injury and long-term health consequences.
-
-
DHS S&T Launches Third Phase of Industry Competition to Develop Remote Identity Verification Tech
DHS S&T’s has announced the third phase of the Remote Identity Validation Rally (RIVR), which challenges the private sector to deliver secure, accurate, and user-friendly technologies that can combat identity fraud when users apply for government services, open bank accounts, or verify social media accounts.
-
More headlines
The long view
Building Trust into Tech: A Framework for Sovereign Resilience
Governments are facing a critical question: who can be trusted to build and manage their countries’ most sensitive systems? Vendor choices, for everything from cloud infrastructure to identity platforms, are no longer just commercial; they are strategic.
Researchers Unveil First-Ever Defense Against Cryptanalytic Attacks on AI
Security researchers have developed the first functional defense mechanism capable of protecting against “cryptanalytic” attacks used to “steal” the model parameters that define how an AI system works.
Data Centers’ Insatiable Demand for Electricity Will Change the Entire Energy Sector
When the first large language models were unleashed, it triggered a headache for authorities around the world as they tried to figure out how to satisfy data centers’ endless demand for electricity.
Will Texas Actually Run Out of Water?
You asked our AI chatbot about Texas’ water supply. We answered some of the questions that it couldn’t.
