-
Freezing Out the Risk of Thermal Attacks
Thermal attacks use heat-sensitive cameras to read the traces of fingerprints left on surfaces like smartphone screens, computer keyboards and PIN pads. Hackers can use the relative intensity of heat traces across recently touched surfaces to reconstruct users’ passwords. A team of computer security experts have developed a set of recommendations to help defend against ‘thermal attacks’ which can steal personal information.
-
-
Better Resources to Mitigate Explosive Threats
Every second counts when responders encounter an explosive device, and critical decisions must be made quickly in order to neutralize the threat while also ensuring the security of civilians, property, and the responders themselves.
-
-
The New Technology Which Is Making Cars Easier for Criminals to Steal, or Crash
There is much talk in the automotive industry about the “internet of vehicles” (IoV). This describes a network of cars and other vehicles that could exchange data over the internet in an effort to make transportation more autonomous, safe and efficient. There are many benefits to IoV, but some of these systems might also make our vehicles prone to theft and malicious attack, as criminals identify and then exploit vulnerabilities in this new technology. In fact, this is already happening.
-
-
The Impending Privacy Threat of Self-Driving Cars
With innovations often come unintended consequences—one of which is the massive collection of data required for an autonomous vehicle to function. The sheer amount of visual and other information collected by a fleet of cars traveling down public streets conjures the threat of the possibility for peoples’ movements to be tracked, aggregated, and retained by companies, law enforcement, or bad actors—including vendor employees.
-
-
Safeguarding U.S. Laws and Legal Information Against Cyberattacks and Malicious Actors
NYU Tandon School of Engineering researchers will develop new technologies to secure the “digital legal supply chain” — the processes by which official laws and legal information are recorded, stored, updated and distributed electronically.
-
-
Randomized Data Can Improve Our Security
Huge streams of data pass through our computers and smartphones every day. In simple terms, technical devices contain two essential units to process this data: A processor, which is a kind of control center, and a RAM, comparable to memory. Modern processors use a cache to act as a bridge between the two, since memory is much slower at providing data than the processor is at processing it. This cache often contains private data that could be an attractive target for attackers.
-
-
Major Update to NIST’s Widely Used Cybersecurity Framework
The world’s leading cybersecurity guidance is getting its first complete makeover since its release nearly a decade ago. NIST has revised the framework to help benefit all sectors, not just critical infrastructure.
-
-
Bipartisan Texan Push in Congress to Boost Semiconductors, a Crucial Industry in the State
Republicans like Sen. Ted Cruz and Democrats like Rep. Colin Allred — opponents in the 2024 election — propose streamlining environmental reviews to promote investment and expansion by chipmakers.
-
-
Humans Unable to Detect Over a Quarter of Deepfake Speech Samples
New research has found that humans were only able to detect artificially generated speech 73% of the time, with the same accuracy in both English and Mandarin.
-
-
Reached: Milestone in Power Grid Optimization on World’s First Exascale Supercomputer
Ensuring the nation’s electrical power grid can function with limited disruptions in the event of a natural disaster, catastrophic weather or a manmade attack is a key national security challenge. Compounding the challenge of grid management is the increasing amount of renewable energy sources such as solar and wind that are continually added to the grid, and the fact that solar panels and other means of distributed power generation are hidden to grid operators.
-
-
Aging Bridge Detection Through Digital Image Correlation
Researchers have developed a novel and practical method of assessing the mechanical properties of structures, with potential application to structural health monitoring of large structures such as bridges and viaducts.
-
-
Using Artificial Mussels to Monitor Radioactivity in the Ocean
Amid the global concern over the pollution of radioactive wastes in the ocean, researchers have conducted a study which has found that “artificial mussels” (AMs) can effectively measure low concentrations of radionuclides in the sea. It is believed that this technology can be applied as a reliable and effective solution for monitoring radioactive contamination around the world.
-
-
Denying Denial-of-Service: Strengthening Defenses Against Common Cyberattack
A Denial-of-Service attack is a cyberattack that makes a computer or other device unavailable to its intended users. This is usually accomplished by overwhelming the targeted machine with requests until normal traffic can no longer be processed. Scientists have developed a better way to recognize a common internet attack, improving detection by 90 percent compared to current methods.
-
-
Fighting Fake “Facts” with Two Little Words: Grounding a Large Language Model's Answers in Reality
Asking ChatGPT for answers comes with a risk—it may offer you entirely made-up “facts” that sound legitimate. Despite having been trained on vast amounts of factual data, large language models, or LLMs, are prone to generating false information called hallucinations. Inspired by a phrase commonly used in journalism, the researchers conducted a study on the impact of incorporating the words “according to” in LLM queries.
-
-
Fact-Checking Found to Influence Recommender Algorithms
Researchers have shown that urging individuals to actively participate in the news they consume can reduce the spread of these kinds of falsehoods. “We don’t have to think of ourselves as captive to tech platforms and algorithms,” said a researcher.
-
More headlines
The long view
New Technology is Keeping the Skies Safe
DHS S&T Baggage, Cargo, and People Screening (BCP) Program develops state-of-the-art screening solutions to help secure airspace, communities, and borders
Factories First: Winning the Drone War Before It Starts
Wars are won by factories before they are won on the battlefield,Martin C. Feldmann writes, noting that the United States lacks the manufacturing depth for the coming drone age. Rectifying this situation “will take far more than procurement tweaks,” Feldmann writes. “It demands a national-level, wartime-scale industrial mobilization.”
How Artificial General Intelligence Could Affect the Rise and Fall of Nations
Visions for potential AGI futures: A new report from RAND aims to stimulate thinking among policymakers about possible impacts of the development of artificial general intelligence (AGI) on geopolitics and the world order.
Keeping the Lights on with Nuclear Waste: Radiochemistry Transforms Nuclear Waste into Strategic Materials
How UNLV radiochemistry is pioneering the future of energy in the Southwest by salvaging strategic materials from nuclear dumps –and making it safe.
Model Predicts Long-Term Effects of Nuclear Waste on Underground Disposal Systems
The simulations matched results from an underground lab experiment in Switzerland, suggesting modeling could be used to validate the safety of nuclear disposal sites.