-
Mathematics Works in Serendipitous Ways
In the digital era and moving towards quantum computing, protecting data against hack attacks is one of our biggest challenges. Mathematical theorem used to crack U.S. government encryption algorithm.
-
-
Carbon-Hungry Microorganisms to Help Battle Climate Change
Scientists have demonstrated a new technique, modeled after a metabolic process found in some bacteria, for converting carbon dioxide (CO2) into liquid acetate, a key ingredient in “liquid sunlight” or solar fuels produced through artificial photosynthesis. New technique could fast-track future carbon-free solar fuels.
-
-
Using Blockchain to Increase Electric Grid Resiliency
Blockchain is best known for securing digital currency payments, but researchers are using it to track a different kind of exchange: It’s the first time blockchain has ever been used to validate communication among devices on the electric grid.
-
-
Top Prosecutors in CA, NY and DC Are Speaking Up for End-to-End Encryption
We all should have the ability to have a private conversation, and it follows that we need ways to communicate privately online as well. In the digital world, end-to-end encryption is our best chance to maintain our privacy and security.
-
-
Simple Hardware to Defend Against Microgrid Attacks
An inexpensive piece of hardware integrated with solar panel controllers can protect isolated power networks from cyberattacks.
-
-
A Growing Threat: Deliberate, Simultaneous Release of Pandemic Viruses Across Travel Hubs
COVID-19 demonstrated how the world is clearly vulnerable to the introduction of a single pandemic virus with a comparatively low case fatality rate. The deliberate and simultaneous release of many pandemic viruses across travel hubs could threaten the stability of civilization. Current trends suggest that within a decade, tens of thousands of skilled individuals will be able to access the information required for them single-handedly to cause new pandemics.
-
-
Examining Vulnerabilities of Electric Vehicle Charging Infrastructure
With electric vehicles becoming more common, the risks and hazards of a cyberattack on electric vehicle charging equipment and systems also increases. Reviewing the vulnerabilities of EV charging infrastructure would help prioritize grid protections and informs policy makers.
-
-
Maintaining Mountain Snowpacks Essential for Preserving Valuable Freshwater Resource
Snowcapped mountains generate mountain water runoff and snowmelt, which flow down to streams, rivers, lakes, and oceans. Around a quarter of the world depends on these natural “water towers” to replenish downstream reservoirs and groundwater aquifers for urban water supplies, agricultural irrigation, and ecosystem support. Carbon mitigation strategies are needed to maintain snowpack throughout the Americas.
-
-
Germany’s China Policy: Has It Learned from Its Dependency on Russia?
The German economy remains heavily dependent on China, its largest trading partner, despite mounting geopolitical tensions between the West and Beijing.
-
-
EFF's Atlas of Surveillance Database Now Documents 10,000+ Police Tech Programs
The EFF has created a searchable and mappable repository of which law enforcement agencies in the U.S. use surveillance technologies such as body-worn cameras, drones, automated license plate readers, and face recognition.
-
-
Drones Employed in the Ukraine War
Unmanned systems have revolutionized modern warfare – and pilotless aircraft have had a significant impact in the war in Ukraine.
-
-
The Benefits of Integrating Electric Vehicles into Electricity Distribution Systems
As the cost of EVs continues to decrease, the industry matures, incentives grow, and charging infrastructure improves, EVs could make up the vast majority of vehicles on the road in 2050. Many studies have looked at how increased electricity demand will affect the bulk power system in the United States, but public analysis of the impacts on the distribution system has been less prevalent.
-
-
Why Do Self-Driving Cars Crash?
As they traverse the air, land, or sea, encountering one another or other obstacles, these autonomous vehicles will need to talk to each other. Experts say we need to inject cybersecurity at every level of the autonomous vehicle networks of the future.
-
-
Nextgen Cybersecurity: A 5G-Enabled AI-Based Malware Classification System
Researchers develop a 5G-enabled deep learning approach for classifying malware attacks on the Industrial Internet of Things.
-
-
How Foreign Intelligence Services Compromise, Exploit U.S. Technology
Foreign intelligence services have intensified their efforts to compromise or exploit U.S. technology. A new report analyzes foreign collection attempts to obtain unauthorized access to sensitive or classified information and technology.
-
More headlines
The long view
Nuclear Has Changed. Will the U.S. Change with It?
Fueled by artificial intelligence, cloud service providers, and ambitious new climate regulations, U.S. demand for carbon-free electricity is on the rise. In response, analysts and lawmakers are taking a fresh look at a controversial energy source: nuclear power.
Exploring the New Nuclear Energy Landscape
In the last few years, the U.S. has seen a resurgence of interest in nuclear energy and its potential for helping meet the nation’s growing demands for clean electricity and energy security. Meanwhile, nuclear energy technologies themselves have advanced, opening up new possibilities for their use.