Connect with us

Tech

Protect and Charge Your Apple Watch With Our Favorite Accessories

Published

on

Protect and Charge Your Apple Watch With Our Favorite Accessories


When you buy your Apple Watch, you get to choose which band you get. Skip the rubber bands, which are made from fluoroelastomer. While the company committed to removing PFAS from its products in 2022, we have not gotten confirmation that Apple’s products are PFAS-free.

I find the textile and metal bands to be much more attractive and comfortable than fluoroelastomer bands, which tend to trap sweat and irritate my skin. My favorite of the Apple bands you can choose at checkout this year is the Nike nylon woven Sport Loop. It’s soft, breathable, soaks up sweat, and is infinitely adjustable if your wrists swell when you run. It’s made from recycled polyester, spandex, and nylon, and the yarn is reflective if you’re running at night. It comes in five colors and three sizes, so it’s compatible with the 40-, 44-, and 46-mm watch sizes.



Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

Computer scientists are boosting US cybersecurity

Published

on

Computer scientists are boosting US cybersecurity


Credit: CC0 Public Domain

As cyber threats grow more sophisticated by the day, UC Riverside researchers are making computing safer thanks to research that targets some of the internet’s most pressing security challenges.

UCR computer science and engineering students and faculty in the Marlan and Rosemary Bourns College of Engineering are developing tools to expose hidden vulnerabilities, protect , and strengthen the digital defenses that safeguard everything from personal communications to national infrastructure.

Their work is on the forefront of cybersecurity innovation—and underscores the critical role of federal investment in higher education research.

“Cybersecurity impacts every aspect of our lives, from personal privacy to national security. At UC Riverside, with support from , we’re training the next generation of computer scientists and engineers who are already making the internet and IT systems safer for everyone,” said Amit Roy-Chowdhury, a Bourns professor and co-director of the UC Riverside Artificial Intelligence Research and Education (RAISE) Institute.

Here are examples of computer security innovations published and presented at conferences this year:

Protecting data in AI learning

As artificial intelligence spreads into health care, finance, and government, privacy is paramount. But UCR graduate student Hasin Us Sami discovered that even methods designed to keep sensitive information safe can be compromised.

His paper, “Gradient Inversion Attacks on Parameter-Efficient Fine-Tuning”, posted to the arXiv preprint server, shows that adversaries can reconstruct private images from a training process called federated learning that was thought to be safer. Federated learning lets users train AI models on their own devices without sharing raw data.

For example, several hospitals may want to team up to develop AI models that detect diseases from patient tissue image scans. The research found that attackers could reverse-engineer data from the information that is shared and demonstrated how malicious servers could retrieve private images during training from state-of-the-art learning architectures, underscoring the urgent need for stronger defenses. The work was recognized at the 2025 IEEE/CVF Conference on Computer Vision and Pattern Recognition, one of the top gatherings of AI researchers.

His paper was co-authored by graduate student Swapneel Sen, professors Amit K. Roy-Chowdhury and Srikanth V. Krishnamurthy, and assistant professor Basak Guler.

Unmasking firewall weaknesses

Research by graduate student Qing Deng focused on firewalls that millions rely on for protection. In the paper “Beyond the Horizon: Uncovering Hosts and Services Behind Misconfigured Firewalls,” published in the 2025 IEEE Symposium on Security and Privacy (SP), Deng and colleagues revealed that small configuration mistakes could open the door to cyber intruders.

By scanning the internet for unusual access points, Deng uncovered more than 2 million hidden services exposed by misconfigured firewalls—ranging from outdated servers to vulnerable home routers. These flaws, though overlooked for years, create what the team calls an “expanded observable internet,” a larger attack surface than security experts previously realized. The paper was co-authored by graduate students Juefei Pu, Zhaoweo Tan, and professors Zhiyun Qian and Srikanth V. Krishnamurthy.

Detecting invisible network flaws

For doctoral student Keyu Man, the threat of invisible “side-channel” attacks is a high priority. These attacks exploit subtle quirks in network protocols to allow hackers to hijack connections in a commonly used kind of server.

Known as “domain name system” servers, these computers translate human-friendly domain names into machine-readable IP addresses, allowing devices to find and connect to the right server.

Man co-authored the paper “SCAD: Towards a Universal and Automated Network Side-Channel Vulnerability Detection,” also published in the 2025 IEEE Symposium on Security and Privacy (SP), which introduces a tool called Side-ChAnnel Detector, or SCAD, to automatically uncover weaknesses in widely used operating systems like Linux and FreeBSD. Unlike previous methods that required weeks of painstaking manual work, SCAD can identify flaws in a single day of analysis.

Man’s research revealed 14 vulnerabilities—seven previously unknown—that could have been exploited for devastating cyberattacks. By automating the process, SCAD could change how industry protects critical online infrastructure.

The co-authors of this study include graduate students Zhongjie Wang, Yu Hao, Shenghan Zheng, Xin’an Zhou, Yue Cao, and professor Zhiyun Qian.

More information:
Hasin Us Sami et al, Gradient Inversion Attacks on Parameter-Efficient Fine-Tuning, arXiv (2025). DOI: 10.48550/arxiv.2506.04453

Qing Deng et al, Beyond the Horizon: Uncovering Hosts and Services Behind Misconfigured Firewalls, 2025 IEEE Symposium on Security and Privacy (SP) (2025). DOI: 10.1109/sp61157.2025.00164

Keyu Man et al, SCAD: Towards a Universal and Automated Network Side-Channel Vulnerability Detection, 2025 IEEE Symposium on Security and Privacy (SP) (2025). DOI: 10.1109/sp61157.2025.00068

Journal information:
arXiv


Citation:
Computer scientists are boosting US cybersecurity (2025, September 19)
retrieved 19 September 2025
from https://techxplore.com/news/2025-09-scientists-boosting-cybersecurity.html

This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.





Source link

Continue Reading

Tech

UK cyber action plan lays out path to resilience | Computer Weekly

Published

on

UK cyber action plan lays out path to resilience | Computer Weekly


A report produced for the government has today set out nine core recommendations for how the UK can strengthen its burgeoning cyber security sector to fuel resilience and growth across the economy.

Written by experts at Imperial College London (ICL) and the University of Bristol, and drawing on consultations with nearly 100 members of the cyber community, the UK cyber growth action plan slots into the government’s Modern Industrial Strategy, and will feed into an ongoing refresh of the National Cyber Strategy.

The report says that although the UK’s cyber sector remains on an upward trajectory, with jobs and revenue both rising by over 10% and gross value added (GVA) by over 20% in the past 12 months, taken as a whole, cyber is still undervalued. It describes “significant untapped potential” to go further still.

“The cyber security sector in the UK has significant growth potential, and there are clear roles for both government and the private sector identified … to contribute to tapping into that potential,” said Nigel Steward, director of the Centre for Sectoral Economic Performance (CSEP) at ICL.

“Supporting the sector isn’t just an economic opportunity, it’s essential for our national security and the resilience of businesses, so we at CSEP are very happy to have been able to produce this independent report in partnership with the University of Bristol to support the government’s Modern Industrial Strategy.”

Guy Poppy, pro vice-chancellor for research and innovation at the University of Bristol, added: “The UK’s cyber sector is a driver of innovation, resilience and economic growth. This action plan provides a timely roadmap, recognising how emerging technologies will shape future challenges and opportunities for stakeholders. It sets out a framework for research, skills and collaboration to turn innovation into growth and nationwide impact.

“By combining academic excellence with enterprise and policy engagement, we can help build a stronger, more resilient cyber ecosystem.”

Three pillars, nine recommendations

Each of the nine core recommendations is organised around three pillars – culture, leadership and places, designed to be implemented together to maximise their impact and force change at a systemic level.

The report’s authors caveated this by saying these are not designed to be exhaustive, and given how quickly the report was researched and compiled, it is likely that further work will be needed to create more granular recommendations.

On the first pillar, culture, the report recognises that growing British cyber businesses will depend on better interaction between product and service suppliers, and security buyers and leaders, and the first three recommendations are designed to address this.

  • First, government and stakeholders should review incentives and validation routes available to cyber businesses to help make it easier to navigate complex cyber demands and build a culture that helps organisations grow;
  • Second, government should stimulate growth by setting expectations on reporting cyber risk, encouraging uptake of cyber insurance and principles-based assurance, and possibly mandating the use of accreditations such as the National Cyber Security Centre’s (NCSC’s) Cyber Essentials scheme;
  • Third, cyber professionals should be engaged in civil society on their role in national resilience and prosperity to foster public participation in security. They could, for example, emphasise the role security teams at critical infrastructure operations play in keeping the nation’s homes lit and warm. This effort would also include shoring up cyber skills initiatives at schools and colleges to develop future talent.

On the second pillar, the report recognises that cyber leaders today tend not to be very focused on connecting supply and demand for sector growth. The fourth, fifth and sixth recommendations set out to address this.

  • The report recommends the appointment of a UK cyber growth leader to coordinate across the security sector and in the government. This role would encompass some duties previously held by the now-defunct UK cyber ambassador in promoting exports in support of the country’s national security, as well as a responsibility for driving forward a plan to prioritise cyber growth and integrate it into various policy areas;
  • Next, it calls for the appointment of “place-based leaders” who can convene and drive local cyber security growth initiatives and outcomes. Ideally, these individuals will have significant experience in the industry. Although they will work with the cyber growth leader, they should remain independent from all levels of government;
  • Then, the government should expand and better resource the NCSC, which the report’s authors describe as a “crown jewel” for cyber resilience, using its deep expertise in support of cyber growth, business guidance and validation, and technological research.

The third pillar recognises the role of “places” in innovation and growth. On this basis, the final three recommendations are designed to help attract cyber investors, shape research and development (R&D), and build relationships to help new security businesses get up and running.

  • Place-based leaders should be in place to develop future-oriented communities that bring together security pros and chief information security officers, academics, small and large businesses, government, and other stakeholders, to share perspectives and pursue solutions to security challenges. The goal here is to help initiate and deliver innovative projects, building a “culture of anticipation”;
  • Places should nurture distinct tech areas by being strategic in prioritising technologies and their areas of application based on local strengths and sector connections, aligned to government strategy. The goal here is local security strengths for local places that together are more than the sum of their parts and contribute to UK-wide growth;
  • Finally, places should create safe spaces or sandboxes, with on-tap infrastructure and data for various stakeholders to explore, create and conduct exercises such as role-playing cyber wargames. The goal here is not just to help create new initiatives, products and services, but to foster broader capabilities to serve in times of crises, should they arise.

All of these recommendations are underpinned by two principles – that the UK’s security sector should act as one team, and celebrate, build on and capitalise on the social capital in the cyber community, and that the benefits of cyber resilience and growth should always be recognised during discussions of value for money.

“The message from across the sector is clear,” said Simon Shiu, professor of cyber security at the University of Bristol, who led on the report’s creation.

“The UK has the talent, ambition and opportunity to lead in cyber security. We can do this by aligning growth with resilience, and making strategic choices that benefit the whole economy.”

NCC Group CEO Mike Maddison added: “The UK’s Cyber growth action plan is a bold step forward, recognising cyber not just as a technology, but as a strategic enabler of national resilience and economic growth. It builds on the Industrial Strategy’s clear message: cyber is a frontier industry.

“This plan sends a powerful signal to our clients and partners. It shows that the UK is serious about scaling innovation, investing in skills and commercialising research. And it confirms what we have always known, that cyber security is essential to the future of every sector.”



Source link

Continue Reading

Tech

Compact phononic circuits guide sound at gigahertz frequencies for chip-scale devices

Published

on

Compact phononic circuits guide sound at gigahertz frequencies for chip-scale devices


Topological phononic chip platform. a, Illustration of integrated devices that use topologically protected sound waves, including a phonon pump, an edge-waveguide, and an intensity modulator. b, Top: cross-section of the GaN-on-sapphire waveguide, showing its width (w) and thickness (h). Bottom: simulated vibration pattern of the main guided sound wave. c, Electron microscope image of the aluminum transducer used to generate 1.5 GHz phonons. d, Photo of the fabricated topological phononic chip. e, Diagram of the experimental setup, combining a custom optical vibrometer with a motorized stage to map how sound waves travel in the chip. Credit: Xu et al.

Phononic circuits are emerging devices that can manipulate sound waves (i.e., phonons) in ways that resemble how electronic circuits control the flow of electrons. Instead of relying on wires, transistors and other common electronic components, these circuits are based on waveguides, topological edge structures and other components that can guide phonons.

Phononic circuits are opening new possibilities for the development of high-speed communication systems, and various other technologies.

To be compatible with existing infrastructure, including current microwave communication systems, and to be used to develop highly performing quantum technologies, these circuits should ideally operate at gigahertz (GHz) frequencies. This essentially means that the sound waves they generate and manipulate oscillate billions of times per second.

Researchers at University of Science and Technology of China, Penn State University and other institutes recently developed new compact phononic circuits that can reliably guide sound waves at 1.5 GHz.

These new circuits, introduced in a paper published in Nature Electronics, could be used to create both quantum and classical devices that could advance communications, sensing and information processing.

“We were inspired by the success of integrated photonics and wanted to show that similar concepts could be applied to ,” Mourad Oudich, co-first author of the paper, told Tech Xplore.

“Our goal was to build tiny, chip-scale phononic circuits operating at GHz frequencies that are compact, reconfigurable, and robust enough for real-world applications.”

The circuits introduced by these researchers are designed to confine acoustic waves at GHz frequencies, guiding them through tiny waveguides on a chip. Notably, these wavelengths sit directly on a substrate, which could facilitate the circuits’ large-scale fabrication.

Compact and reconfigurable phononic circuits that operate at gigahertz frequencies
Illustration of the topological phononic waveguides. Credit: Prof. Changling Zou.

“Our phononic circuits are made of microscopic ‘highways’ that guide sound instead of light,” explained Oudich.

“By arranging these waveguides in special patterns, we create topological pathways where sound travels smoothly even around corners or defects. This makes the circuits more reliable and much smaller than traditional acoustic devices.”

To evaluate their phononic circuits, the researchers monitored the propagation of phonons inside them using a high-resolution scanning optical vibrometer. This is a device that can measure subtle vibrations on a surface, such as those produced by the movement of phonons through the waveguides.

Oudich and his colleagues injected phonons into their circuits’ edge channels and showed that they successfully traveled through the system without scattering. They also performed a so-called Mach-Zehnder Interferometer test, which confirmed the reconfigurability of their phononic devices (i.e., their ability to rapidly alter the paths of phonons).

“We demonstrated, for the first time, topological sound transport and a phononic Mach–Zehnder interferometer directly on a chip at gigahertz frequencies,” said Oudich.

“These advances could lead to new acoustic filters for communications and even help in developing phonon-based components for future quantum technologies.”

The reconfigurable devices developed by this team of researchers could soon be used to fabricate a wide range of technologies, including quantum processors, high-precision sensors and new hybrid communication systems. Oudich and his colleagues are currently planning further research aimed at combining their circuits with existing electronics and components.

“We now aim to integrate the phononic circuits with electronic and photonic systems, making them useful for hybrid technologies,” added Oudich.

“In the long run, we want to build a full ‘phononic toolbox’ for advanced information processing and sensing.”

Written for you by our author Ingrid Fadelli, edited by Sadie Harley, and fact-checked and reviewed by Robert Egan—this article is the result of careful human work. We rely on readers like you to keep independent science journalism alive.
If this reporting matters to you,
please consider a donation (especially monthly).
You’ll get an ad-free account as a thank-you.

More information:
Xin-Biao Xu et al, Gigahertz topological phononic circuits based on micrometre-scale unsuspended waveguide arrays, Nature Electronics (2025). DOI: 10.1038/s41928-025-01437-8.

© 2025 Science X Network

Citation:
Compact phononic circuits guide sound at gigahertz frequencies for chip-scale devices (2025, September 19)
retrieved 19 September 2025
from https://techxplore.com/news/2025-09-compact-phononic-circuits-gigahertz-frequencies.html

This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.





Source link

Continue Reading

Trending