logo
Soft vine-like robot helps rescuers find survivors

Soft vine-like robot helps rescuers find survivors

Fox News28-04-2025
When disaster strikes and buildings collapse, every second counts for emergency responders searching for survivors trapped beneath rubble. Traditional tools often fall short in these dangerous, chaotic environments, but a new breed of robot, SPROUT, is poised to make a life-saving difference.
Join the FREE "CyberGuy Report": Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my free "Ultimate Scam Survival Guide" when you sign up!
SPROUT, short for Soft Pathfinding Robotic Observation Unit, is a flexible, vine-like robot developed by MIT Lincoln Laboratory in collaboration with the University of Notre Dame. Unlike rigid robots or static cameras, SPROUT can "grow" into tight, winding spaces that are otherwise inaccessible, giving first responders a new way to explore, map and assess collapsed structures.
SPROUT is made of an airtight fabric tube that inflates with air, allowing it to extend from a fixed base. As it grows, it can flex around corners and squeeze through narrow gaps, mimicking the movement of a plant vine. Operators control SPROUT using a joystick, steering it through debris while watching a live video feed from a camera mounted at the tip. This setup lets responders see and map hidden void spaces without entering dangerous areas themselves.
Three pouch motors along the vine's length enable SPROUT to bend and turn, while an internal reel system allows the robot to be compactly stored and precisely deployed as needed. In addition to cameras, SPROUT can carry other sensors to image, map and even assess hazards within the collapsed structure.
Traditional search-and-rescue gear, such as rigid robots or specialized cameras, struggles in disaster zones for several reasons. Cameras can only probe straight paths, often requiring teams to cut new access holes to see further into the rubble.
Rigid robots are prone to damage in unstable, cramped environments and are expensive to repair. Manual probing is time-consuming and physically exhausting for responders.
SPROUT's soft, flexible design directly addresses these challenges, offering a safer, faster and more adaptable solution for navigating the unpredictable landscape of collapsed buildings.
SPROUT has already been put through its paces at the Massachusetts Task Force 1 training site, where it demonstrated its ability to flex around corners and penetrate void spaces in engineered collapsed structures. These tests allowed the team to refine SPROUT's durability, portability and steering controls, with plans for larger field studies underway.
The project is a true collaboration, pairing MIT's engineering expertise with Professor Margaret Coad's pioneering work on vine robots at Notre Dame. This partnership has accelerated SPROUT's development, bringing hands-on demonstrations to first responders, many of whom have limited research and development budgets.
The team behind SPROUT is continuously working to expand its capabilities. Current models can extend up to 10 feet, with future versions aiming to reach beyond 25 feet. Researchers are also exploring the use of multiple SPROUT robots to cover larger areas and expedite rescue operations in major disasters.
Beyond disaster response, the technology could be adapted for inspecting military systems or critical infrastructure in hard-to-reach places, making SPROUT a versatile tool for a variety of high-stakes scenarios.
SPROUT is a remarkable example of how soft robotics can make a real difference in some of the most challenging and dangerous situations. By giving first responders a flexible, easy-to-use tool for searching through rubble, SPROUT has the potential to save lives and change the way we approach disaster rescue. It's great to see technology that's not just innovative but truly impactful, helping those who help others when it matters most.
How do you feel about robots being used to explore dangerous places where people can't easily go? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Follow Kurt on his social channels:
Answers to the most-asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Will an AI machine change tattoo art forever?
Will an AI machine change tattoo art forever?

Fox News

timea day ago

  • Fox News

Will an AI machine change tattoo art forever?

Every tattoo starts with a single black dot. That tiny mark is the base for every design, no matter how complex. And now, thanks to a new AI tattoo machine, that dot is more perfect than ever. Welcome to the future of tattooing. Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my Blackdot is not just a new tool. It's a complete reimagining of how tattoos are created. This device doesn't look like a traditional tattoo machine. It's a sleek, robotic arm powered by artificial intelligence. It uses computer vision, lasers and a microscope to apply ink with surgical precision. The dots it places are about the size of a human hair. Blackdot is currently in studios like Bang Bang in New York City. It's designed to create ultra-detailed tattoos quickly, cleanly and with less pain than traditional methods. And yes, it still uses real needles and real ink. But the way it works is totally different. Once a human operator starts the process, the machine scans your skin. It then gets to work, placing ink with incredible accuracy. It's quiet. It's steady. And according to early users, it hurts a lot less. That's because the machine goes shallower into the skin than a human artist might. This avoids nerve endings that normally cause pain during a tattoo. Let's say you want a custom tattoo from an artist across the country. Normally, you'd need to travel, book months in advance, and hope the artist is available. With Blackdot, you can get that same artwork in your city, without ever meeting the artist in person. The machine can handle everything from ultra-sharp lettering to lifelike portraits. It can even replicate a child's handwriting or a piece of original art down to the tiniest detail. And if you're nervous about pain or needles, this machine might make you more comfortable than a traditional tattoo shop. Blackdot isn't trying to replace tattoo artists. It's trying to give them more options. Artists can license their work to be used by the machine. They control how many times a design can be tattooed. They approve the final work. And they get paid quickly. This opens up tattooing to painters, illustrators, digital artists, photographers and more. You no longer have to be a tattoo artist to get your work on someone's skin. Of course, not everyone is excited about this change. Some tattoo artists feel like a machine doesn't belong in an industry built on human connection and trust. They say machines can't replace the experience that comes from years of working with different skin types and guiding clients through the emotional side of getting a tattoo. They also worry about losing jobs, or about AI removing the "soul" of a hand-drawn tattoo. At the same time, some artists are curious. A few have even tried tattooing side-by-side with the machine to see how it compares. One artist described it like watching a dinosaur stare at a meteor; he didn't think it would take over, but he knew it would change things. And in some cases, artists say the machine handles tedious jobs like fine lettering better than they can. Blackdot has big plans. It's not just focused on tattoo shops. The company wants to put machines in permanent makeup studios, high-end salons, barbershops and fashion stores. It also launched something called the Blackdot Gallery, where people can buy digital tattoo art that can be turned into real tattoos. You can even trade and collect tattoos the way you might trade digital art or collectibles. The AI tattoo machine isn't here to erase tradition. It's here to expand it. It offers new ways to create, new ways to connect, and a more comfortable experience for people who have always wanted a tattoo but held back. But it also raises big questions about what we value in a tattoo. Is it the art itself, or the artist behind it? So what about you? Would you let a robot give you your next tattoo, or do you still want a human touch behind every drop of ink? Let us know by writing to us at Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my Copyright 2025 All rights reserved.

Top multi-factor authentication apps to protect your accounts
Top multi-factor authentication apps to protect your accounts

Fox News

time5 days ago

  • Fox News

Top multi-factor authentication apps to protect your accounts

Hackers often exploit reused passwords, gaining access to multiple accounts if just one is compromised. To stay safe, use strong, unique passwords for every account and change them regularly. However, passwords alone aren't enough. That's where multi-factor authentication apps come in. Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my Multi-factor authentication (MFA) adds an extra layer of protection to your accounts. Instead of relying only on a password, MFA requires you to verify your identity using two or more methods. These can include SMS codes, authenticator apps, or physical security keys. Two-factor authentication (2FA) is a type of MFA that uses exactly two verification methods. MFA, on the other hand, can involve two or more factors. For example, logging into your bank might require a password and a code from an app-this is MFA in action. Not all websites and apps support every type of MFA, so your choice may depend on what's available. Here's how the main options compare: Many banks use SMS for two-factor authentication because it's easy to set up and works on any phone. However, SMS is not the most secure method. Authenticator apps and physical security keys offer better protection against modern threats. Unfortunately, there's no universal MFA solution for every account. The best approach is to use the strongest MFA method each service supports. Whenever possible, choose an authenticator app or a physical security key over SMS. Using a multi-factor authentication app is one of the best ways to protect your online identity. Here are some of the top-rated options available for iPhone and Android: The Microsoft Authenticator app gives you an easy, secure sign-in experience for all your accounts and gives you additional account management options for your Microsoft personal, work, and school accounts. It can use multi-factor authentication with a one-time passcode, can go password-less by using your phone instead of a password to log in, or can use autofill passwords for you. It's easy to use and can keep multiple accounts safe and secure for you. Twilio Authy is another great app that you can use for all your accounts, including Facebook, Dropbox, Amazon, Gmail, and thousands more. It provides secure cloud-encrypted backups so that you will never lose access to your accounts, even if you lose your device. The app uses the same algorithms as many banks and the NSA use to protect their information, so you can pretty much guarantee that you'll be safe. Plus, you can even use it if you're offline or in airplane mode. The Google Authenticator app will give you an extra layer of security for your online apps. You can sync your authenticator codes to your Google Account and across your devices. It offers support for multiple accounts, and you can transfer accounts between devices by using a QR code. Plus, you can choose the type of code generation used that best suits your needs, and it works without a network or cellular connection. The Aegis Authenticator app is a free option for Android users. It is a great app to protect your online accounts from hackers and phishing. It adds an extra layer of security by generating one-time codes that you need to enter alone with your password. This way, even if a hacker steals your password, they won't be able to access your account with your phone. The Aegis Authenticator app also lets you customize and organize your accounts, backup and restore your data, and use it offline. While multi-factor authentication adds critical protection, it works best when combined with strong, unique passwords for every account. That's where a password manager comes in. Instead of trying to memorize dozens of complex passwords, a password manager securely stores them for you and automatically fills them in when needed. It can generate strong, random passwords, store them in an encrypted vault, and sync across your devices so you always have access. Using NordPass along with multi-factor authentication is one of the best strategies to keep your accounts and personal data safe from hackers. Get more details about my best expert-reviewed Password Managers of 2025 at Keeping your accounts safe doesn't have to be complicated. By using multi-factor authentication apps, you're adding a strong layer of protection that goes beyond just passwords. These apps make it much harder for hackers to get in, even if they somehow learn your password. Ready to take your security up a notch? Have you tried using an authenticator app? What has your experience been like? Let us know by writing us at Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my Copyright 2025 All rights reserved.

Data privacy is failing. Here's what encryption and MFA can (and can't) do
Data privacy is failing. Here's what encryption and MFA can (and can't) do

Fast Company

time5 days ago

  • Fast Company

Data privacy is failing. Here's what encryption and MFA can (and can't) do

Cybersecurity and data privacy are constantly in the news. Governments are passing new cybersecurity laws. Companies are investing in cybersecurity controls such as firewalls, encryption, and awareness training at record levels. And yet, people are losing ground on data privacy. In 2024, the Identity Theft Resource Center reported that companies sent out 1.3 billion notifications to the victims of data breaches. That's more than triple the notices sent out the year before. It's clear that despite growing efforts, personal data breaches are not only continuing, but accelerating. What can you do about this situation? Many people think of the cybersecurity issue as a technical problem. They're right: Technical controls are an important part of protecting personal information, but they are not enough. As a professor of information technology, analytics, and operations at the University of Notre Dame, I study ways to protect personal privacy. Solid personal privacy protection is made up of three pillars: accessible technical controls, public awareness of the need for privacy, and public policies that prioritize personal privacy. Each plays a crucial role in protecting personal privacy. A weakness in any one puts the entire system at risk. The first line of defense Technology is the first line of defense, guarding access to computers that store data and encrypting information as it travels between computers to keep intruders from gaining access. But even the best security tools can fail when misused, misconfigured, or ignored. Two technical controls are especially important: encryption and multifactor authentication (MFA). These are the backbone of digital privacy—and they work best when widely adopted and properly implemented. Encryption uses complex math to put sensitive data in an unreadable format that can only be unlocked with the right key. For example, your web browser uses HTTPS encryption to protect your information when you visit a secure webpage. This prevents anyone on your network—or any network between you and the website—from eavesdropping on your communications. Today, nearly all web traffic is encrypted in this way. But if we're so good at encrypting data on networks, why are we still suffering all of these data breaches? The reality is that encrypting data in transit is only part of the challenge. Securing stored data We also need to protect data wherever it's stored—on phones, laptops, and the servers that make up cloud storage. Unfortunately, this is where security often falls short. Encrypting stored data, or data at rest, isn't as widespread as encrypting data that is moving from one place to another. While modern smartphones typically encrypt files by default, the same can't be said for cloud storage or company databases. Only 10% of organizations report that at least 80% of the information they have stored in the cloud is encrypted, according to a 2024 industry survey. This leaves a huge amount of unencrypted personal information potentially exposed if attackers manage to break in. Without encryption, breaking into a database is like opening an unlocked filing cabinet—everything inside is accessible to the attacker. Multifactor authentication is a security measure that requires you to provide more than one form of verification before accessing sensitive information. This type of authentication is more difficult to crack than a password alone because it requires a combination of different types of information. It often combines something you know, such as a password, with something you have, such as a smartphone app that can generate a verification code or with something that's part of what you are, like a fingerprint. Proper use of multifactor authentication reduces the risk of compromise by 99.22%. While 83% of organizations require that their employees use multifactor authentication, according to another industry survey, this still leaves millions of accounts protected by nothing more than a password. As attackers grow more sophisticated and credential theft remains rampant, closing that 17% gap isn't just a best practice—it's a necessity. Multifactor authentication is one of the simplest, most effective steps organizations can take to prevent data breaches, but it remains underused. Expanding its adoption could dramatically reduce the number of successful attacks each year. Awareness gives people the knowledge they need Even the best technology falls short when people make mistakes. Human error played a role in 68% of 2024 data breaches, according to a Verizon report. Organizations can mitigate this risk through employee training, data minimization—meaning collecting only the information necessary for a task, then deleting it when it's no longer needed—and strict access controls. Policies, audits, and incident response plans can help organizations prepare for a possible data breach so they can stem the damage, see who is responsible and learn from the experience. It's also important to guard against insider threats and physical intrusion using physical safeguards such as locking down server rooms. Public policy holds organizations accountable Legal protections help hold organizations accountable in keeping data protected and giving people control over their data. The European Union's General Data Protection Regulation is one of the most comprehensive privacy laws in the world. It mandates strong data protection practices and gives people the right to access, correct, and delete their personal data. And the General Data Protection Regulation has teeth: In 2023, Meta was fined €1.2 billion (US$1.4 billion) when Facebook was found in violation. Despite years of discussion, the U.S. still has no comprehensive federal privacy law. Several proposals have been introduced in Congress, but none have made it across the finish line. In its place, a mix of state regulations and industry-specific rules—such as the Health Insurance Portability and Accountability Act for health data and the Gramm-Leach-Bliley Act for financial institutions —fill the gaps. Some states have passed their own privacy laws, but this patchwork leaves Americans with uneven protections and creates compliance headaches for businesses operating across jurisdictions. The tools, policies, and knowledge to protect personal data exist—but people's and institutions' use of them still falls short. Stronger encryption, more widespread use of multifactor authentication, better training, and clearer legal standards could prevent many breaches. It's clear that these tools work. What's needed now is the collective will—and a unified federal mandate—to put those protections in place.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store