Toggle light / dark theme

Electrically tunable metasurface unlocks real-time THz holography

The terahertz (THz) band of the electromagnetic spectrum holds immense promise for next-generation technologies, including high-speed wireless communication, advanced encryption, and medical imaging. However, manipulating THz waves has long been a technical challenge, since these frequencies interact weakly with most natural materials.

Over the past two decades, researchers have increasingly turned to metasurfaces to tackle this problem. These are ultrathin materials carefully engineered to exhibit specialized properties, providing unprecedented control over THz waves.

Ideally, metasurfaces for THz applications in encryption and holography should be easily configurable, featuring an adjustable response that can be controlled externally. Despite this, tunable metasurface systems often rely on cumbersome or energy-inefficient methods, such as external thermal control.

Microsoft shares temp fix for Outlook encrypted email errors

Microsoft is investigating a known issue that triggers Outlook errors when opening encrypted emails sent from other organizations.

According to a recently published support document, this issue affects users in all Office channels who are using the classic Outlook email client.

“Currently, when using classic Outlook for Windows, you can’t open an OMEv2 encrypted email if it was sent from a separate organization (what we call another tenant),” Microsoft said.

SlimeMoldCrypt relies on gloopy living organism’s ever-changing network of tendrils for its dynamic, biological, encryption engine — inventor claims concept is resistant to decryption ‘even by quantum machines’

But treat your physarum polycephalum well, or it could die.

Quantum memories reach new milestone with secure quantum money protocol

Integration into a quantum money protocol shows that memories can now handle very demanding applications for quantum networking.

Researchers at the Kastler Brossel Laboratory (Sorbonne Université, CNRS, ENS-Université PSL, Collège de France), together with colleagues from LIP6 (Sorbonne Université, CNRS), have taken a major step forward in : for the first time, they have integrated an optical quantum memory into a cryptographic protocol. This achievement, based on Wiesner’s unforgeable quantum money scheme, demonstrates that quantum memories are now mature enough to operate under very demanding conditions for networking.

In a study published on September 19 in Science Advances, the Paris team implemented Wiesner’s quantum money, a foundational idea in that relies on the no-cloning theorem to prevent counterfeiting. Unlike previous demonstrations that bypassed storage, this experiment incorporated an intermediate memory step—an essential capability for real-world applications where quantum data must be held and released on demand.

If quantum computing is answering unknowable questions, how do we know they’re right?

Quantum computing promises to solve the seemingly unsolvable in fields such as physics, medicine, cryptography and more.

But as the race to develop the first large-scale, error-free commercial device heats up, it begs the question: how can we check that these ‘impossible’ solutions are correct?

A new Swinburne study is tackling this paradox. The paper is published in the journal Quantum Science and Technology.

New HybridPetya ransomware can bypass UEFI Secure Boot

A recently discovered ransomware strain called HybridPetya can bypass the UEFI Secure Boot feature to install a malicious application on the EFI System Partition.

HybridPetya appears inspired by the destructive Petya/NotPetya malware that encrypted computers and prevented Windows from booting in attacks in 2016 and 2017 but did not provide a recovery option.

Researchers at cybersecurity company ESET found a sample of HybridPetya on VirusTotal. They note that this may be a research project, a proof-of-concept, or an early version of a cybercrime tool still under limited testing.

Over 16,000 compromised servers uncovered using Secure Shell key probing method

An international research team from the Max Planck Institute (MPI) for Informatics in Saarbrücken, Germany, and the Delft University of Technology in the Netherlands has developed a method to detect compromised hosts at an internet scale by probing servers with public SSH keys previously observed in attacker operations.

This way, the team was able to identify more than 16,000 compromised hosts. Their findings have now been published at the USENIX Security Symposium 2025, where they were awarded a Distinguished Paper Award and the Internet Defense Prize.

Secure Shell (SSH) is one of the most common tools used to manage remotely. It provides a secure, encrypted channel between a client and a server, allowing users to log in, execute commands, and transfer files safely. SSH is widely used by system administrators and developers for maintaining and configuring remote systems.

/* */