Toggle light / dark theme

From punch card-operated looms in the 1800s to modern cellphones, if an object has an “on” and an “off” state, it can be used to store information.

In a computer laptop, the binary ones and zeroes are transistors either running at low or high voltage. On a compact disc, the one is a spot where a tiny indented “pit” turns to a flat “land” or vice versa, while a zero is when there’s no change.

Historically, the size of the object making the “ones” and “zeroes” has put a limit on the size of the storage device. But now, University of Chicago Pritzker School of Molecular Engineering (UChicago PME) researchers have explored a technique to make ones and zeroes out of crystal defects, each the size of an individual atom for classical computer memory applications.

Phones, appliances, and humans all generate heat that usually escapes into the environment as waste energy. Thermoelectric generators, which convert temperature differences into electricity, are a way to capture that wasted heat for power.

Researchers have now made a thermoelectric generator (TEG) that is soft and stretchy and that biodegrades completely when exposed to the environment. Unlike conventional rigid thermoelectric devices, this one, reported in the journal Science Advances, could be easily integrated into fabrics, allowing for body-heat-powered wearable sensors or temperature-detecting disposable face masks.

Your smartphone gallery may contain photos and screenshots of important information you keep there for safety or convenience, such as documents, bank agreements, or seed phrases for recovering cryptocurrency wallets. All of this data can be stolen by a malicious app such as the SparkCat stealer we’ve discovered. This malware is currently configured to steal crypto wallet data, but it could easily be repurposed to steal any other valuable information.

The worst part is that this malware has made its way into official app stores, with almost 250,000 downloads of infected apps from Google Play alone. Although malicious apps have been found in Google Play before, this marks the first time a stealer Trojan has been detected in the App Store. How does this threat work and what can you do to protect yourself?


Spectre-like SLAP and FLOP vulnerabilities in Apple CPUs can be used in real-world attacks.

Your smartphone gallery may contain photos and screenshots of important information you keep there for safety or convenience, such as documents, bank agreements, or seed phrases for recovering cryptocurrency wallets. All of this data can be stolen by a malicious app such as the SparkCat stealer we’ve discovered. This malware is currently configured to steal crypto wallet data, but it could easily be repurposed to steal any other valuable information.

The worst part is that this malware has made its way into official app stores, with almost 250,000 downloads of infected apps from Google Play alone. Although malicious apps have been found in Google Play before, this marks the first time a stealer Trojan has been detected in the App Store. How does this threat work and what can you do to protect yourself?


SparkCat infostealer infected apps in the App Store and Google Play. It scans photos on infected devices and steals crypto wallets.

face_with_colon_three Big change to cellular satellites directly to cell phones now where wherever there is sky you link up with no receiver other than a smartphone.


T-Mobile’s push to allow AT&T and Verizon customers to tap into its cellular Starlink service underscores a growing competition in the satellite-to-phone market.

The rapid technological advancements of our world have been enabled by our capacity to design and fabricate ever smaller electronic chips. These underpin computers, mobile phones and every smart device deployed to date.

One of the many challenges is that electronic components generate increasingly more heat as they are miniaturized. A significant issue lies in making the wires which connect the transistors on the chip thinner while ensuring that the minimum amount of heat is released.

These interconnects are typically made from copper, and as we start to scale them down to nano-scale thicknesses, their electrical resistance increases rapidly because the electrons moving along the wires have a higher probability of colliding into the surface of the wire. Known as scattering, this leads to energy being released in the form of waste heat, meaning you need more power to maintain the same level of performance.

For decades there has been near constant progress in reducing the size, and increasing the performance, of the circuits that power computers and smartphones. But Moore’s Law is ending as physical limitations – such as the number of transistors that can fit on a chip and the heat that results from packing them ever more densely – are slowing the rate of performance increases. Computing capacity is gradually plateauing, even as artificial intelligence, machine learning and other data-intensive applications demand ever greater computational power.

Novel technologies are needed to address this challenge. A potential solution comes from photonics, which offers lower energy consumption and reduced latency than electronics.

One of the most promising approaches is in-memory computing, which requires the use of photonic memories. Passing light signals through these memories makes it possible to perform operations nearly instantaneously. But solutions proposed for creating such memories have faced challenges such as low switching speeds and limited programmability.