Toggle light / dark theme

Scientists at University College Cork (UCC) in Ireland have developed a powerful new tool for finding the next generation of materials needed for large-scale, fault-tolerant quantum computing.

The significant breakthrough means that, for the first time, researchers have found a way to determine once and for all whether a material can effectively be used in certain quantum computing microchips.

The major findings have been published in Science and are the result of a large international collaboration which includes leading theoretical work from Prof. Dung-Hai Lee at the University of California, Berkeley, and material synthesis from professors Sheng Ran and Johnpierre Paglione at Washington University in St. Louis and the University of Maryland, respectively.

Researchers from the Max-Planck-Institut fuer Kernphysik present new experimental and theoretical results for the bound electron g-factor in lithium-like tin, which has a much higher nuclear charge than any previous measurement. The paper is published in the journal Science.

The experimental accuracy reached a level of 0.5 parts per billion. Using an enhanced interelectronic QED method, the for the g-factor reached a precision of 6 parts per billion.

Theoretical study was performed earlier for the cell model of a charged porous membrane based on Onsager’s approach and the result was calculation of all electrokinetic coefficients. Experimental dependences of electroosmotic permeability, conductivity, and diffusion permeability of some perfluorinated membranes on electrolyte concentration were simultaneously and quantitatively described using exact analytical formulae based on the same set of physicochemical and geometrical parameters. It is shown here that for the developed cell model of the ion–exchange membrane, the Onsager principle of reciprocity is violated—the coupled cross kinetic coefficients are not equal.

Cybersecurity researchers have taken the wraps off an unusual cyber attack that leveraged malware with corrupted DOS and PE headers, according to new findings from Fortinet.

The DOS (Disk Operating System) and PE (Portable Executable) headers are essential parts of a Windows PE file, providing information about the executable.

While the DOS header makes the executable file backward compatible with MS-DOS and allows it to be recognized as a valid executable by the operating system, the PE header contains the metadata and information necessary for Windows to load and execute the program.

Threat actors linked to lesser-known ransomware and malware projects now use AI tools as lures to infect unsuspecting victims with malicious payloads.

This development follows a trend that has been growing since last year, starting with advanced threat actors using deepfake content generators to infect victims with malware.

These lures have become widely adopted by info-stealer malware operators and ransomware operations attempting to breach corporate networks.

Threat actors are abusing the ‘Google Apps Script’ development platform to host phishing pages that appear legitimate and steal login credentials.

This new trend was spotted by security researchers at Cofense, who warn that the fraudulent login window is “carefully designed to look like a legitimate login screen.”

“The attack uses an email masquerading as an invoice, containing a link to a webpage that uses Google Apps Script, a development platform integrated across Google’s suite of products,” Cofense explains.