Toggle light / dark theme

For the first time ever, scientists have used a technique called “quantum squeezing” to improve the gas sensing performance of devices known as optical frequency comb lasers. These ultra-precise sensors are like fingerprint scanners for molecules of gas. Scientists have used them to spot methane leaks in the air above oil and gas operations and signs of COVID-19 infections in breath samples from humans.

Now, in a series of lab experiments, researchers have laid out a path for making those kinds of measurements even more sensitive and faster—doubling the speed of frequency comb detectors. The work is a collaboration between Scott Diddams at CU Boulder Boulder and Jérôme Genest at Université Laval in Canada.

“Say you were in a situation where you needed to detect minute quantities of a dangerous gas leak in a factory setting,” said Diddams, professor in the Department of Electrical, Computer and Energy Engineering. “Requiring only 10 minutes versus 20 minutes can make a big difference in keeping people safe.”

Physically Intuitive Anisotropic Model of Hardness https://arxiv.org/abs/2412.


Skoltech researchers have presented a new simple physical model for predicting the hardness of materials based on information about the shear modulus and equations of the state of crystal structures. The model is useful for a wide range of practical applications—all parameters in it can be determined through basic calculations or measured experimentally.

The results of the study are presented in the Physical Review Materials journal.

Hardness is an important property of materials that determines their ability to resist deformations and other damage (dents, scratches) due to external forces. It is typically determined by pressing the indenter into the test sample, and the indenter must be made of a harder material, usually diamond.

Researchers have revolutionized quantum technology by achieving long-lasting entanglement between molecules using ‘magic-wavelength optical tweezers.’

This breakthrough enhances the potential for quantum computing.

Performing computation using quantum-mechanical phenomena such as superposition and entanglement.

Scientists develop DNADNA, or deoxyribonucleic acid, is a molecule composed of two long strands of nucleotides that coil around each other to form a double helix. It is the hereditary material in humans and almost all other organisms that carries genetic instructions for development, functioning, growth, and reproduction. Nearly every cell in a person’s body has the same DNA. Most DNA is located in the cell nucleus (where it is called nuclear DNA), but a small amount of DNA can also be found in the mitochondria (where it is called mitochondrial DNA or mtDNA). tabindex=0 DNA nanorobots capable of modifying artificial cells.

“Code executed in this early boot phase can persist on the system, potentially loading malicious kernel extensions that survive both reboots and OS reinstallation,” the CERT Coordination Center (CERT/CC) said. “Additionally, it may evade detection by OS-based and endpoint detection and response (EDR) security measures.”

Malicious actors could further expand the scope of exploitation by bringing their own copy of the vulnerable “reloader.efi” binary to any UEFI system with the Microsoft third-party UEFI certificate enrolled. However, elevated privileges are required to deploy the vulnerable and malicious files to the EFI system partition: local administrator on Windows and root on Linux.

The Slovakian cybersecurity firm said it responsibly disclosed the findings to the CERT/CC in June 2024, following which Howyar Technologies and their partners addressed the issue in the concerned products. On January 14, 2025, Microsoft revoked the old, vulnerable binaries as part of its Patch Tuesday update.

“By compromising developer accounts, attackers not only exfiltrate intellectual property but also gain access to cryptocurrency wallets, enabling direct financial theft,” the company said. “The targeted theft of private and secret keys could lead to millions in stolen digital assets, furthering the Lazarus Group’s financial goals.”

The malware architecture adopts a modular design and is flexible, and capable of working across Windows, macOS, and Linux operating systems. It also serves to highlight the ever-evolving and adaptable nature of nation-state cyber threats.

“For North Korea, hacking is a revenue generating lifeline,” Sherstobitoff said. “The Lazarus Group has consistently funneled stolen cryptocurrency to fuel the regime’s ambitions, amassing staggering sums. With Web3 and cryptocurrency industries booming, Operation 99 zeroes in on these high-growth sectors.”