Menu

Blog

Page 1630

Oct 20, 2023

“Pseudogravity” in crystals can bend light like black holes

Posted by in categories: cosmology, physics

Scientists in Japan have managed to manipulate light as though it was being influenced by gravity. By carefully distorting a photonic crystal, the team was able to invoke “pseudogravity” to bend a beam of light, which could have useful applications in optics systems.

One of the quirks of Einstein’s theory of general relativity is that light is affected by the fabric of spacetime, which itself is distorted by gravity. That’s why objects with extremely high masses, like black holes or entire galaxies, wreak such havoc on light, bending its path and magnifying distant objects.

In recent studies, it was predicted that it should be possible to replicate this effect in photonic crystals. These structures are used to control light in optics devices and experiments, and they’re generally made by arranging multiple materials into periodic patterns. Distortions in these crystals, it was theorized, could deflect light waves in a way very similar to cosmic-scale gravitational lenses. The phenomenon was dubbed pseudogravity.

Oct 20, 2023

Thirty Years Later, a Speed Boost for Quantum Factoring

Posted by in categories: computing, information science, mathematics, quantum physics, security

As Shor looked for applications for his quantum period-finding algorithm, he rediscovered a previously known but obscure mathematical theorem: For every number, there exists a periodic function whose periods are related to the number’s prime factors. So if there’s a number you want to factor, you can compute the corresponding function and then solve the problem using period finding — “exactly what quantum computers are so good at,” Regev said.

On a classical computer, this would be an agonizingly slow way to factor a large number — slower even than trying every possible factor. But Shor’s method speeds up the process exponentially, making period finding an ideal way to construct a fast quantum factoring algorithm.

Shor’s algorithm was one of a few key early results that transformed quantum computing from an obscure subfield of theoretical computer science to the juggernaut it is today. But putting the algorithm into practice is a daunting task, because quantum computers are notoriously susceptible to errors: In addition to the qubits required to perform their computations, they need many others doing extra work to keep them from failing. A recent paper by Ekerå and the Google researcher Craig Gidney estimates that using Shor’s algorithm to factor a security-standard 2,048-bit number (about 600 digits long) would require a quantum computer with 20 million qubits. Today’s state-of-the-art machines have at most a few hundred.

Oct 20, 2023

Pepper X dethrones Carolina Reaper as world’s hottest chilli pepper

Posted by in category: futurism

Pepper X is now the world’s hottest chilli pepper, breaking the record by over one million SHU.

Oct 20, 2023

Valley Fever Is a Growing Fungal Threat to Outdoor Workers

Posted by in categories: biotech/medical, food

I think in order to battle this fungal threat more beneficial fungi could be grown like mosses and other permaculture plants to prevent its spread on the farms.


The disease hits farmworkers and outdoor laborers disproportionately hard.

Oct 20, 2023

Slime that can be controlled by a magnetic field can navigate tight spaces and grasp objects

Posted by in category: futurism

It could be used inside the body to perform tasks like retrieving objects swallowed by accident.

Oct 20, 2023

Discord: A Playground for Nation-State Hackers Targeting Critical Infrastructure

Posted by in categories: cybercrime/malcode, evolution, internet

🕵️‍♂️ Nation-state hackers are turning to Discord. Discover how they’re using this social platform for potential cyber-espionage and target critical infrastructure.

Read:


In what’s the latest evolution of threat actors abusing legitimate infrastructure for nefarious ends, new findings show that nation-state hacking groups have entered the fray in leveraging the social platform for targeting critical infrastructure.

Continue reading “Discord: A Playground for Nation-State Hackers Targeting Critical Infrastructure” »

Oct 20, 2023

New Admin Takeover Vulnerability Exposed in Synology’s DiskStation Manager

Posted by in categories: cybercrime/malcode, futurism

A vulnerability in Synology’s DSM has been revealed, allowing attackers to remotely hijack admin accounts.

Learn how to safeguard your data:

Oct 20, 2023

Zero-Day Alert: Thousands of Cisco IOS XE Systems Now Compromised

Posted by in category: cybercrime/malcode

Zero-day alert: 10K cisco IOS XE systems now compromised:


Just a day after Cisco disclosed CVE-2023–20198, it remains unpatched, and one vendor says a Shodan scan shows at least 10,000 Cisco devices with an implant for arbitrary code execution on them. The vendor meanwhile has updated the advisory with more mitigation steps.

Oct 20, 2023

Lazarus Group Targeting Defense Experts with Fake Interviews via Trojanized VNC Apps

Posted by in category: cybercrime/malcode

🚨 Korean hacking group Lazarus Group targets defense industry and nuclear engineers with fake job interviews, using trojanized VNC apps to steal data and execute commands.

Oct 20, 2023

‘Etherhiding’ Blockchain Technique Hides Malware in WordPress Sites

Posted by in categories: blockchains, cryptocurrencies, cybercrime/malcode

‘Etherhiding’ Blockchain Technique Hides Malicious Code in WordPress Sites: https://informatech.co/3S3tw


A threat actor has been abusing proprietary blockchain technology to hide malicious code in a campaign that uses fake browser updates to spread various malware, including the infostealers RedLine, Amadey, and Lumma.

While abuse of blockchain is typically seen in attacks aimed at stealing cryptocurrency — as the security technology is best known for protecting these transactions — EtherHiding demonstrates how attackers can leverage it for other types of malicious activity.

Continue reading “‘Etherhiding’ Blockchain Technique Hides Malware in WordPress Sites” »