Menu

Blog

Page 16

Jan 17, 2025

Quantum engineers ‘squeeze’ laser frequency combs to make more sensitive gas sensors

Posted by in categories: biotech/medical, quantum physics

For the first time ever, scientists have used a technique called “quantum squeezing” to improve the gas sensing performance of devices known as optical frequency comb lasers. These ultra-precise sensors are like fingerprint scanners for molecules of gas. Scientists have used them to spot methane leaks in the air above oil and gas operations and signs of COVID-19 infections in breath samples from humans.

Now, in a series of lab experiments, researchers have laid out a path for making those kinds of measurements even more sensitive and faster—doubling the speed of frequency comb detectors. The work is a collaboration between Scott Diddams at CU Boulder Boulder and Jérôme Genest at Université Laval in Canada.

“Say you were in a situation where you needed to detect minute quantities of a dangerous gas leak in a factory setting,” said Diddams, professor in the Department of Electrical, Computer and Energy Engineering. “Requiring only 10 minutes versus 20 minutes can make a big difference in keeping people safe.”

Jan 17, 2025

Researchers propose new physical model for predicting hardness of materials

Posted by in categories: information science, materials

Physically Intuitive Anisotropic Model of Hardness https://arxiv.org/abs/2412.


Skoltech researchers have presented a new simple physical model for predicting the hardness of materials based on information about the shear modulus and equations of the state of crystal structures. The model is useful for a wide range of practical applications—all parameters in it can be determined through basic calculations or measured experimentally.

The results of the study are presented in the Physical Review Materials journal.

Continue reading “Researchers propose new physical model for predicting hardness of materials” »

Jan 17, 2025

Revolutionizing Quantum Science: The Secret of Long-Lasting Molecular Entanglement

Posted by in categories: computing, quantum physics, science

Researchers have revolutionized quantum technology by achieving long-lasting entanglement between molecules using ‘magic-wavelength optical tweezers.’

This breakthrough enhances the potential for quantum computing.

Performing computation using quantum-mechanical phenomena such as superposition and entanglement.

Jan 17, 2025

DNA Nanorobots Unlock New Frontiers in Targeted Drug Delivery

Posted by in categories: bioengineering, biotech/medical, genetics

Scientists develop DNADNA, or deoxyribonucleic acid, is a molecule composed of two long strands of nucleotides that coil around each other to form a double helix. It is the hereditary material in humans and almost all other organisms that carries genetic instructions for development, functioning, growth, and reproduction. Nearly every cell in a person’s body has the same DNA. Most DNA is located in the cell nucleus (where it is called nuclear DNA), but a small amount of DNA can also be found in the mitochondria (where it is called mitochondrial DNA or mtDNA). tabindex=0 DNA nanorobots capable of modifying artificial cells.

Jan 17, 2025

European Privacy Group Sues TikTok and AliExpress for Illicit Data Transfers to China

Posted by in category: government

Noyb files GDPR complaints against TikTok, AliExpress, and others for illegal EU-China data transfers, citing risks of Chinese government access.

Jan 17, 2025

New UEFI Secure Boot Vulnerability Could Allow Attackers to Load Malicious Bootkits

Posted by in category: cybercrime/malcode

“Code executed in this early boot phase can persist on the system, potentially loading malicious kernel extensions that survive both reboots and OS reinstallation,” the CERT Coordination Center (CERT/CC) said. “Additionally, it may evade detection by OS-based and endpoint detection and response (EDR) security measures.”

Malicious actors could further expand the scope of exploitation by bringing their own copy of the vulnerable “reloader.efi” binary to any UEFI system with the Microsoft third-party UEFI certificate enrolled. However, elevated privileges are required to deploy the vulnerable and malicious files to the EFI system partition: local administrator on Windows and root on Linux.

The Slovakian cybersecurity firm said it responsibly disclosed the findings to the CERT/CC in June 2024, following which Howyar Technologies and their partners addressed the issue in the concerned products. On January 14, 2025, Microsoft revoked the old, vulnerable binaries as part of its Patch Tuesday update.

Jan 17, 2025

Product Walkthrough: How Reco Discovers Shadow AI in SaaS

Posted by in categories: robotics/AI, security

Reco uncovers shadow AI in SaaS, tackling risks like excessive permissions and data leaks. Real-time security detection ensures protection.

Jan 17, 2025

Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer

Posted by in category: cybercrime/malcode

Threat actors embed malware like VIP Keylogger in images via phishing emails and Base64 encoding, leveraging. NET loaders and GenAI-written scripts to.

Jan 17, 2025

Google Ads Users Targeted in Malvertising Scam Stealing Credentials and 2FA Codes

Posted by in category: cybercrime/malcode

Malvertising targets Google Ads users, redirecting to phishing sites that steal credentials, budgets, and 2FA codes.

Jan 17, 2025

Lazarus Group Targets Web3 Developers with Fake LinkedIn Profiles in Operation 99

Posted by in categories: cryptocurrencies, cybercrime/malcode, finance

“By compromising developer accounts, attackers not only exfiltrate intellectual property but also gain access to cryptocurrency wallets, enabling direct financial theft,” the company said. “The targeted theft of private and secret keys could lead to millions in stolen digital assets, furthering the Lazarus Group’s financial goals.”

The malware architecture adopts a modular design and is flexible, and capable of working across Windows, macOS, and Linux operating systems. It also serves to highlight the ever-evolving and adaptable nature of nation-state cyber threats.

“For North Korea, hacking is a revenue generating lifeline,” Sherstobitoff said. “The Lazarus Group has consistently funneled stolen cryptocurrency to fuel the regime’s ambitions, amassing staggering sums. With Web3 and cryptocurrency industries booming, Operation 99 zeroes in on these high-growth sectors.”

Page 16 of 12,385First1314151617181920Last