Toggle light / dark theme

Get the latest international news and world events from around the world.

Log in for authorized contributors

Unexpected Resonances Could Boost NMR’s Potency

A radio-frequency field can be resonant with nuclear spins in a sample even if its frequency does not match a spectroscopic transition—a result that could enable new forms of NMR spectroscopy.

Physical systems often have characteristic frequencies. When excited at such a frequency, they start to resonate. The Broughton Suspension Bridge incident on April 12, 1831, showed how this can go wrong. A detachment of 74 riflemen marched in step over the bridge, accidentally matching its resonance frequency. Before they had crossed, the bridge collapsed. At the much-smaller scale of nuclear magnetic resonance (NMR) spectroscopy, resonant excitation is less dramatic yet very useful. Typically, NMR relies on secular resonance, which occurs when the energy of the radio-frequency photons used in a measurement matches the energy required for flipping the magnetic moment of a nucleus in a static magnetic field. This secular resonance occurs at the so-called Larmor frequency. Structure determination of chemical compounds, experimental observation of protein dynamics, and magnetic resonance imaging rely on this matching.

Researchers Spot Surge in Erlang/OTP SSH RCE Exploits, 70% Target OT Firewalls

Malicious actors have been observed exploiting a now-patched critical security flaw impacting Erlang/Open Telecom Platform (OTP) SSH as early as beginning of May 2025, with about 70% of detections originating from firewalls protecting operational technology (OT) networks.

The vulnerability in question is CVE-2025–32433 (CVSS score: 10.0), a missing authentication issue that could be abused by an attacker with network access to an Erlang/OTP SSH server to execute arbitrary code. It was patched in April 2025 with versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20.

Then in June 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the flaw to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.

Quantum dot technique improves multi-photon state generation

A photonics research group co-led by Gregor Weihs of the University of Innsbruck has developed a new technique for generating multi-photon states from quantum dots that overcomes the limitations of conventional approaches. This has immediate applications in secure quantum key distribution protocols, where it can enable simultaneous secure communication with different parties.

Quantum dots—semiconductor nanostructures that can emit on demand—are considered among the most promising sources for photonic quantum computing. However, every quantum dot is slightly different and may emit a slightly different color. This means that to produce multi-photon states, we cannot use multiple quantum dots.

Usually, researchers use a single quantum dot and multiplex the emission into different spatial and temporal modes, using a fast electro-optic modulator. The technological challenge is that faster electro-optic modulators are expensive and often require very customized engineering. To add to that, they may not be very efficient, which introduces unwanted losses into the system.

/* */