Toggle light / dark theme

Get the latest international news and world events from around the world.

Log in for authorized contributors

Researchers achieve atomic-scale control of quantum interference

In a study published in Nature Communications, a research team demonstrates the all-electrical control of quantum interference in individual atomic spins on a surface.

Quantum interference arises when a system exists in a superposition of states, with relative phases producing constructive or . An example is Landau-Zener-Stückelberg-Majorana (LZSM) interference, which arises when a quantum two-level system is repeatedly driven through an anticrossing in the energy-level diagram, and undergoes multiple nonadiabatic transitions.

This mechanism is a powerful tool for fast and reliable quantum control, but it remains a significant challenge to achieve tunable LZSM interference in an atomic-scale quantum architecture where multiple spins can be precisely assembled and controllably coupled on demand.

Quantum crystals offer a blueprint for the future of computing and chemistry

Imagine industrial processes that make materials or chemical compounds faster, cheaper, and with fewer steps than ever before. Imagine processing information in your laptop in seconds instead of minutes or a supercomputer that learns and adapts as efficiently as the human brain. These possibilities all hinge on the same thing: how electrons interact in matter.

A team of Auburn University scientists has now designed a new class of materials that gives scientists unprecedented control over these tiny particles. Their study, published in ACS Materials Letters, introduces the tunable coupling between isolated-metal molecular complexes, known as solvated electron precursors, where electrons aren’t locked to atoms but instead float freely in open spaces.

From their key role in energy transfer, bonding, and conductivity, electrons are the lifeblood of chemical synthesis and modern technology. In , electrons drive redox reactions, enable bond formation, and are critical in catalysis. In technological applications, manipulating the flow and interactions between electrons determines the operation of electronic devices, AI algorithms, photovoltaic applications, and even . In most materials, electrons are bound tightly to atoms, which limits how they can be used. But in electrides, electrons roam freely, creating entirely new possibilities.

The Human Mind Isn’t Meant to Be Awake Past Midnight, Scientists Warn

In the middle of the night, the world can sometimes feel like a dark place. Under the cover of darkness, negative thoughts have a way of drifting through your mind, and as you lie awake, staring at the ceiling, you might start craving guilty pleasures, like a cigarette or a carb-heavy meal.

Plenty of evidence suggests the human mind functions differently if awake at nighttime. Past midnight, negative emotions tend to draw our attention more than positive ones, dangerous ideas grow in appeal, and inhibitions fall away.

Some researchers think the human circadian rhythm is heavily involved in these critical changes in function, as they outline in a 2022 paper summarizing the evidence of how brain systems function differently after dark.

Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year

“This attack highlights not just the creativity and sophistication of attackers but also the danger of trusted system functionality being weaponized to evade traditional detection,” the researchers noted. “It’s not just about spotting malicious activity; it’s about recognizing how legitimate tools and processes can be manipulated and turned against you.”

ReliaQuest told The Hacker News it cannot share any further details regarding when the attack commenced other than noting that the attackers had access to the system for over a year.

“The threat actor likely resorted to this method over an N-day flaw for a simple reason: why use an exploit if they didn’t have to?,” it pointed out. “They likely gained initial access through a weak administrator password and then repurposed a software component into a backdoor.”

Secure Boot bypass risk threatens nearly 200,000 Linux Framework laptops

Around 200,000 Linux computer systems from American computer maker Framework were shipped with signed UEFI shell components that could be exploited to bypass Secure Boot protections.

An attacker could take advantage to load bootkits (e.g. BlackLotus, HybridPetya, and Bootkitty) that can evade OS-level security controls and persist across OS re-installs.

Powerful mm command.

New Android Pixnapping attack steals MFA codes pixel-by-pixel

A new side-channel attack called Pixnapping enables a malicious Android app with no permissions to extract sensitive data by stealing pixels displayed by applications or websites, and reconstructing them to derive the content.

The content may include sensitive private data like chat messages from secure communication apps like Signal, emails on Gmail, or two-factor authentication codes from Google Authenticator.

The attack, devised and demonstrated by a team of seven American university researchers, works on fully patched modern Android devices and can steal 2FA codes in less than 30 seconds.

/* */