RSA’s demise from quantum attacks is very much exaggerated, expert says
Expert says the focus on quantum attacks may distract us from more immediate threats. Enlarge Three weeks ago, panic swept across some corners of the security world after researchers discovered a breakthrough that, at l.....»»
PyPI halted new users and projects while it fended off supply-chain attack
Automation is making attacks on open source code repositories harder to fight. Enlarge / Supply-chain attacks, like the latest PyPI discovery, insert malicious code into seemingly functional software packages used by developers......»»
Preventive drone attacks based on digital traces are a gray area under international law
Identifying terrorists by analyzing their online activities is an approach that is sometimes at odds with international law, especially if the outcome is death. A study has documented this problematic legal and ethical issue......»»
Magnetic avalanche triggered by quantum effects: "Barkhausen noise" detected for first time
Iron screws and other so-called ferromagnetic materials are made up of atoms with electrons that act like little magnets. Normally, the orientations of the magnets are aligned within one region of the material but are not aligned from one region to t.....»»
Quantum computing just got hotter: One degree above absolute zero
For decades, the pursuit of quantum computing has struggled with the need for extremely low temperatures, mere fractions of a degree above absolute zero (0 Kelvin or –273.15°C). That's because the quantum phenomena that grant quantum computers the.....»»
A method to compute the Rényi entanglement entropy in auxiliary-field quantum Monte Carlo simulations
Entanglement is a widely studied quantum physics phenomenon, in which two particles become linked in such a way that the state of one affects the state of another, irrespective of the distance between them. When studying systems comprised of several.....»»
Cybercriminals use cheap and simple infostealers to exfiltrate data
The rise in identity-based attacks can be attributed to a rapid increase in malware, according to SpyCloud. Researchers found that 61% of data breaches in 2023, involving over 343 million stolen credentials, were infostealer malware-related. Of these.....»»
AI weaponization becomes a hot topic on underground forums
The majority of cyberattacks against organizations are perpetrated via social engineering of employees, and criminals are using new methods including AI to supercharge their techniques, according to ReliaQuest. Some 71% of all attacks trick employees.....»»
New study shows ways forward for future EU food labeling
A study led by the Leibniz Centre for Agricultural Landscape Research (ZALF) and published in the journal Ecological Economics provides important insights into the future of food labeling in the EU. By analyzing expert opinions from the food industry.....»»
Quantum computing progress: Higher temps, better error correction
Amazon, IBM, and traditional silicon makers all working toward error correction. Enlarge (credit: vital) There's a strong consensus that tackling most useful problems with a quantum computer will require that the compute.....»»
Apple users targeted by sophisticated phishing attack to reset their ID password
There are many known phishing attacks that target users of Apple devices to gain access to their Apple ID. However, a new “elaborate” attack uses a bug in the Apple ID password reset feature with “push bombing” or “MFA fatigue” techniques.....»»
If you"re getting dozens of password reset notifications, you"re being attacked
Apple users are becoming the target of a new wave of phishing attacks called "MFA Bombing" that relies on user impatience, and a bug in Apple's password reset mechanism.An example of the Apple ID password reset notificationPhishing attacks often rely.....»»
Physicists demonstrate parity anomaly in a topological insulator
Experimental and theoretical physicists from the Würzburg Institute for Topological Insulators have observed a re-entrant quantum Hall effect in a mercury telluride device and have identified it as a signature of parity anomaly......»»
Scientists on the hunt for evidence of quantum gravity"s existence at the South Pole
Several thousand sensors distributed over a square kilometer near the South Pole are tasked with answering one of the large outstanding questions in physics: does quantum gravity exist? The sensors monitor neutrinos—particles with no electrical cha.....»»
GPT-4 for identifying cell types in single cells matches and sometimes outperforms expert methods
GPT-4 can accurately interpret types of cells important for the analysis of single-cell RNA sequencing—a sequencing process fundamental to interpreting cell types—with high consistency to that of time-consuming manual annotation by human experts.....»»
Unlocking quantum computing power: Automated protocol design for quantum advantage
Imagine a world where complex calculations that currently take months for our best supercomputers to crack could be performed in a matter of minutes. Quantum computing is revolutionizing our digital world. In a research article published in Intellige.....»»
Researchers reveal new method for calculating mechanical properties of solids using machine learning
A research team from Skoltech introduced a new method that takes advantage of machine learning for studying the properties of polycrystals, composites, and multiphase systems. It attained high accuracy, nearly as good as that of quantum-mechanical me.....»»
Quantum interference could lead to smaller, faster, and more energy-efficient transistors
An international team of researchers from Queen Mary University of London, the University of Oxford, Lancaster University, and the University of Waterloo have developed a new single-molecule transistor that uses quantum interference to control the fl.....»»
Scientists deliver quantum algorithm to develop new materials and chemistry
U.S. Naval Research Laboratory (NRL) scientists have published the Cascaded Variational Quantum Eigensolver (CVQE) algorithm in a recent Physical Review Research article. The algorithm is expected to become a powerful tool to investigate the physical.....»»
This ‘unpatchable’ Mac flaw is keeping me up at night
A newly discovered vulnerability could leave Apple Silicon Macs wide open to malicious hacker attacks -- and it looks like the flaw can’t even be patched......»»
DOJ antitrust lawsuit complains that iPhones are cool, says lawyer
One element of the DOJ antitrust lawsuit against Apple addresses iMessage, and Apple’s decision to keep the app exclusive to iPhone. But it goes further than arguing that this is anti-competitive, and attacks the use of green chat bubbles for Andro.....»»