Toggle light / dark theme

A new technique that uses soundwaves to separate materials for recycling could help prevent potentially harmful chemicals leaching into the environment.

Researchers at the University of Leicester have achieved a major milestone in recycling, advancing techniques to efficiently separate valuable catalyst materials and fluorinated (PFAS) from catalyst-coated membranes (CCMs). The articles are published in RSC Sustainability and Ultrasonic Sonochemistry.

This development addresses critical environmental challenges posed by PFAS—often referred to as “forever chemicals”—which are known to contaminate drinking water and have serious health implications. The Royal Society of Chemistry has urged government intervention to reduce PFAS levels in UK water supplies.

Recent Extinction Rebellion protests saw key sites across London shut down in an attempt to force the government to declare an ‘eco-emergency.’

Our dissatisfaction with breakdown on a global, individual and societal level pushes many of us into activism. Increased numbers of people report suffering from ‘eco-anxiety’, and a recent study showed only 29% of American millennials currently believe that the country is heading in the right direction.

But can decay be completely reversed by human effort?

In this podcast, Tom Cozens speaks with Dr Mark Hocknull, who points out that decay finds its cause in deeper laws governing the physical universe. According to the principle of entropy, breakdown and decay are inescapable aspects of the natural world. The second law of thermodynamics states that decay and disorder are inescapable, and will always increase over time, despite human effort to reverse the process.

In the face of a world inescapably programmed towards breakdown, should we fight back or give up?

Owl in space at https://owlinspace.com

Thin film solar cells can be integrated into unexpected surfaces, such as building facades, windows, or the growing floating solar market. Thin film’s flexibility opens doors to new applications and helps overcome some of the barriers that have long limited the adoption of solar energy.

A lot of the interest in thin film solar technologies is coming from one company, based right in the heart of the UK: Power Roll. The County Durham-based firm has spent years exploring how to make thin, flexible solar cells that can be applied almost anywhere and has recently been hitting major milestones in commercialising the technology in an effort to get it out across the world.

Solar Power Portal sat down with Power Roll CEO Neil Spann to explore how thin film solar could deliver the government’s promised “rooftop revolution” and how Power Roll’s unique manufacturing process can make solar power a cheap reality worldwide.

Construction of what would be the world’s longest suspension bridge is scheduled to begin this year, according to the Italian government.

The bridge between the island of Sicily and the Italian mainland would cross over the Strait of Messina, a distance of 3,300 meters, though the construction has to grapple with tectonic activity that could cause earthquakes.

The FBI has asked the public for information on Chinese Salt Typhoon hackers behind widespread breaches of telecommunications providers in the United States and worldwide.

In October, the FBI and CISA confirmed that the Chinese state hackers had breached multiple telecom providers (including AT&T, Verizon, Lumen, Charter Communications, Consolidated Communications, and Windstream) and many other telecom companies in dozens of countries.

As revealed at the time, while they had access to the U.S. telecoms’ networks, the attackers also accessed the U.S. law enforcement’s wiretapping platform and gained access to the “private communications” of a “limited number” of U.S. government officials.

British scientists could experiment with techniques to block sunlight as part of a £50 million government funded scheme to combat global warming. The geo-engineering project is set to be given the go-ahead within weeks and could see scientists explore techniques including launching clouds of reflective particles into the atmosphere or using seawater sprays to make clouds brighter. Another method involves thinning natural cirrus clouds, which act as heat-trapping blankets. If successful, less sunlight will reach the earth’s surface and in turn temporarily cool the surface of earth. It’s thought to be a relatively cheap way to cool the…

Microsoft on Monday announced that it has moved the Microsoft Account (MSA) signing service to Azure confidential virtual machines (VMs) and that it’s also in the process of migrating the Entra ID signing service as well.

The disclosure comes about seven months after the tech giant said it completed updates to Microsoft Entra ID and MS for both public and United States government clouds to generate, store, and automatically rotate access token signing keys using the Azure Managed Hardware Security Module (HSM) service.

“Each of these improvements helps mitigate the attack vectors that we suspect the actor used in the 2023 Storm-0558 attack on Microsoft,” Charlie Bell, Executive Vice President for Microsoft Security, said in a post shared with The Hacker News ahead of publication.

The U.S. government is preparing to make moves to get food dyes out of what we eat– a plan which may spark curiosity across the nation as to what the potential health risks of artificial food dyes are.

MITRE Vice President Yosry Barsoum has warned that U.S. government funding for the Common Vulnerabilities and Exposures (CVE) and Common Weakness Enumeration (CWE) programs expires today, which could lead to widespread disruption across the global cybersecurity industry.

CVE, the most critical of the two, is maintained by MITRE with funding from the U.S. National Cyber Security Division of the U.S. Department of Homeland Security (DHS). CVE is crucial for providing accuracy, clarity, and shared standards when discussing security vulnerabilities.

The program is widely adopted across various cybersecurity tools, including vulnerability management systems, and it allows tracking all newly discovered vulnerabilities using CVE Identifiers (CVE IDs) assigned by CVE Numbering Authorities (CNAs) worldwide, with MITRE as the CVE Editor and Primary CNA.