Toggle light / dark theme

Get the latest international news and world events from around the world.

Log in for authorized contributors

Simplifying quantum simulations—symmetry can cut computational effort by several orders of magnitude

Quantum computer research is advancing at a rapid pace. Today’s devices, however, still have significant limitations: For example, the length of a quantum computation is severely limited—that is, the number of possible interactions between quantum bits before a serious error occurs in the highly sensitive system. For this reason, it is important to keep computing operations as efficient and lean as possible.

Drawing on the example of a quantum simulation, physicists Guido Burkard and Joris Kattemölle from the University of Konstanz illustrate how harnessing symmetry dramatically lowers the computational effort needed: They use recurring patterns in the quantum systems to reduce the required computational effort by a factor of a thousand or more. The method has now been published in the journal Physical Review Letters.

Microscopic mirrors for future quantum networks: A new way to make high-performance optical resonators

Researchers in the Harvard John A. Paulson School of Engineering and Applied Sciences (SEAS) and the Faculty of Arts and Sciences have devised a new way to make some of the smallest, smoothest mirrors ever created for controlling single particles of light, known as photons. These mirrors could play key roles in future quantum computers, quantum networks, integrated lasers, environmental sensing equipment, and more.

A team from the labs of Marko Lončar, the Tiantsai Lin Professor of Electrical Engineering at SEAS; Mikhail Lukin, the Joshua and Beth Friedman University Professor in the Department of Physics; and Kiyoul Yang, assistant professor of electrical engineering at SEAS; have described their new method for making high-performance, curved optical mirrors in a study published in Optica.

Using two such mirrors to trap light between them, the team demonstrated state-of-the-art optical resonators that can control light at near-infrared wavelengths, which is important for manipulating single atoms in quantum computing applications.

Hackers target Microsoft Entra accounts in device code vishing attacks

Threat actors are targeting technology, manufacturing, and financial organizations in campaigns that combine device code phishing and voice phishing (vishing) to abuse the OAuth 2.0 Device Authorization flow and compromise Microsoft Entra accounts.

Unlike previous attacks that utilized malicious OAuth applications to compromise accounts, these campaigns instead leverage legitimate Microsoft OAuth client IDs and the device authorization flow to trick victims into authenticating.

This provides attackers with valid authentication tokens that can be used to access the victim’s account without relying on regular phishing sites that steal passwords or intercept multi-factor authentication codes.

PromptSpy is the first known Android malware to use generative AI at runtime

Researchers have discovered the first known Android malware to use generative AI in its execution flow, using Google’s Gemini model to adapt its persistence across different devices.

In a report today, ESET researcher Lukas Stefanko explains how a new Android malware family named “PromptSpy” is abusing the Google Gemini AI model to help it achieve persistence on infected devices.

“In February 2026, we uncovered two versions of a previously unknown Android malware family,” explains ESET.

/* */