Toggle light / dark theme

Get the latest international news and world events from around the world.

Log in for authorized contributors

Driven electrolytes are agile and active at the nanoscale

Technologies for energy storage as well as biological systems such as the network of neurons in the brain depend on driven electrolytes that are traveling in an electric field due to their electrical charges. This concept has also recently been used to engineer synthetic motors and molecular sensors on the nanoscale or to explain biological processes in nanopores. In this context, the role of the background medium, which is the solvent, and the resulting hydrodynamic fluctuations play an important role. Particles in such a system are influenced by these stochastic fluctuations, which effectively control their movements.

“When we imagine the environment inside a driven electrolyte at the nanoscale, we might think of a calm viscous medium in which ions move due to the electric field and slowly diffuse around. This new study reveals that this picture is wrong: the environment resembles a turbulent sea, which is highly nontrivial given the small scale,” explains Ramin Golestanian, who is director of the Department of Living Matter Physics at MPI-DS, and author of the study published in Physical Review Letters.

The research uncovers how the movement of the ions creates large-scale fluctuating fluid currents that stir up the environment and lead to fast motion of all the particles that are immersed in the environment, even if they are not charged.

Physicists develop new protocol for building photonic graph states

Physicists have long recognized the value of photonic graph states in quantum information processing. However, the difficulty of making these graph states has left this value largely untapped. In a step forward for the field, researchers from The Grainger College of Engineering at the University of Illinois Urbana-Champaign have proposed a new scheme they term “emit-then-add” for producing highly entangled states of many photons that can work with current hardware. Published in npj Quantum Information, their strategy lays the groundwork for a wide range of quantum enhanced operations including measurement-based quantum computing.

Entanglement is a key driver in delivering faster and more secure computational and information systems. But creating large, entangled states of more than two photons is challenging because the losses inherent in optical systems mean most photon sources have a low probability of successfully producing a photon that survives to the point of detection. Therefore, any attempt to build a large entangled state is full of missing photons, breaking the state apart. And identifying the missing spots would mean attempting detection of the photons, which is a destructive process itself, and precludes going back to fill those spots.

To circumvent this challenge, a team led by Associate Professor of Physics Elizabeth Goldschmidt and Professor of Electrical and Computer Engineering Eric Chitambar began with a different mindset.

Cutting down on quantum-dot crosstalk: Precise measurements expose a new challenge

Devices that can confine individual electrons are potential building blocks for quantum information systems. But the electrons must be protected from external disturbances. RIKEN researchers have now shown how quantum information encoded into a so-called quantum dot can be negatively affected by nearby quantum dots. This has implications for developing quantum information devices based on quantum dots.

Quantum computers process information using so-called qubits: physical systems whose behavior is governed by the laws of quantum mechanics. An electron, if it can be isolated and controlled, is one example of a qubit platform with great potential.

One way of controlling an electron is to use a quantum dot. These tiny structures trap charged particles using electric fields at the tips of metal electrodes separated by just a few tens of nanometers.

Rolling out the carpet for spin qubits with new chip architecture

Researchers at QuTech in Delft, The Netherlands, have developed a new chip architecture that could make it easier to test and scale up quantum processors based on semiconductor spin qubits. The platform, called QARPET (Qubit-Array Research Platform for Engineering and Testing) and reported in Nature Electronics, allows hundreds of qubits to be characterized within the same test-chip under the same operating conditions used in quantum computing experiments.

“With such a complex, tightly packed quantum chip, things really start to resemble the traditional semiconductor industry,” states researcher Giordano Scappucci.

When viewed under a microscope, the structure of the QARPET chip appears almost woven. Fabrication was in fact a stress test for engineering capabilities.

A New Way to Build 2D Materials Without Harsh Chemicals Pays Off Big

MXenes are an emerging class of two-dimensional materials whose properties depend sensitively on the atoms bound to their surfaces. A new synthesis approach now allows researchers to control these surface terminations with unprecedented precision. First identified in 2011, MXenes are a fast-expan

Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems

Cybersecurity researchers have discovered a fresh set of malicious packages across npm and the Python Package Index (PyPI) repository linked to a fake recruitment-themed campaign orchestrated by the North Korea-linked Lazarus Group.

The coordinated campaign has been codenamed graphalgo in reference to the first package published in the npm registry. It’s assessed to be active since May 2025.

“Developers are approached via social platforms like LinkedIn and Facebook, or through job offerings on forums like Reddit,” ReversingLabs researcher Karlo Zanki said in a report. “The campaign includes a well-orchestrated story around a company involved in blockchain and cryptocurrency exchanges.”

Microsoft: New Windows LNK spoofing issues aren’t vulnerabilities

Today, at Wild West Hackin’ Fest, security researcher Wietze Beukema disclosed multiple vulnerabilities in Windows LK shortcut files that allow attackers to deploy malicious payloads.

Beukema documented four previously unknown techniques for manipulating Windows LNK shortcut files to hide malicious targets from users inspecting file properties.

LNK shortcuts were introduced with Windows 95 and use a complex binary format that allows attackers to create deceptive files that appear legitimate in Windows Explorer’s properties dialog but execute entirely different programs when opened.

Fake AI Chrome extensions with 300K users steal credentials, emails

A set of 30 malicious Chrome extensions that have been installed by more than 300,000 users are masquerading as AI assistants to steal credentials, email content, and browsing information.

Some of the extensions are still present in the Chrome Web Store and have been installed by tens of thousands of users, while others show a small install count.

Researchers at browser security platform LayerX discovered the malicious extension campaign and named it AiFrame. They found that all analyzed extensions are part of the same malicious effort as they communicate with infrastructure under a single domain, tapnetic[.]pro.

/* */