Toggle light / dark theme

Get the latest international news and world events from around the world.

Log in for authorized contributors

Physicists develop new protocol for building photonic graph states

Physicists have long recognized the value of photonic graph states in quantum information processing. However, the difficulty of making these graph states has left this value largely untapped. In a step forward for the field, researchers from The Grainger College of Engineering at the University of Illinois Urbana-Champaign have proposed a new scheme they term “emit-then-add” for producing highly entangled states of many photons that can work with current hardware. Published in npj Quantum Information, their strategy lays the groundwork for a wide range of quantum enhanced operations including measurement-based quantum computing.

Entanglement is a key driver in delivering faster and more secure computational and information systems. But creating large, entangled states of more than two photons is challenging because the losses inherent in optical systems mean most photon sources have a low probability of successfully producing a photon that survives to the point of detection. Therefore, any attempt to build a large entangled state is full of missing photons, breaking the state apart. And identifying the missing spots would mean attempting detection of the photons, which is a destructive process itself, and precludes going back to fill those spots.

To circumvent this challenge, a team led by Associate Professor of Physics Elizabeth Goldschmidt and Professor of Electrical and Computer Engineering Eric Chitambar began with a different mindset.

Cutting down on quantum-dot crosstalk: Precise measurements expose a new challenge

Devices that can confine individual electrons are potential building blocks for quantum information systems. But the electrons must be protected from external disturbances. RIKEN researchers have now shown how quantum information encoded into a so-called quantum dot can be negatively affected by nearby quantum dots. This has implications for developing quantum information devices based on quantum dots.

Quantum computers process information using so-called qubits: physical systems whose behavior is governed by the laws of quantum mechanics. An electron, if it can be isolated and controlled, is one example of a qubit platform with great potential.

One way of controlling an electron is to use a quantum dot. These tiny structures trap charged particles using electric fields at the tips of metal electrodes separated by just a few tens of nanometers.

Rolling out the carpet for spin qubits with new chip architecture

Researchers at QuTech in Delft, The Netherlands, have developed a new chip architecture that could make it easier to test and scale up quantum processors based on semiconductor spin qubits. The platform, called QARPET (Qubit-Array Research Platform for Engineering and Testing) and reported in Nature Electronics, allows hundreds of qubits to be characterized within the same test-chip under the same operating conditions used in quantum computing experiments.

“With such a complex, tightly packed quantum chip, things really start to resemble the traditional semiconductor industry,” states researcher Giordano Scappucci.

When viewed under a microscope, the structure of the QARPET chip appears almost woven. Fabrication was in fact a stress test for engineering capabilities.

A New Way to Build 2D Materials Without Harsh Chemicals Pays Off Big

MXenes are an emerging class of two-dimensional materials whose properties depend sensitively on the atoms bound to their surfaces. A new synthesis approach now allows researchers to control these surface terminations with unprecedented precision. First identified in 2011, MXenes are a fast-expan

Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems

Cybersecurity researchers have discovered a fresh set of malicious packages across npm and the Python Package Index (PyPI) repository linked to a fake recruitment-themed campaign orchestrated by the North Korea-linked Lazarus Group.

The coordinated campaign has been codenamed graphalgo in reference to the first package published in the npm registry. It’s assessed to be active since May 2025.

“Developers are approached via social platforms like LinkedIn and Facebook, or through job offerings on forums like Reddit,” ReversingLabs researcher Karlo Zanki said in a report. “The campaign includes a well-orchestrated story around a company involved in blockchain and cryptocurrency exchanges.”

Microsoft: New Windows LNK spoofing issues aren’t vulnerabilities

Today, at Wild West Hackin’ Fest, security researcher Wietze Beukema disclosed multiple vulnerabilities in Windows LK shortcut files that allow attackers to deploy malicious payloads.

Beukema documented four previously unknown techniques for manipulating Windows LNK shortcut files to hide malicious targets from users inspecting file properties.

LNK shortcuts were introduced with Windows 95 and use a complex binary format that allows attackers to create deceptive files that appear legitimate in Windows Explorer’s properties dialog but execute entirely different programs when opened.

Fake AI Chrome extensions with 300K users steal credentials, emails

A set of 30 malicious Chrome extensions that have been installed by more than 300,000 users are masquerading as AI assistants to steal credentials, email content, and browsing information.

Some of the extensions are still present in the Chrome Web Store and have been installed by tens of thousands of users, while others show a small install count.

Researchers at browser security platform LayerX discovered the malicious extension campaign and named it AiFrame. They found that all analyzed extensions are part of the same malicious effort as they communicate with infrastructure under a single domain, tapnetic[.]pro.

Apple fixes zero-day flaw used in ‘extremely sophisticated’ attacks

Apple has released security updates to fix a zero-day vulnerability that was exploited in an “extremely sophisticated attack” targeting specific individuals.

Tracked as CVE-2026–20700, the flaw is an arbitrary code execution vulnerability in dyld, the Dynamic Link Editor used by Apple operating systems, including iOS, iPadOS, macOS, tvOS, watchOS, and visionOS.

Apple’s security bulletin warns that an attacker with memory write capability may be able to execute arbitrary code on affected devices.

/* */