Enlarge / A diagram of the transistors built in this paper, next to a false-colored image of the actual hardware. Atomically thin materials like graphene and carbon nanotubes have the potential to provide significant benefits compared to today’s electronics, like smaller features, lower operating voltages, and more efficient performance. So, even though we’re struggling to figure out how to use them in bulk manufactured electronics, lots of organizations are spending money, brains, and time to work that out. Note the phrasing above—potential. Since it’s been incredibly hard to make transistors based on these materials, we aren’t entirely sure how all of them will behave. A group of researchers from China’s Peking University decided it was time to cut down on some of the uncertainty. The answer they came up with? Transistors made with carbon nanotubes and graphene perform so well that they’re pushing up against the fundamental limits set by Heisenberg’s uncertainty principle. That still doesn’t mean we can make a chip full of these things, but it does show it’s worth the continued effort to try to figure out how. Read 10 remaining paragraphs | Comments
More:
Carbon nanotube transistors push up against quantum uncertainty limits
wiredmikey writes: Security researchers have a uncovered a Mac OS based espionage malware they have named “Quimitchin.” The malware is what they consider to be “the first Mac malware of 2017, ” which appears to be a classic espionage tool. While it has some old code and appears to have existed undetected for some time, it works. It was discovered when an IT admin noticed unusual traffic coming from a particular Mac, and has been seen infecting Macs at biomedical facilities. From SecurityWeek.com: “Quimitchin comprises just two files: a .plist file that simply keeps the .client running at all times, and the .client file containing the payload. The latter is a ‘minified and obfuscated’ perl script that is more novel in design. It combines three components, Thomas Reed, director of Mac offerings at Malwarebytes and author of the blog post told SecurityWeek: ‘a Mac binary, another perl script and a Java class tacked on at the end in the __DATA__ section of the main perl script. The script extracts these, writes them to /tmp/ and executes them.’ Its primary purpose seems to be screen captures and webcam access, making it a classic espionage tool. Somewhat surprisingly the code uses antique system calls. ‘These are some truly ancient functions, as far as the tech world is concerned, dating back to pre-OS X days, ‘ he wrote in the blog post. ‘In addition, the binary also includes the open source libjpeg code, which was last updated in 1998.’ The script also contains Linux shell commands. Running the malware on a Linux machine, Malwarebytes ‘found that — with the exception of the Mach-O binary — everything ran just fine.’ It is possible that there is a specific Linux variant of the malware in existence — but the researchers have not been able to find one. It did find two Windows executable files, courtesy of VirusTotal, that communicated with the same CC server. One of them even used the same libjpeg library, which hasn’t been updated since 1998, as that used by Quimitchin.” Read more of this story at Slashdot.