Toggle light / dark theme

Get the latest international news and world events from around the world.

Log in for authorized contributors

Atomic ‘CT scan’ reveals how gallium boosts fuel cell catalyst durability

Hydrogen fuel cell vehicles have long been hailed as the future of clean mobility: cars that emit nothing but water while delivering high efficiency and power density. Yet a stubborn obstacle remains. The heart of the fuel cell, the platinum-based catalyst, is both expensive and prone to degradation. Over time, the catalyst deteriorates during operation, forcing frequent replacements and keeping hydrogen vehicles costly.

Understanding why and how these catalysts degrade at the atomic level is a longstanding challenge in catalysis research. Without this knowledge, designing truly durable and affordable fuel cells for mass adoption remains out of reach.

Now, a team led by Professor Yongsoo Yang of the Department of Physics at KAIST (Korea Advanced Institute of Science and Technology), in collaboration with Professor Eun-Ae Cho of KAIST’s Department of Materials Science and Engineering, researchers at Stanford University and the Lawrence Berkeley National Laboratory, has successfully tracked the three-dimensional change of individual atoms inside fuel cell catalysts during thousands of operating cycles. The results provide unprecedented insight into the atomic-scale degradation mechanisms of platinum-nickel (PtNi) catalysts, and demonstrate how gallium (Ga) doping dramatically improves both their performance and durability.

Ultrafast infrared light pulses trigger rapid ‘breathing’ in thin film

Cornell Engineering researchers have demonstrated that, by zapping a synthetic thin film with ultrafast pulses of low-frequency infrared light, they can cause its lattice to atomically expand and contract billions of times per second—strain-driven “breathing” that could potentially be harnessed to quickly switch a material’s electronic, magnetic or optical properties on and off.

The research was published in Physical Review Letters. The paper’s co-lead authors are former postdoctoral researcher Jakob Gollwitzer and doctoral student Jeffrey Kaaret.

Stretching and squishing a material to induce strain is a common method to manipulate its properties, but using light for that purpose has been less studied, according to Nicole Benedek, associate professor of materials science and engineering, who co-led the project with Andrej Singer, associate professor of materials science and engineering in Cornell Engineering.

New neutrino detector in China is coming online

Neutrinos are one of the most enigmatic particles in the standard model. The main reason is that they’re so hard to detect. Despite the fact that 400 trillion of them created in the sun are passing through a person’s body every second, they rarely interact with normal matter, making understanding anything about them difficult. To help solve their mysteries, a new neutrino detector in China recently started collecting data, and hopes to provide insight on between forty and sixty neutrinos a day for the next ten years.

The detector, known as the Jiangmen Underground Neutrino Observatory, or JUNO, is located in between two huge nuclear plants at Yangjian and Taishan. Both of those fission plants create their own artificial neutrinos in addition to the ones created by the sun, meaning the general area should be awash with barely interacting particles.

That’s despite the fact that, like most , it’s located underground. 700 meters underground, in fact. The physical bulk of Earth’s crust is meant to block most other particles, like muons, from getting to it, and at other installations, like IceCube, it does a pretty good job.

6 Browser-Based Attacks Security Teams Need to Prepare For Right Now

Attacks that target users in their web browsers have seen an unprecedented rise in recent years. In this article, we’ll explore what a “browser-based attack” is, and why they’re proving to be so effective.

What is a browser-based attack?

First, it’s important to establish what a browser-based attack is.

New Phoenix attack bypasses Rowhammer defenses in DDR5 memory

Academic researchers have devised a new variant of Rowhammer attacks that bypass the latest protection mechanisms on DDR5 memory chips from SK Hynix.

A Rowhammer attack works by repeatedly accessing specific rows of memory cells at high-speed read/write operations to cause enough electrical interference to alter the value of the nearby bits from one to zero and vice-versa (bit flipping).

An attacker could potentialluy corrupt data, increase their privileges on the system, execute malicious code, or gain access to sensitive data.

OpenAI’s new GPT-5 Codex model takes on Claude Code

OpenAI is rolling out the GPT-5 Codex model to all Codex instances, including Terminal, IDE extension, and Codex Web (chatgpt.com/codex).

Codex is an AI agent that allows you to automate coding-related tasks. You can delegate your complex tasks to Codex and watch it execute code for you.

Even if you don’t know programming languages, you can use Codex to “vibe code” your apps and web apps.

/* */