Toggle light / dark theme

Sensata Technologies (known as Sensata) has suffered a ransomware attack last weekend that encrypted parts of the company network and disrupted operations.

In an 8-K filing to the U.S. Securities and Exchange Commission (SEC), Sensata says that the attack occurred on Sunday, April 6, and involved data theft, too.

“The incident has temporarily impacted Sensata’s operations, including shipping, receiving, manufacturing production, and various other support functions,” reads the notification.

Quantum computers promise to outperform today’s traditional computers in many areas of science, including chemistry, physics, and cryptography, but proving they will be superior has been challenging. The most well-known problem in which quantum computers are expected to have the edge, a trait physicists call “quantum advantage,” involves factoring large numbers, a hard math problem that lies at the root of securing digital information.

In 1994, Caltech alumnus Peter Shor (BS ‘81), then at Bell Labs, developed a that would easily factor a large number in just seconds, whereas this type of problem could take a classical computer millions of years. Ultimately, when quantum computers are ready and working—a goal that researchers say may still be a decade or more away—these machines will be able to quickly factor large numbers behind cryptography schemes.

But, besides Shor’s algorithm, researchers have had a hard time coming up with problems where quantum computers will have a proven advantage. Now, reporting in a recent Nature Physics study titled “Local minima in ,” a Caltech-led team of researchers has identified a common physics problem that these futuristic machines would excel at solving. The problem has to do with simulating how materials cool down to their lowest-energy states.

Researchers have successfully demonstrated the UK’s first long-distance ultra-secure transfer of data over a quantum communications network, including the UK’s first long-distance quantum-secured video call.

The team, from the Universities of Bristol and Cambridge, created the network, which uses standard fiber-optic infrastructure, but relies on a variety of quantum phenomena to enable ultra-secure data transfer.

The network uses two types of quantum key distribution (QKD) schemes: “unhackable” encryption keys hidden inside particles of light; and distributed entanglement: a phenomenon that causes quantum particles to be intrinsically linked.

Google has started rolling out a new end-to-end encryption (E2EE) model for Gmail enterprise users, making it easier to send encrypted emails to any recipient.

While businesses also have the option to configure the Secure/Multipurpose Internet Mail Extensions (S/MIME) protocol to send digitally signed and encrypted messages, this requires significant resources, including deploying certificates to all users and exchanging them before sending the emails.

Google says that after Gmail’s new E2EE model rolls out, business users will be able to send fully encrypted emails to any user on any email service or platform without having to worry about complex certificate requirements.

A quantum state of light was successfully teleported through more than 30 kilometers (around 18 miles) of fiber optic cable amid a torrent of internet traffic – a feat of engineering once considered impossible.

The impressive demonstration by researchers in the US in 2024 may not help you beam to work to beat the morning traffic, or download your favourite cat videos faster.

However, the ability to teleport quantum states through existing infrastructure represents a monumental step towards achieving a quantum-connected computing network, enhanced encryption, or powerful new methods of sensing.

Physicists have made a major leap in our understanding of quantum entanglement by fully mapping out the statistics it can produce – essentially decoding the language of the quantum world.

This breakthrough reveals how the bizarre but powerful correlations in quantum systems can be used to test, secure, and certify the behavior of quantum devices, all without knowing their inner workings. The ability to self-test even partially entangled systems now opens doors to more robust quantum communication, encryption, and computing methods. It’s a game-changer for both fundamental physics and real-world quantum tech.

Cracking the code of quantum entanglement.

Researchers have achieved a major quantum computing breakthrough: certified randomness, a process where a quantum computer generates truly random numbers, which are then proven to be genuinely random by classical supercomputers. This innovation has deep implications for cryptography, fairness, an

Together with an international team of researchers from the Universities of Southern California, Central Florida, Pennsylvania State and Saint Louis, physicists from the University of Rostock have developed a novel mechanism to safeguard a key resource in quantum photonics: optical entanglement. Their discovery is published in Science.

Declared as the International Year of Quantum Science and Technology by the United Nations, 2025 marks 100 years since the initial development of quantum mechanics. As this strange and beautiful description of nature on the smallest scales continues to fascinate and puzzle physicists, its quite tangible implications form the basis of modern technology as well as , and are currently in the process of revolutionizing information science and communications.

A key resource to quantum computation is so-called entanglement, which underpins the protocols and algorithms that make quantum computers exponentially more powerful than their classical predecessors. Moreover, entanglement allows for the secure distribution of encryption keys, and entangled photons provide increased sensitivity and noise resilience that dramatically exceed the classical limit.

Despite Oracle denying a breach of its Oracle Cloud federated SSO login servers and the theft of account data for 6 million people, BleepingComputer has confirmed with multiple companies that associated data samples shared by the threat actor are valid.

Last week, a person named ‘rose87168’ claimed to have breached Oracle Cloud servers and began selling the alleged authentication data and encrypted passwords of 6 million users. The threat actor also said that stolen SSO and LDAP passwords could be decrypted using the info in the stolen files and offered to share some of the data with anyone who could help recover them.

The threat actor released multiple text files consisting of a database, LDAP data, and a list of 140,621 domains for companies and government agencies that were allegedly impacted by the breach. It should be noted that some of the company domains look like tests, and there are multiple domains per company.