Showing 20 articles starting at article 21
< Previous 20 articles Next 20 articles >
Categories: Computer Science: Encryption, Mathematics: Puzzles
Published Giving video games this Christmas? New research underlines need to be aware of loot box risks



At-risk individuals, such as those with known gaming and gambling problems, are more likely to engage with loot boxes than those without. The study is the result of one of the largest, most complex and robustly designed surveys yet conducted on loot boxes, and has prompted experts to reiterate the call for stricter enforcement around them.
Published Keep it secret: Cloud data storage security approach taps quantum physics



Distributed cloud storage is a hot topic for security researchers, and a team is now merging quantum physics with mature cryptography and storage techniques to achieve a cost-effective cloud storage solution.
Published Accelerating AI tasks while preserving data security



SecureLoop is a new search engine that can identify an optimal design for a deep neural network accelerator that preserves data security while improving energy efficiency and boosting performance. This could enable device manufacturers to increase the speed of demanding AI applications, while ensuring sensitive data remain safe from attackers.
Published Certain online games use dark designs to collect player data



The privacy policies and practices of online games contain dark design patterns which could be deceptive, misleading, or coercive to users, according to a new study.
Published New study unveils stretchable high-resolution user-interactive synesthesia displays for visual--acoustic encryption



A research team has succeeded in developing a cutting-edge display using transfer-printing techniques, propelling the field of multifunctional displays into new realms of possibility.
Published Machine learning unravels mysteries of atomic shapes


New research has used machine learning to find the properties of atomic pieces of geometry, in pioneering work that could drive the development of new results in mathematics.
Published Better cybersecurity with new material


Digital information exchange can be safer, cheaper and more environmentally friendly with the help of a new type of random number generator for encryption. The researchers behind the study believe that the new technology paves the way for a new type of quantum communication.
Published Effectiveness of video gameplay restrictions questioned in new study


Legal restrictions placed on the amount of time young people in China can play video games may be less effective than originally thought, a new study has revealed.
Published How randomized data can improve our security


With an innovative approach, scientists are creating new standards for data security in the cache of electronic devices.
Published A new weapon in the war on robocall scams


The latest weapon in the war on robocalls is an automated system that analyzes the content of unsolicited bulk calls to shed light on both the scope of the problem and the type of scams being perpetuated by robocalls. The tool, called SnorCall, is designed to help regulators, phone carriers and other stakeholders better understand and monitor robocall trends -- and take action against related criminal activity.
Published Smart devices: Putting a premium on peace of mind


The White House has announced plans to roll out voluntary labeling for internet-connected devices like thermostats and baby monitors that meet certain cybersecurity standards. A new survey of U.S. consumers shows that they are willing to pay a significant premium to tell which gadgets are safe from security attacks before they buy. But voluntary product labels may not be enough if the program is going to protect consumers in the long run, the findings suggest.
Published Social media algorithms exploit how humans learn from their peers


In prehistoric societies, humans tended to learn from members of our ingroup or from more prestigious individuals, as this information was more likely to be reliable and result in group success. However, with the advent of diverse and complex modern communities -- and especially in social media -- these biases become less effective. For example, a person we are connected to online might not necessarily be trustworthy, and people can easily feign prestige on social media. Now, a group of social scientists describe how the functions of social media algorithms are misaligned with human social instincts meant to foster cooperation, which can lead to large-scale polarization and misinformation.
Published Scientists uncover a surprising connection between number theory and evolutionary genetics


An interdisciplinary team of mathematicians, engineers, physicists, and medical scientists has uncovered an unexpected link between pure mathematics and genetics, that reveals key insights into the structure of neutral mutations and the evolution of organisms.
Published Why computer security advice is more confusing than it should be


If you find the computer security guidelines you get at work confusing and not very useful, you're not alone. A new study highlights a key problem with how these guidelines are created, and outlines simple steps that would improve them -- and probably make your computer safer.
Published Solving rare disease mysteries ... and protecting privacy


Researchers have demonstrated a new way of linking personal records and protecting privacy. The first application is in identifying cases of rare genetic disorders. There are many other potential applications across society.
Published Board games are boosting math ability in young children


Board games based on numbers, like Monopoly, Othello and Chutes and Ladders, make young children better at math, according to a comprehensive review of research published on the topic over the last 23 years.
Published Stressed for a bit? Then don't click it, cybersecurity experts advise



Workers feeling a specific form of stress are more likely than others to become the victims of a phishing attack, according to a new study.
Published Evaluating cybersecurity methods



Researchers created a generic framework that enables an engineer or scientist to evaluate the effectiveness of defense schemes that seek to limit a hacker's ability to learn secret information by observing the behavior of a victim computer program.
Published How the brain processes numbers -- New procedure improves measurement of human brain activity



Measuring human brain activity down to the cellular level: until now, this has been possible only to a limited extent. With a new approach it will now be much easier. The method relies on microelectrodes along with the support of brain tumor patients, who participate in studies while undergoing 'awake' brain surgery. This enabled the team to identify how our brain processes numbers.
Published How secure are voice authentication systems really?



Computer scientists have discovered a method of attack that can successfully bypass voice authentication security systems with up to a 99% success rate after only six tries.