Mathematics: Puzzles
Published

Giving video games this Christmas? New research underlines need to be aware of loot box risks      (via sciencedaily.com)     Original source 

At-risk individuals, such as those with known gaming and gambling problems, are more likely to engage with loot boxes than those without. The study is the result of one of the largest, most complex and robustly designed surveys yet conducted on loot boxes, and has prompted experts to reiterate the call for stricter enforcement around them.

Computer Science: Encryption Computer Science: Quantum Computers Mathematics: Puzzles Physics: General Physics: Quantum Computing Physics: Quantum Physics
Published

Keep it secret: Cloud data storage security approach taps quantum physics      (via sciencedaily.com)     Original source 

Distributed cloud storage is a hot topic for security researchers, and a team is now merging quantum physics with mature cryptography and storage techniques to achieve a cost-effective cloud storage solution.

Computer Science: Encryption Computer Science: General
Published

Accelerating AI tasks while preserving data security      (via sciencedaily.com)     Original source 

SecureLoop is a new search engine that can identify an optimal design for a deep neural network accelerator that preserves data security while improving energy efficiency and boosting performance. This could enable device manufacturers to increase the speed of demanding AI applications, while ensuring sensitive data remain safe from attackers.

Computer Science: General Mathematics: Puzzles
Published

Certain online games use dark designs to collect player data      (via sciencedaily.com)     Original source 

The privacy policies and practices of online games contain dark design patterns which could be deceptive, misleading, or coercive to users, according to a new study.

Computer Science: Encryption Physics: Optics
Published

New study unveils stretchable high-resolution user-interactive synesthesia displays for visual--acoustic encryption      (via sciencedaily.com)     Original source 

A research team has succeeded in developing a cutting-edge display using transfer-printing techniques, propelling the field of multifunctional displays into new realms of possibility.

Mathematics: General Mathematics: Puzzles
Published

Machine learning unravels mysteries of atomic shapes      (via sciencedaily.com) 

New research has used machine learning to find the properties of atomic pieces of geometry, in pioneering work that could drive the development of new results in mathematics.

Chemistry: Inorganic Chemistry Computer Science: Encryption Computer Science: General Computer Science: Quantum Computers Energy: Technology Mathematics: Puzzles Physics: General Physics: Optics Physics: Quantum Computing Physics: Quantum Physics
Published

Better cybersecurity with new material      (via sciencedaily.com) 

Digital information exchange can be safer, cheaper and more environmentally friendly with the help of a new type of random number generator for encryption. The researchers behind the study believe that the new technology paves the way for a new type of quantum communication.

Mathematics: Puzzles
Published

Effectiveness of video gameplay restrictions questioned in new study      (via sciencedaily.com) 

Legal restrictions placed on the amount of time young people in China can play video games may be less effective than originally thought, a new study has revealed.

Computer Science: Encryption
Published

How randomized data can improve our security      (via sciencedaily.com) 

With an innovative approach, scientists are creating new standards for data security in the cache of electronic devices.

Computer Science: Encryption
Published

A new weapon in the war on robocall scams      (via sciencedaily.com) 

The latest weapon in the war on robocalls is an automated system that analyzes the content of unsolicited bulk calls to shed light on both the scope of the problem and the type of scams being perpetuated by robocalls. The tool, called SnorCall, is designed to help regulators, phone carriers and other stakeholders better understand and monitor robocall trends -- and take action against related criminal activity.

Computer Science: Encryption
Published

Smart devices: Putting a premium on peace of mind      (via sciencedaily.com) 

The White House has announced plans to roll out voluntary labeling for internet-connected devices like thermostats and baby monitors that meet certain cybersecurity standards. A new survey of U.S. consumers shows that they are willing to pay a significant premium to tell which gadgets are safe from security attacks before they buy. But voluntary product labels may not be enough if the program is going to protect consumers in the long run, the findings suggest.

Mathematics: Puzzles
Published

Social media algorithms exploit how humans learn from their peers      (via sciencedaily.com) 

In prehistoric societies, humans tended to learn from members of our ingroup or from more prestigious individuals, as this information was more likely to be reliable and result in group success. However, with the advent of diverse and complex modern communities -- and especially in social media -- these biases become less effective. For example, a person we are connected to online might not necessarily be trustworthy, and people can easily feign prestige on social media. Now, a group of social scientists describe how the functions of social media algorithms are misaligned with human social instincts meant to foster cooperation, which can lead to large-scale polarization and misinformation.

Biology: Evolutionary Mathematics: General Mathematics: Modeling Mathematics: Puzzles
Published

Scientists uncover a surprising connection between number theory and evolutionary genetics      (via sciencedaily.com) 

An interdisciplinary team of mathematicians, engineers, physicists, and medical scientists has uncovered an unexpected link between pure mathematics and genetics, that reveals key insights into the structure of neutral mutations and the evolution of organisms.

Computer Science: Encryption Computer Science: General
Published

Why computer security advice is more confusing than it should be      (via sciencedaily.com) 

If you find the computer security guidelines you get at work confusing and not very useful, you're not alone. A new study highlights a key problem with how these guidelines are created, and outlines simple steps that would improve them -- and probably make your computer safer.

Computer Science: Encryption
Published

Solving rare disease mysteries ... and protecting privacy      (via sciencedaily.com) 

Researchers have demonstrated a new way of linking personal records and protecting privacy. The first application is in identifying cases of rare genetic disorders. There are many other potential applications across society.

Mathematics: General Mathematics: Modeling Mathematics: Puzzles
Published

Board games are boosting math ability in young children      (via sciencedaily.com) 

Board games based on numbers, like Monopoly, Othello and Chutes and Ladders, make young children better at math, according to a comprehensive review of research published on the topic over the last 23 years.

Computer Science: Encryption
Published

Stressed for a bit? Then don't click it, cybersecurity experts advise      (via sciencedaily.com)     Original source 

Workers feeling a specific form of stress are more likely than others to become the victims of a phishing attack, according to a new study.

Computer Science: Encryption Mathematics: General Mathematics: Modeling
Published

Evaluating cybersecurity methods      (via sciencedaily.com)     Original source 

Researchers created a generic framework that enables an engineer or scientist to evaluate the effectiveness of defense schemes that seek to limit a hacker's ability to learn secret information by observing the behavior of a victim computer program.

Mathematics: Puzzles
Published

How the brain processes numbers -- New procedure improves measurement of human brain activity      (via sciencedaily.com)     Original source 

Measuring human brain activity down to the cellular level: until now, this has been possible only to a limited extent. With a new approach it will now be much easier. The method relies on microelectrodes along with the support of brain tumor patients, who participate in studies while undergoing 'awake' brain surgery. This enabled the team to identify how our brain processes numbers.

Computer Science: Encryption Physics: Acoustics and Ultrasound
Published

How secure are voice authentication systems really?      (via sciencedaily.com)     Original source 

Computer scientists have discovered a method of attack that can successfully bypass voice authentication security systems with up to a 99% success rate after only six tries.