If the public are serious about wanting to protect children from online sexual abuse more investment in skilled professionals is needed now. The stark warning comes from researchers following publication of a new report commissioned by the Independent Inquiry on Child Sexual Abuse (IICSA) which coincided with the first day of the public hearing into online child sexual abuse.
Devices used to manage accounts using Bitcoin could be improved to provide better protection against hackers, according to research by University of Edinburgh scientists.
One of the big challenges in computer architecture is integrating storage, memory and processing in one unit. This would make computers faster and more energy efficient. University of Groningen physicists have taken a big step towards this goal by combining a niobium doped strontium titanate (SrTiO3) semiconductor with ferromagnetic cobalt. At the interface, this creates a spin-memristor with storage abilities, paving the way for neuromorphic computing architectures. The results were published in Scientific Reports.
Researchers found that teens who spent a lot of time in front of screen devices -- playing computer games, using more social media, texting and video chatting -- were less happy than those who invested time in non-screen activities like sports, reading newspapers and magazines, and face-to-face social interaction. The happiest teens used digital media for less than an hour per day. But after a daily hour of screen time, unhappiness rises steadily along with increasing screen time
A joint China-Austria team has performed quantum key distribution between the quantum-science satellite Micius and multiple ground stations located in Xinglong (near Beijing), Nanshan (near Urumqi), and Graz (near Vienna). Such experiments demonstrate the secure satellite-to-ground exchange of cryptographic keys with ?kHz rate during the passage of the satellite Micius over a ground station. Using Micius as a trusted relay, a secret key is created between China and Europe at locations separated up to 7,600 km on the Earth.
The new ORION e-health psychoeducational tool, designed to help opioid-dependent individuals prevent an overdose, can impart new knowledge and impact a person's intention to change opioid abuse behavior, but it did not improve overall self-efficacy in overdose prevention.
The profile of most Americans who use popular mobile phone apps that track sleep habits is that they are relatively affluent, claim to eat well, and say they are in good health, even if some of them tend to smoke.
'The beauty of this research is that someone using only a laptop and an object that flickers can detect if someone is using a drone to spy on them,' says Ben Nassi, a Ph.D. student in the BGU Department of Software and Information Systems Engineering and a researcher at the BGU Cyber Security Research Center (CSRC). 'While it has been possible to detect a drone, now someone can also tell if it is recording a video of your location or something else.'
Women who consume Internet pornography are using technology to explore their sexuality and connect with others to discuss their sexual interests, according to research from the University of Waterloo.
Data travels through thousands of miles of fiber optic cables underneath the world's oceans--via pulses of light. And according to experts, the data in these cables is at great risk of being intercepted. However, a newly designed frequency comb--recently developed by researchers at the USC Viterbi School of Engineering might be an effective tool for data encryption.