97416946
submission
dryriver writes:
The BBC reports: News organisations have tried many novel ways to make readers pay — but this idea is possibly the most audacious yet. If a reader chooses to block its advertising, US publication Salon will use that person's computer to mine for Monero, a cryptocurrency similar to Bitcoin. Creating new tokens of a cryptocurrency typically requires complex calculations that use up a lot of computing power. Salon told readers: "We intend to use a small percentage of your spare processing power to contribute to the advancement of technological discovery, evolution and innovation." The site is making use of CoinHive, a controversial mining tool that was recently used in an attack involving government websites in the UK, US and elsewhere. However, unlike that incident, where hackers took control of visitors' computers to mine cryptocurrency, Salon notifies users and requires them to agree before the tool begins mining.
71988793
submission
StartsWithABang writes:
Before there were planets, galaxies, or even stars in the Universe, there really was light. We see that light, left over today, in the form of the Cosmic Microwave Background, or the remnant glow from the Big Bang. But these photons outnumber the matter in our Universe by more than a-billion-to-one, and are the most numerous thing around. So where did they first come from? Science has the answer.
59816981
submission
KentuckyFC writes:
One of the most profound advances in science in recent years is the way researchers from a variety of fields are beginning to formulate the problem of consciousness in mathematical terms, in particular using information theory. That's largely thanks to a relatively new theory that consciousness is a phenomenon which integrates information in the brain in a way that cannot be broken down. Now a group of researchers has taken this idea further using algorithmic theory to study whether this kind of integrated information is computable. They say that the process of integrating information is equivalent to compressing it. That allows memories to be retrieved but it also loses information in the process. But they point out that this cannot be how real memory works otherwise otherwise retrieving memories repeatedly would cause them to gradually decay. By assuming that the process of memory is non-lossy, they use algorithmic theory to show that the process of integrating information must noncomputable. In other words, your PC can never be conscious in the way you are. That's likely to be a controversial finding but the bigger picture is that the problem of consciousness is finally opening up to mathematical scrutiny for the first time.
31441303
submission
wiredmikey writes:
Security researchers have discovered new Android malware that is controlled via SMS that can do a number of things on the compromised device including recording calls and surrounding noise.
Called TigerBot, the recently discovered malware was found circulating in the wild via non-official Android channels. Based on the code examination, the researchers from NQ Mobile, alongside researchers at North Carolina State University said that TigerBot can record sounds in the immediate area of the device, as well as calls themselves. It also has the ability to alter network settings, report its current GPS coordinates, capture and upload images, kill other processes, and reboot the phone.
TigerBot will hide itself on a compromised device by forgoing an icon on the home screen, and by masking itself with a legit application name such as Flash or System. Once installed an active, it will register a receiver with a high priority to listen to the intent with action “android.provider.Telephony.SMS_RECEIVED.”