from the world's big
4 no-brainer online security measures we need to start practicing now
We're blissfully ignorant of how we put ourselves at risk online.
- According to the 2019 Official Annual Cybercrime Report, businesses fall for ransomware attacks every 14 seconds.
- Many people ignore standard security practices that significantly reduce their chances of being attacked, such as disabling their computer's microphone and camera.
- Establishing better cyber security practices is a matter of unlearning bad habits, and creating better ones.
The sheer number of massive data breaches and known security vulnerabilities online today should be enough to scare us into better data safety practices. However, though these issues seem to consistently elicit gasps and condemnations by talking heads and private users, little else is done. It's not about turning office and personal computers into Fort Knox, really, it's about using common sense and exercising caution.
According to the 2019 Official Annual Cybercrime Report, businesses fall for ransomware attacks every 14 seconds. Cybercrime is also on the rise, with some estimates putting the cost of online crimes at roughly $6 trillion by 2021. In this increasingly risky landscape, it makes sense to invest heavily in antivirus, anti-malware, and overall protection tools. However, these applications can only take you so far.
At some point, the problem isn't that hackers are too smart for us, but that we, in a false sense of security, believe we can let our guard down, which leads us to ignore standard security practices that significantly reduce chances of our being attacked. Here are some no-brainer security steps that we constantly overlook but should start keeping in mind.
Browsing the web via VPN
While it may seem like an endless amusement park with everything you've ever wanted to find, the internet is a much darker than we'd like to imagine. Although it is undoubtedly a great tool and has significantly enhanced quality of life the world over, the internet also means our personal data is now exposed every time we browse the web or open an application online. Often, sites and bodies we see as the "safest" are often themselves invaders of our privacy such as internet service providers, governments, and giant tech companies.
Connecting to an unknown network can be dangerous — something nearly 92 percent of those who use public WiFi networks ignore. Undeniably, many have started to limit their activity online as their concerns about privacy (rightfully) grow. Yet, many people still happily browse the web without a care and continue to leave trails of data everywhere, creating noteworthy problems when their information is scanned and compromised.
According to Harold Li, Vice President at ExpressVPN: "In an era when we conduct the most crucial and sensitive parts of our lives online, a VPN is a critical tool for protecting both digital privacy and security. They increase your anonymity online, shield your online activity from monitoring by ISPs and governments, and defend your data from hackers on shared networks such as public Wi-Fi." Even so, most of us continue to neglect VPNs. In fact, according to VPN Mentor, only 5 percent of internet users in the U.S. have a VPN.
Protecting Google docs
As we become increasingly reliant on the cloud, one of the first things we've migrated is our ability to do work. McAfee's 2019 Cloud Adoption and Risk Report found that for the past six years running, the "file sharing and collaboration services" category — services such as Google Docs — has been the leading driver of cloud use in business, accounting for nearly 21 percent of services in use at the average company.
According to the study, today, some 83 percent of organizations store sensitive data in the cloud, and about 8 percent of all cloud-shared documents include sensitive information. Moreover, we're sharing these files more than we used to, with significant year-over-year rises in documents set for open access to "anyone with a link."
This is problematic for two reasons. On one hand, the ease with which we can share documents increases the likelihood that they will be intercepted. On the other, as user bases stratify around services they use, SaaS platforms gain access to sensitive corporate assets unbeknownst to even the IT team. This is what's known as "shadow IT."
In remarks to Techopedia, Uri Haramati, the CEO of SaaS management platform company Torii , noted that "Considering the rampant threat of cyberattacks, security risks are definitely something companies have to be wary of."
On the other hand, "The fact that they are trying out new tools, means that they want to be better at their work," according to Haramati. "Why should management dampen such a positive attitude? Instead, leaders should value their employees' drive to be better and find out how their existing processes can be improved upon."
Disabling your microphone and camera
Recently, video conferencing service Zoom was revealed to have major flaws that allow hackers to theoretically take over unsuspecting users' webcams with a single URL. This may seem like a less threatening incident than having data stolen, but it can be just as damaging. A malicious third party with unfettered access to your webcam can discern much about your personal habits and can potentially witness and record damaging or embarrassing situations. In the U.K., for instance, there have been recorded incidents of hackers capturing these moments and threatening to upload them to social media unless a ransom is paid.
The problem is similar with microphones, which can be used to track your communications even when your devices are "off." Most A.I.-based assistants today, for instance (such as Siri, Alexa, and Google Home) are constantly listening, and companies have people on the other side listening to these recordings, as was discovered recently with Siri. Simply turning off your microphone manually can give you significant protection.
Using Encrypted Communications
It may sound straight out of a James Bond movie, but encryption is quickly becoming one of the most important technology fields in our digitized world. Even with a VPN and robust protection, it's still not impossible for someone to access our communications while they're in transit between us and the recipients. In fact, as our messaging applications expand in number and importance, governments, law enforcement and nefarious actors' interest in them is rising.
Many services do offer powerful encryption tools and features, but people often remain on the most popular chat apps because of convenience and familiarity. Facebook Messenger remains one of the most popular tools (despite belonging to a decidedly anti-privacy corporation), while Chinese apps like WeChat and Tencent's QQ Mobile are also main players despite the fact that they're both heavily monitored by the Chinese Government.
Facebook's Messenger, for instance, only offers optional end-to-end encryption (even though WhatsApp, which Facebook also owns, provides E2E by default). This doesn't even account for emails, which remain the most popular online communication method. Even when sending sensitive data, we're more than happy to send it via Gmail or Yahoo! and completely ignore the fact that there is little we can do once those emails leave our inboxes to protect the information we've shared.
Establishing better cyber security practices doesn't require a computer science degree and a military budget. What it needs is attention to detail, unlearning bad habits, and creating new ones. As the number of vectors available to hackers, scammers, data miners and governments continue to expand, it won't be big things that cause breaches, but rather something as small as leaving a webcam on, forgetting a password, or sending a compromising email without considering who may view it.
- What Netflix's“Great Hack” tells us about the future of data - Big Think ›
- RIP, Privacy? The Strange Paradox of How We Act Online. - Big Think ›
Andy Samberg and Cristin Milioti get stuck in an infinite wedding time loop.
- Two wedding guests discover they're trapped in an infinite time loop, waking up in Palm Springs over and over and over.
- As the reality of their situation sets in, Nyles and Sarah decide to enjoy the repetitive awakenings.
- The film is perfectly timed for a world sheltering at home during a pandemic.
Richard Feynman once asked a silly question. Two MIT students just answered it.
Here's a fun experiment to try. Go to your pantry and see if you have a box of spaghetti. If you do, take out a noodle. Grab both ends of it and bend it until it breaks in half. How many pieces did it break into? If you got two large pieces and at least one small piece you're not alone.
But science loves a good challenge<p>The mystery remained unsolved until 2005, when French scientists <a href="http://www.lmm.jussieu.fr/~audoly/" target="_blank">Basile Audoly</a> and <a href="http://www.lmm.jussieu.fr/~neukirch/" target="_blank">Sebastien Neukirch </a>won an <a href="https://www.improbable.com/ig/" target="_blank">Ig Nobel Prize</a>, an award given to scientists for real work which is of a less serious nature than the discoveries that win Nobel prizes, for finally determining why this happens. <a href="http://www.lmm.jussieu.fr/spaghetti/audoly_neukirch_fragmentation.pdf" target="_blank">Their paper describing the effect is wonderfully funny to read</a>, as it takes such a banal issue so seriously. </p><p>They demonstrated that when a rod is bent past a certain point, such as when spaghetti is snapped in half by bending it at the ends, a "snapback effect" is created. This causes energy to reverberate from the initial break to other parts of the rod, often leading to a second break elsewhere.</p><p>While this settled the issue of <em>why </em>spaghetti noodles break into three or more pieces, it didn't establish if they always had to break this way. The question of if the snapback could be regulated remained unsettled.</p>
Physicists, being themselves, immediately wanted to try and break pasta into two pieces using this info<p><a href="https://roheiss.wordpress.com/fun/" target="_blank">Ronald Heisser</a> and <a href="https://math.mit.edu/directory/profile.php?pid=1787" target="_blank">Vishal Patil</a>, two graduate students currently at Cornell and MIT respectively, read about Feynman's night of noodle snapping in class and were inspired to try and find what could be done to make sure the pasta always broke in two.</p><p><a href="http://news.mit.edu/2018/mit-mathematicians-solve-age-old-spaghetti-mystery-0813" target="_blank">By placing the noodles in a special machine</a> built for the task and recording the bending with a high-powered camera, the young scientists were able to observe in extreme detail exactly what each change in their snapping method did to the pasta. After breaking more than 500 noodles, they found the solution.</p>
The apparatus the MIT researchers built specifically for the task of snapping hundreds of spaghetti sticks.
(Courtesy of the researchers)
What possible application could this have?<p>The snapback effect is not limited to uncooked pasta noodles and can be applied to rods of all sorts. The discovery of how to cleanly break them in two could be applied to future engineering projects.</p><p>Likewise, knowing how things fragment and fail is always handy to know when you're trying to build things. Carbon Nanotubes, <a href="https://bigthink.com/ideafeed/carbon-nanotube-space-elevator" target="_self">super strong cylinders often hailed as the building material of the future</a>, are also rods which can be better understood thanks to this odd experiment.</p><p>Sometimes big discoveries can be inspired by silly questions. If it hadn't been for Richard Feynman bending noodles seventy years ago, we wouldn't know what we know now about how energy is dispersed through rods and how to control their fracturing. While not all silly questions will lead to such a significant discovery, they can all help us learn.</p>
The multifaceted cerebellum is large — it's just tightly folded.
- A powerful MRI combined with modeling software results in a totally new view of the human cerebellum.
- The so-called 'little brain' is nearly 80% the size of the cerebral cortex when it's unfolded.
- This part of the brain is associated with a lot of things, and a new virtual map is suitably chaotic and complex.
Just under our brain's cortex and close to our brain stem sits the cerebellum, also known as the "little brain." It's an organ many animals have, and we're still learning what it does in humans. It's long been thought to be involved in sensory input and motor control, but recent studies suggests it also plays a role in a lot of other things, including emotion, thought, and pain. After all, about half of the brain's neurons reside there. But it's so small. Except it's not, according to a new study from San Diego State University (SDSU) published in PNAS (Proceedings of the National Academy of Sciences).
A neural crêpe
A new imaging study led by psychology professor and cognitive neuroscientist Martin Sereno of the SDSU MRI Imaging Center reveals that the cerebellum is actually an intricately folded organ that has a surface area equal in size to 78 percent of the cerebral cortex. Sereno, a pioneer in MRI brain imaging, collaborated with other experts from the U.K., Canada, and the Netherlands.
So what does it look like? Unfolded, the cerebellum is reminiscent of a crêpe, according to Sereno, about four inches wide and three feet long.
The team didn't physically unfold a cerebellum in their research. Instead, they worked with brain scans from a 9.4 Tesla MRI machine, and virtually unfolded and mapped the organ. Custom software was developed for the project, based on the open-source FreeSurfer app developed by Sereno and others. Their model allowed the scientists to unpack the virtual cerebellum down to each individual fold, or "folia."
Study's cross-sections of a folded cerebellum
Image source: Sereno, et al.
A complicated map
Sereno tells SDSU NewsCenter that "Until now we only had crude models of what it looked like. We now have a complete map or surface representation of the cerebellum, much like cities, counties, and states."
That map is a bit surprising, too, in that regions associated with different functions are scattered across the organ in peculiar ways, unlike the cortex where it's all pretty orderly. "You get a little chunk of the lip, next to a chunk of the shoulder or face, like jumbled puzzle pieces," says Sereno. This may have to do with the fact that when the cerebellum is folded, its elements line up differently than they do when the organ is unfolded.
It seems the folded structure of the cerebellum is a configuration that facilitates access to information coming from places all over the body. Sereno says, "Now that we have the first high resolution base map of the human cerebellum, there are many possibilities for researchers to start filling in what is certain to be a complex quilt of inputs, from many different parts of the cerebral cortex in more detail than ever before."
This makes sense if the cerebellum is involved in highly complex, advanced cognitive functions, such as handling language or performing abstract reasoning as scientists suspect. "When you think of the cognition required to write a scientific paper or explain a concept," says Sereno, "you have to pull in information from many different sources. And that's just how the cerebellum is set up."
Bigger and bigger
The study also suggests that the large size of their virtual human cerebellum is likely to be related to the sheer number of tasks with which the organ is involved in the complex human brain. The macaque cerebellum that the team analyzed, for example, amounts to just 30 percent the size of the animal's cortex.
"The fact that [the cerebellum] has such a large surface area speaks to the evolution of distinctively human behaviors and cognition," says Sereno. "It has expanded so much that the folding patterns are very complex."
As the study says, "Rather than coordinating sensory signals to execute expert physical movements, parts of the cerebellum may have been extended in humans to help coordinate fictive 'conceptual movements,' such as rapidly mentally rearranging a movement plan — or, in the fullness of time, perhaps even a mathematical equation."
Sereno concludes, "The 'little brain' is quite the jack of all trades. Mapping the cerebellum will be an interesting new frontier for the next decade."
What happens if we consider welfare programs as investments?
- A recently published study suggests that some welfare programs more than pay for themselves.
- It is one of the first major reviews of welfare programs to measure so many by a single metric.
- The findings will likely inform future welfare reform and encourage debate on how to grade success.
Welfare as an investment<p>The <a href="https://scholar.harvard.edu/files/hendren/files/welfare_vnber.pdf" target="_blank">study</a>, carried out by Nathaniel Hendren and Ben Sprung-Keyser of Harvard University, reviews 133 welfare programs through a single lens. The authors measured these programs' "Marginal Value of Public Funds" (MVPF), which is defined as the ratio of the recipients' willingness to pay for a program over its cost.</p><p>A program with an MVPF of one provides precisely as much in net benefits as it costs to deliver those benefits. For an illustration, imagine a program that hands someone a dollar. If getting that dollar doesn't alter their behavior, then the MVPF of that program is one. If it discourages them from working, then the program's cost goes up, as the program causes government tax revenues to fall in addition to costing money upfront. The MVPF goes below one in this case. <br> <br> Lastly, it is possible that getting the dollar causes the recipient to further their education and get a job that pays more taxes in the future, lowering the cost of the program in the long run and raising the MVPF. The value ratio can even hit infinity when a program fully "pays for itself."</p><p> While these are only a few examples, many others exist, and they do work to show you that a high MVPF means that a program "pays for itself," a value of one indicates a program "breaks even," and a value below one shows a program costs more money than the direct cost of the benefits would suggest.</p> After determining the programs' costs using existing literature and the willingness to pay through statistical analysis, 133 programs focusing on social insurance, education and job training, tax and cash transfers, and in-kind transfers were analyzed. The results show that some programs turn a "profit" for the government, mainly when they are focused on children:
This figure shows the MVPF for a variety of polices alongside the typical age of the beneficiaries. Clearly, programs targeted at children have a higher payoff.
Nathaniel Hendren and Ben Sprung-Keyser<p>Programs like child health services and K-12 education spending have infinite MVPF values. The authors argue this is because the programs allow children to live healthier, more productive lives and earn more money, which enables them to pay more taxes later. Programs like the preschool initiatives examined don't manage to do this as well and have a lower "profit" rate despite having decent MVPF ratios.</p><p>On the other hand, things like tuition deductions for older adults don't make back the money they cost. This is likely for several reasons, not the least of which is that there is less time for the benefactor to pay the government back in taxes. Disability insurance was likewise "unprofitable," as those collecting it have a reduced need to work and pay less back in taxes. </p>