Scientists see women's brains switch off during sex

When Harry scanned Sally


Readers worried that their female partners may be faking it can now rest easy. As long you keep brain scanner close at hand in the bedroom, you’ll be able to find out if you really are the best, the best, the best, or whether she’s actually running through the shopping list ahead of your next trip to Safeways.

A group of researchers at the University of Groningen in the Netherlands – where else - scanned the brains of 13 women and 11 men as they were brought to orgasm by their partners. The resulting brain images were compared to images of the subjects’ brains while at rest.

Reuters reports that the researchers told a fertility conference today that when the women were experiencing a genuine humdinger of an orgasm, areas of the brain governing fear and emotion, such as the cortex, were deactivated. However, when the women faked orgasm, those areas stayed alert.

The results for men were less conclusive, with those areas linked to emotion and fear showing less de-activation during orgasm, while other areas showed more stimulation. This of course is no surprise at all - as it’s hard to super-impose Angelina Jolie/Brad Pitt/St Bob Geldof/Margaret Thatcher over your regular partner's visage without using at least some parts of your brain.

There was no mention of whether the results may have been affected by the fact the couples were being watched by a bunch of geeks in white coats while at least one partner had their head connected to a machine that goes bing. ®

Related stories

Big-O problems may be down to genes
Boffins pinpoint trust hormone
SF hosts 'Masturbate-a-thon'
Gamble or get orgasm tips on your mobile


Other stories you might like

  • If you're using the ctx Python package, bad news: Vandal added info-stealing code
    Domain associated with maintainer email expired, taken over in supply-chain attack

    The Python Package Index (PyPI), a repository for Python software libraries, has advised Python developers that the ctx package has been compromised.

    Any installation of the software in the past ten days should be investigated to determine whether sensitive account identifiers stored in environment variables, such as cloud access keys, have been stolen.

    The PyPI administrators estimate that about 27,000 malicious copies of ctx were downloaded from the registry since the rogue versions of ctx first appeared, starting around 19:18 UTC on May 14, 2022.

    Continue reading
  • DigitalOcean sets sail for serverless seas with Functions feature
    Might be something for those who find AWS, Azure, GCP overly complex

    DigitalOcean dipped its toes in the serverless seas Tuesday with the launch of a Functions service it's positioning as a developer-friendly alternative to Amazon Web Services Lambda, Microsoft Azure Functions, and Google Cloud Functions.

    The platform enables developers to deploy blocks or snippets of code without concern for the underlying infrastructure, hence the name serverless. However, according to DigitalOcean Chief Product Officer Gabe Monroy, most serverless platforms are challenging to use and require developers to rewrite their apps for the new architecture. The ultimate goal being to structure, or restructure, an application into bits of code that only run when events occur, without having to provision servers and stand up and leave running a full stack.

    "Competing solutions are not doing a great job at meeting developers where they are with workloads that are already running today," Monroy told The Register.

    Continue reading
  • Patch now: Zoom chat messages can infect PCs, Macs, phones with malware
    Google Project Zero blows lid off bug involving that old chestnut: XML parsing

    Zoom has fixed a security flaw in its video-conferencing software that a miscreant could exploit with chat messages to potentially execute malicious code on a victim's device.

    The bug, tracked as CVE-2022-22787, received a CVSS severity score of 5.9 out of 10, making it a medium-severity vulnerability. It affects Zoom Client for Meetings running on Android, iOS, Linux, macOS and Windows systems before version 5.10.0, and users should download the latest version of the software to protect against this arbitrary remote-code-execution vulnerability.

    The upshot is that someone who can send you chat messages could cause your vulnerable Zoom client app to install malicious code, such as malware and spyware, from an arbitrary server. Exploiting this is a bit involved, so crooks may not jump on it, but you should still update your app.

    Continue reading

Biting the hand that feeds IT © 1998–2022