Don’t Get Your Valentine an Internet-Connected Sex Toy

Don’t Get Your Valentine an Internet-Connected Sex Toy

“Even simply opening the Bluetooth explorer on your phone will reveal nearby smart adult devices that are powered on.” When Bluetooth is used to hack into and take over a sex toy, it’s called “screwdriving”—a term coined by Pen Test Partners in 2017, when its researchers discovered that the Lovense Hush butt plug could be found and remotely controlled via Bluetooth.

Amazon Gobbles Up Eero to Round Out Its Smart Home Plan

Amazon Gobbles Up Eero to Round Out Its Smart Home Plan

The company's roster of smart home devices now includes multiple speakers, TV streaming boxes and sticks, connected television sets, countertop displays, a wall clock, and a DVR, not to mention oddball gadgets like a scanning wand that aids your grocery shopping and a camera that judges your outfits.

The Green New Deal's Trains and EVs Won't Work for Everyone

The Green New Deal's Trains and EVs Won't Work for Everyone

And indeed, the resolution’s transportation recommendations are sweeping: that the country invest seriously in zero-emission vehicle infrastructure and manufacturing, in “clean, affordable, and accessible” public transit, and in so much high-speed rail that air travel is no longer necessary.

How to Watch the Grammys

How to Watch the Grammys

Don Emmert/Getty Images The bad news: The Grammy Awards show airing this Sunday has two things in common with the Super Bowl halftime show. The 61st annual Grammys airs on CBS, just like the Super Bowl.

A Crypto Exchange CEO Dies—With the Only Key to $137 Million

A Crypto Exchange CEO Dies—With the Only Key to $137 Million

In an affidavit filed in the Supreme Court of Nova Scotia last week, Jennifer Robertson, widow of QuadrigaCX CEO Gerry Cotten, wrote that the company owes its customers $190 million, but can’t access the funds to pay them back.

15 Moments That Defined Facebook's First 15 Years

15 Moments That Defined Facebook's First 15 Years

"Nothing you do is being broadcast; rather, it is being shared with people who care about what you do—your friends." Days later, Zuckerberg backtracked in an open letter, saying, "We really messed this one up," and announcing new controls users would have over what stories populated their News Feeds.

Google Offers a Pair of Apps to Help the Deaf Community

Google Offers a Pair of Apps to Help the Deaf Community

(Also worth noting: Live Transcribe only works with an internet connection, which is needed to access the cloud-based transcription service; Sound Amplifier, on the other hand, runs locally on devices.) Apple, Google’s only real competitor in mobile operating systems, has rolled out its own array of impressive features aimed at the blind and deaf community, and most are built directly into Apple’s operating systems.

AG Nominee William Barr Is No Friend of Telecom Competition

AG Nominee William Barr Is No Friend of Telecom Competition

Second, close off consumer access to any other provider of services—forcing the consumer to do business only with companies affiliated with the owner of the pipeline into the home.” In other words, Barr opposed any rules that he believed amounted to allowing, as he put it in 1999, "the scam of taking a free ride on our [phone] network," but favored rules that would require rivals—ie, cable companies—to be burdened with that same kind of obligation.

What’s keeping India in the dark?

What’s keeping India in the dark?

To boost and sustain its energy supply, India needs urgent investments and reforms to fix the inefficiencies that plague its entire electricity supply chain. To boost and sustain its energy supply, India needs urgent investments and reforms to fix the inefficiencies that plague its entire electricity supply chain.

Why Facebook's Banned 'Research' App Was So Invasive

Why Facebook's Banned 'Research' App Was So Invasive

In order to allow people with iPhones to participate, Facebook sidestepped the strict privacy rules imposed by Apple in its App Store by taking advantage of a business applications program designed for internal company use.

By Defying Apple’s Rules, Facebook Shows It Never Learns

By Defying Apple’s Rules, Facebook Shows It Never Learns

After the political consulting firm Cambridge Analytica was accused of violating Facebook’s rules by harvesting and retaining data on tens of millions of users without their knowledge, Facebook banned nearly every app the company had ever touched, including some unaffiliated research apps that were associated with the University of Cambridge.

For Women Job Seekers, Networking Like a Man Isn't Enough

For Women Job Seekers, Networking Like a Man Isn't Enough

“Quite frankly, most of the jobs are still male-dominated and therefore the kind of private information that's so important to help women get ahead isn't as important to men's advancement,” says Northwestern University data scientist Brian Uzzi, the lead author on the study.

A 'Fortnite' Vulnerability Exposed Accounts to Takeover

A 'Fortnite' Vulnerability Exposed Accounts to Takeover

Now, new research from the IT security firm Check Point reveals a trio of vulnerabilities in Fortnite 's web infrastructure that could have allowed an attacker to take over user accounts.

The Quest to Topple Science-Stymying Academic Paywalls

The Quest to Topple Science-Stymying Academic Paywalls

Many publications have since found ways to allow open access in their journals by permitting it but charging an expensive (usually hundreds or thousands of dollars per article) “article processing charge,” or APC, that is paid by the institution or the author behind the research as a sort of cost of being published.

Roku Channel Streams Shows to Your Phone, No Box Required

Roku Channel Streams Shows to Your Phone, No Box Required

And if you need any more indication that software will drive Roku’s future more than the hardware that powers it, look no further than the Roku Channel. Within a few weeks, the Roku Channel will not only host free, ad-supported content, but offer subscriptions to other streaming services as well.

Tor Is Easier Than Ever. Time to Give It a Try

Tor Is Easier Than Ever. Time to Give It a Try

But in 2018 a slew of new offerings and integrations vastly expanded the available tools, making 2019 the year to finally try Tor. You may even end up using the network without realizing it."At the end of the day for Tor what we hope is that our technology becomes underlying, and everything else that happens online happens on top of it," says Isabela Bagueros, executive director of the Tor Project.

The Worst Hacks of 2018

The Worst Hacks of 2018

But between the company's increasingly dismal track record on third-party access limits and a recent incident in which a bug exposed 6.8 million users' photos to third-party developers, it's hard to feel like things are going as well as they could on the user privacy and data management front.Atlanta RansomwareIn March, a ransomware attack locked down the City of Atlanta's digital systems, destabilizing municipal operations.

Ghana’s challenges: Widening regional inequality and natural resource depreciation

Ghana’s challenges: Widening regional inequality and natural resource depreciation

This may reflect the declining contribution of agriculture, in which the majority of poor households are engaged, the limited job opportunities for higher productivity in the services sector, and a largely capital-intensive industrial development.

Hacking Diplomatic Cables Is Expected. Exposing Them Is Not

Hacking Diplomatic Cables Is Expected. Exposing Them Is Not

It is news that they totally got caught, though," says Dave Aitel, a former NSA researcher who is now chief security technology officer at the secure infrastructure firm Cyxtera.In the attack Area 1 identified, hackers first breached the European communication network known as Coreu in April 2015, and actively exfiltrated data until last week.

Why Should Anyone Believe Facebook Anymore?

Why Should Anyone Believe Facebook Anymore?

Unlike with Cambridge Analytica, the Times says, Facebook provided access to its users’ data knowingly, and on a greater scale.Some companies, like Microsoft and its Bing search engine, had access to all a Facebook user's friends without consent.

Crispr Babies, IVF, and the Ethics of Genetic Class Warfare

Crispr Babies, IVF, and the Ethics of Genetic Class Warfare

She is a contributing editor at New York Magazine, and maintains the Nobler Fellowship at The Nation Institute.It's easy to fear this kind of procedure: follow embryonic gene editing to its logical conclusion and we’ll end up with a society dramatically altered through eugenics, with generations of people engineered to fit a single vision of perfection.

Facebook Exposed 6.8 Million Users' Photos to Cap Off a Terrible 2018

Facebook Exposed 6.8 Million Users' Photos to Cap Off a Terrible 2018

While a hacker gaining access to bank account numbers and unencrypted passwords would certainly qualify, privacy lawyers say that photos exposed through an API to developers seems like legitimately murkier territory."There’s a lot of anger and finger pointing and frustration about how do we still have security bugs and privacy bugs, and how are these things still happening?"Alex Rice, HackerOneMeanwhile, Facebook has yet to fully resolve the issue.

What’s keeping Pakistan in the dark?

What’s keeping Pakistan in the dark?

Poor transmission contributed to 29 percent of the electricity shortfall in fiscal year 2015, while weak infrastructure, faulty metering and theft cause the loss of almost a fifth of generated electricity.As such, power sector reforms should be a top priority for Pakistan can yield huge economic gains toward a more sustainable future.

Australia's Encryption-Busting Law Could Impact the World

Australia's Encryption-Busting Law Could Impact the World

All of Australia's intelligence allies—the United States, the United Kingdom, Canada, and New Zealand, known collectively as the Five Eyes—have spent decades lobbying for these mechanisms."The debate about simplifying lawful access to encrypted communication carries a considerable risk of regulations spilling to other countries," says Lukasz Olejnik, a security and privacy researcher and member of the W3C Technical Architecture Group.

The WIRED Guide to Data Breaches

The WIRED Guide to Data Breaches

The site the company set up for victims was itself vulnerable to attack, and it asked for the last six digits of people's Social Security numbers to check if their data had been impacted by the breach.

UK Documents Suggest Facebook Traded User Privacy For Growth

UK Documents Suggest Facebook Traded User Privacy For Growth

Facebook's UK Document Dump Suggests User Privacy Was Sacrificed for GrowthJack Taylor/Getty ImagesIn an unprecedented move Wednesday, British lawmakers published hundreds of pages of internal Facebook emails and other documents that previously had been ordered sealed as part of an ongoing legal case between and a now-defunct app developer called Six4Three.The documents, which date back to 2012, provide a rare window into CEO Mark Zuckerberg's thoughts on how to expand his social media juggernaut as users made the transition from desktop to mobile phones.

How Software Code Could Help You Grapple With the Legal Code

How Software Code Could Help You Grapple With the Legal Code

What you need, in other words, is your local zoning code, the body of all the laws and regulations related to land use in your area.Codification services like American Legal Publishing or Municode typically post legal codes online, but Glassmeyer says they're sometimes not searchable, making it harder for people to find what they're looking for.

How to Protect Yourself From the Giant Marriott Hack

How to Protect Yourself From the Giant Marriott Hack

But the bulk of the victims—currently thought to be 327 million people—had different combinations of name, address, phone number, email address, date of birth, gender, trip and reservation information, passport number, and Starwood Preferred Guest account information all stolen."Four years is an eternity when it comes to breaches."David Kennedy, TrustedSecSome credit card numbers were also stolen as part of the breach, Marriott says, but the company did not provide an initial estimate of how many were taken.

Digging the cold gold for the most vulnerable

Digging the cold gold for the most vulnerable

Today, we can implement efficient, sustainable cold chains to keep our food fresh and safe and preserve medicine and vaccines, while at the same reducing greenhouse emissions.

In data-scarce environments, disruptive thinking is needed: Freetown transport resilience

In data-scarce environments, disruptive thinking is needed: Freetown transport resilience

We had in mind three main ideas: (i) let’s understand how flooding impacts transport services; (ii) let’s compare how people move different in rainy season and out of rainy season (comparison of mobility patterns); and (iii) let’s analyze the changes on accessibility due to climate impact.

More