‘Milestone’ Evidence for Anyons, a Third Kingdom of Particles

‘Milestone’ Evidence for Anyons, a Third Kingdom of Particles

Anyons, as they’re known, don’t behave like either fermions or bosons; instead, their behavior is somewhere in the middle.If the wave functions are identical, your quantum particles are bosons.

How to Keep Your Zoom Chats Private and Secure

How to Keep Your Zoom Chats Private and Secure

For starters, you can restrict screen sharing: If you go to your Zoom settings on the web and click In Meeting (Basic) , you'll see a Screen sharing option to stop anyone except you from sharing your desktops or apps on your computer.

To Fight Covid-19, Curb the Spread of Germs—and Rumors

To Fight Covid-19, Curb the Spread of Germs—and Rumors

That’s not the only kind of sharing there is, however, and it’s not what my student was describing.People may still post public messages not directed at anyone in particular (“To whom it may concern on the internet”), but the most problematic information about the crisis is often locally-focused, spreading through group chat or texting or email between friends, colleagues, and neighbors.

Today's Cartoon: License to Whine

Today's Cartoon: License to Whine

This week, WIRED explores the ways technology has—and hasn’t—changed how we work .Every weekday, WIRED publishes a new cartoon about the worlds of science and technology.Plus, sign up for the Daily newsletter and never miss the best of WIRED.Algae caviar, anyone?

From Drones to Data at Little Jerusalem

From Drones to Data at Little Jerusalem

“It was like looking at a mini-Grand Canyon,” said Sikorsky, a Kansas State University graduate research assistant in the Park Management and Conservation Departments of Horticulture and Natural Resources.

Facebook's Logo Gets a Face-Lift

Facebook's Logo Gets a Face-Lift

Another blog post on the company’s design hub goes into more detail about how the team used “custom typography, rounded corners, open tracking and capitalization to create visual distinction between the company and the app.” This apparent faith in the world-changing power of a good font will be familiar to anyone who has ever read a design brief.

WeWork's Wi-Fi Is Woefully Insecure

WeWork's Wi-Fi Is Woefully Insecure

Add to the pile its Wi-Fi security practices, which recent scans have shown leave documents potentially exposed to anyone else who shares the space.Plus, read the latest news on artificial intelligence 🏃🏽‍♀️ Want the best tools to get healthy?

Camera Trap Chronicles: Phantom Canyon Preserve

Camera Trap Chronicles: Phantom Canyon Preserve

Photo © Kevin Grunewald/TNC Camera traps reveal mountain lions walking down popular trails and on the canyon rim.Photo © Kevin Grunewald/TNC Bears are quite curious about camera traps, though, and can be very hard on them.

A Remote-Start App Exposed Thousands of Cars to Hackers

A Remote-Start App Exposed Thousands of Cars to Hackers

Based on a scan of MyCar's exposed database—and Jmaxxz says he was careful not to access anyone else's private data—he estimates that there were roughly 60,000 cars left open to theft by those security bugs, with enough exposed data for a hacker to even choose the make and model of the car they wanted to steal.

Strap on Your Exoskeleton and Dance, Dance, Dance

Strap on Your Exoskeleton and Dance, Dance, Dance

And of course, there were the dancing robots, which anyone attending the Gray Area Festival could sign up to physically merge with. "When humans first started making art, with the earliest examples we have in the caves of Chauvet and Lascaux—those were completely immersive and site-specific art experiences," says Threw.

An Amazon Phishing Scam Hits Just in Time For Prime Day

An Amazon Phishing Scam Hits Just in Time For Prime Day

The kit is called 16Shop; its author goes by the handle DevilScreaM.In both the Apple and Amazon campaigns, 16Shop makes it easy for anyone to craft an email that looks like it comes from a major tech company, with a PDF attached.

Hack Brief: A Card-Skimming Hacker Group Hit 17K Domains—and Counting

Hack Brief: A Card-Skimming Hacker Group Hit 17K Domains—and Counting

A new report from threat detection firm RiskIQ details how Magecart hackers have found a way to scan Amazon S3 buckets—cloud repositories that hold data and and other backend necessities for sites and companies—for any that are misconfigured to allow anyone with an Amazon Web Services account to not just read their contents, but write to them, implementing whatever changes they want.

I Scraped Millions of Venmo Payments. Your Data Is at Risk

I Scraped Millions of Venmo Payments. Your Data Is at Risk

I could see a public API endpoint that was returning the data for this feed, meaning that anyone could make a GET request (like a simple page load) to see the latest 20 transactions made on the app by anyone around the world.

The Democratic Debates Will Be About Climate—Disguised as Other Issues

The Democratic Debates Will Be About Climate—Disguised as Other Issues

Don’t tell anyone, but Jay Inslee is going to get a presidential debate focused on climate change .Inslee, the governor of Washington state and one of two dozen candidates vying for the Democratic Party’s nomination for president, has been agitating for such a single-topic debate for months.

The Heady, Thorny Journey to Decriminalize Magic Mushrooms

The Heady, Thorny Journey to Decriminalize Magic Mushrooms

A good deal for anyone but Fluck, who helped lead the ballot campaign to essentially decriminalize magic mushrooms in this city by making enforcement an extremely low priority, a measure that passed by the slimmest of margins early last month.

Here’s Everything Apple Announced at WWDC 2019

Here’s Everything Apple Announced at WWDC 2019

For anyone still looking to interact with a fellow human being while wearing AirPods, Apple announced a sound-sharing feature, which allows multiple users to connect to the same audio source.

885 Million First American Financial Records Exposed Online

885 Million First American Financial Records Exposed Online

On Friday, independent security journalist Brian Krebs revealed that the real estate and title insurance giant First American had 885 million sensitive customer financial records, going back to 2003, exposed on its website for anyone to access.

A Genetic Mutation Might Explain Why Birth Control Can Fail

A Genetic Mutation Might Explain Why Birth Control Can Fail

“Instead, maybe we need to pay more attention as physicians to other things that might be going on, like genetics, so we can give better, more individualized treatment to women instead of just blindly adhering to the motto that if you just throw some hormones at it, that usually fixes the problem.” It’s the first time anyone has ever identified unique snippets of DNA associated with birth control performance.

Soundscapes of Arizona’s Aravaipa Canyon

Soundscapes of Arizona’s Aravaipa Canyon

Photo credit: © Justin Bailie / TNC Nightbirds (May 15, 10:30pm) – Before retiring for the night, I take a long walk up Turkey Creek Canyon, enjoying the robust insect chorus and listening for other night sounds.

Mountain Lion at Phantom Canyon Preserve

Mountain Lion at Phantom Canyon Preserve

Photo © TNC For more than 30 years, The Nature Conservancy’s Phantom Canyon Preserve has sought balance between the needs of people and the needs of wildlife. Photo © TNC “The preserve is not open for six months of the year,” says Sally Ross, The Nature Conservancy in Colorado’s Laramie Hills program director.

San Francisco Could Be First to Ban Facial Recognition Tech

San Francisco Could Be First to Ban Facial Recognition Tech

“This is the first piece of legislation that I’ve seen that really takes facial recognition technology as serious as it is warranted and treats it as uniquely dangerous.” Woodrow Hartzog, Northeastern University Privacy laws in Texas and Illinois require anyone recording biometric data, including face scans and fingerprints, to give people notice and obtain their consent.

Watching Our Weight Could Be Killing Us

Watching Our Weight Could Be Killing Us

The work of the antidiet crowd asks anyone touched by diet culture to entertain the possibility that body weight doesn’t, in itself, cause health issues.

Commenting Back on Online Harassment by Making It Into Art

Commenting Back on Online Harassment by Making It Into Art

The internet gives people a false sense of protection; you have to accept that others will respond.” By playing up the caricature when she portrays her harassers, the effect is twofold: The photos offer testament to Morris-Cafiero’s underlying sentiment, as well catharis to anyone who feels somehow complicit in her turning the tables.Cafiero collected over a thousand online comments for The Bully Pulpit.Haley Morris-CafieroAnd from the muses of the project?

Why Should Anyone Believe Facebook Anymore?

Why Should Anyone Believe Facebook Anymore?

Unlike with Cambridge Analytica, the Times says, Facebook provided access to its users’ data knowingly, and on a greater scale.Some companies, like Microsoft and its Bing search engine, had access to all a Facebook user's friends without consent.

The Mad Scramble to Claim the World's Most Coveted Meteorite

The Mad Scramble to Claim the World's Most Coveted Meteorite

When he wasn’t roping cattle or gunsmithing with his father, Ward spent his free time searching for rocks among the sagebrush and saguaros.Ward’s father started taking him to gem and mineral shows, and one day young Ward made his way into the booth of Debra Heidelar, a prominent meteorite dealer, who heard a voice saying “Excuse me, ma’am” but couldn’t figure out where it was coming from until she looked down, below her counter, and saw a tiny cowboy asking very politely if he could please buy a piece of the Canyon Diablo iron.

How Russian Trolls Used Meme Warfare to Divide America

How Russian Trolls Used Meme Warfare to Divide America

At the time, the company was asked: “Does Facebook believe that any of the content created by the Russian Internet Research Agency was designed to discourage anyone from voting?” Facebook responded: “We believe this is an assessment that can be made only by investigators with access to classified intelligence and information from all relevant companies and industries.”A Facebook spokesperson added on Monday morning: “We continue to fully cooperate with officials investigating the IRA’s activity on Facebook and Instagram around the 2016 election.

Postmates' Quest to Build the Delivery Robot of the Future

Postmates' Quest to Build the Delivery Robot of the Future

"We have five seconds to change people's minds.”'If there's ever going to be an emoji for a rover on the sidewalk, it better look like Serve.'Bastian Lehmann, Postmates co-founder and CEOSo Kashani developed a new objective: The rover had to work, yes, and successfully navigate its way into restaurants without running anyone over.

You've Never Seen Thunderstorms Like These Before

You've Never Seen Thunderstorms Like These Before

For the past decade, photographer Mitch Dobrowner has spent a few weeks every summer pursuing extreme weather across the midwestern United States with veteran storm chaser Roger Hill, who, according to the Guinness Book of World Records, has witnessed more tornadoes (more than 650) than anyone in history.

An Ingenious Data Hack Is More Dangerous Than Anyone Feared

An Ingenious Data Hack Is More Dangerous Than Anyone Feared

The researchers say such an attack could even be down remotely, without physical access to the target system.Both in terms of the attack and possible defenses, the researchers say there is still a lot that is unknown, because ECC chips, their implementation, and the devices they work in are all generally proprietary.

How to Safely and Securely Dispose of Your Old Gadgets

How to Safely and Securely Dispose of Your Old Gadgets

And you want to get rid of the device in a way that's as kind to the planet as possible.Here we'll show you how to take care of both considerations, no matter what the gadget you need to dispose of.Wipe Your DataDavid NieldWhether you're sending your device to be recycled or sticking it on Ebay, you don't want your finance spreadsheets, family photos, or Twitter login to stick around on the hardware, even if you don't think anyone would go to the trouble of trying to extract the data from your old gadgets.When it comes to gadgets with on-board storage, we're primarily talking phones, tablets, and computers.

More