The Wetlands Are Drowning

The Wetlands Are Drowning

“We often call them ecosystem engineers,” says Pat Megonigal, an ecologist who directs the Smithsonian’s Global Change Research Wetland and studies the plants.For a long while, wetland researchers have wondered whether that skill could help the plants build their way out of climate change.

Got an Invasive Army of Crayfish Clones? Try Eating Them

Got an Invasive Army of Crayfish Clones? Try Eating Them

Lyko led the ambitious genome study that established the extraordinary fact that all marbled crayfish originate from a single foundational female.

The Global Economy Ignores Developing Nations at Its Own Peril

The Global Economy Ignores Developing Nations at Its Own Peril

Given the integrated nature of the world economy, the fact that next year emerging economies will still not experience the economic rebound already seen in many developed regions in 2021 means global growth will remain low and slow.

How Healthy Is a Farm's Soil? Check How Active Its Microbes Are

How Healthy Is a Farm's Soil? Check How Active Its Microbes Are

Since he started farming for himself in the early 1990s, he’s tried any number of tests that measure soil health, like basic nutrient profiles and fatty acid assays.“A lot of what people currently do is look at what the structure of soil is, but not what it does—the microbial activity,” Mohamed says.

Why James Bond Doesn’t Use an iPhone

Why James Bond Doesn’t Use an iPhone

“Pegasus spyware would no doubt be used by adversaries to target James Bond if he were an iPhone user,” says Moore.

I Want My Daughter to Live in a Better Metaverse

I Want My Daughter to Live in a Better Metaverse

While I appreciate the ability to shield my teenager from unseemly content, I also understand the importance of having meaningful conversations about why certain words and actions can harm others.It’s not difficult to imagine nefarious actors injecting extremist or toxic content into metaverse experiences directly.

California Man Stole 620,000 iCloud Photos in Search of Nudes

California Man Stole 620,000 iCloud Photos in Search of Nudes

Razer said it's going to vix the vulnerability, but it speaks to broader concerns around similar software that relies on the Windows "plug-and-play" set-up.📩 The latest on tech, science, and more: Get our newsletters !When the next animal plague hits, can this lab stop it.

Wait. Northern Paper Wasps Recognize Each Other’s Faces?

Wait. Northern Paper Wasps Recognize Each Other’s Faces?

But they also serve not only an important ecological role, but are providing researchers with a fascinating ability to watch and track evolution in almost real time, says Sara Miller, a post-doctoral fellow in the Sheehan Lab at Cornell University, who published a 2020 study on northern paper wasp facial recognition.

The Push for Ad Agencies to Ditch Big Oil Clients

The Push for Ad Agencies to Ditch Big Oil Clients

“Shell might come to us with a $1 million contract, and we’re walking away from that,” says Roger Ramirez, chief growth officer of the New York–based ad agency Mustache, which signed onto the pledge earlier this year.

NIWA calculates 1:200 year flood for parts of Canterbury

NIWA calculates 1:200 year flood for parts of Canterbury

Preliminary analysis by NIWA climate scientists has shown that the recent Canterbury rainfall was so extreme in some inland places that it could be expected to happen only once every 200 years.

Scientists reveal how landmark ban gave planet fighting chance

Scientists reveal how landmark ban gave planet fighting chance

The new evidence reveals the planet’s critical ability to absorb carbon from the atmosphere could have been massively degraded sending global temperatures soaring if we still used ozone-destroying chemicals such as CFCs. New modelling by the international team of scientists from New Zealand, UK and the US, published today in top science journal Nature, paints a dramatic vision of a scorched planet Earth without the Montreal Protocol, what they call the “World Avoided”.

What Really Caused Facebook's 500M-User Data Leak?

What Really Caused Facebook's 500M-User Data Leak?

Or was it the 419 million Facebook user records, including hundreds of millions of phone numbers, names, and Facebook IDs, scraped from the social network by bad actors before a 2018 Facebook policy change, that were exposed publicly and reported by TechCrunch in September 2019?

Encryption Has Never Been More Essential—or Threatened

Encryption Has Never Been More Essential—or Threatened

Five years ago today, WhatsApp completed our roll out of end-to-end encryption, which provides people all over the world with the ability to communicate privately and securely.

Facebook's ‘Red Team X’ Hunts Bugs Beyond the Social Network's Walls

Facebook's ‘Red Team X’ Hunts Bugs Beyond the Social Network's Walls

"Covid for us was really an opportunity to take a step back and evaluate how we’re all working, how things are going, and what might be next for the red team," Ionescu says.

Why France’s New Tech ‘Repairability Index’ Is a Big Deal

Why France’s New Tech ‘Repairability Index’ Is a Big Deal

Manufacturers selling these devices in France must give their products a score, or “repairability index,” based on a range of criteria, including how easy it is to take the product apart and the availability of spare parts and technical documents.

For Transplanted Tortoises, Who Lives and Who Dies?

For Transplanted Tortoises, Who Lives and Who Dies?

© Brad Shaffer The desert tortoise is protected under the Endangered Species Act. It’s been on the list as threatened since 1990.© Brad Shaffer Every animal, including human, has two sources of DNA.

A Windows Defender Vulnerability Lurked Undetected for 12 Years

A Windows Defender Vulnerability Lurked Undetected for 12 Years

The flaw, discovered by researchers at the security firm SentinelOne, showed up in a driver that Windows Defender—renamed Microsoft Defender last year—uses to delete the invasive files and infrastructure that malware can create.

How Healthy is the Ocean? Technology and Big Data Have the Answer

How Healthy is the Ocean? Technology and Big Data Have the Answer

How TNC is leading the way on applying technology to protect fisheries in the digital age Balancing a thriving fishing industry with ocean health presents a growing challenge.

The NSA Warns That Russia Is Attacking Remote Work Platforms

The NSA Warns That Russia Is Attacking Remote Work Platforms

In an advisory today, the National Security Agency said that Russian state-sponsored groups have been actively attacking a vulnerability in multiple enterprise remote-work platforms developed by VMware.

This ‘Magical Bug’ Exposed Any iPhone in a Hacker's Wi-Fi Range

This ‘Magical Bug’ Exposed Any iPhone in a Hacker's Wi-Fi Range

The genius of the attack, though, is that the bug was exploitable through an iPhone's Wi-Fi features, meaning that an attacker just needed some antennas and adapters to launch the assault whenever they chose, compromising any nearby iOS device.

A Facebook Messenger Flaw Could Have Let Hackers Listen In

A Facebook Messenger Flaw Could Have Let Hackers Listen In

Discovered by Natalie Silvanovich of Google's Project Zero bug hunting team , the vulnerability, which is now patched, could have been exploited on Messenger for Android if an attacker simultaneously called a target and sent them a specially crafted, invisible message to trigger the attack.

Computer Scientists Achieve the ‘Crown Jewel’ of Cryptography

Computer Scientists Achieve the ‘Crown Jewel’ of Cryptography

In 2018, Aayush Jain, a graduate student at the University of California, Los Angeles, traveled to Japan to give a talk about a powerful cryptographic tool he and his colleagues were developing.

A Possible Covid Vaccine Means It's Time to Fix Cold Chains

A Possible Covid Vaccine Means It's Time to Fix Cold Chains

But turn the challenges on their head and, given that most of the technologies deployed today will still be in operation for years to come, the Covid-19 global immunization effort could offer us a once-in-a lifetime opportunity to create sustainable and resilient health cold-chain systems, including for ultra-low temperatures.

Want to Fight the Zombie Fire Apocalypse? Weaponize Math

Want to Fight the Zombie Fire Apocalypse? Weaponize Math

“The magic of cellular automata is that by aggregating very simple rules in a space, it actually is able to capture what is called an ‘emergent behavior,’ which is a behavior that is extremely complex,” says Imperial College London engineer Guillermo Rein, coauthor of a new paper describing the work in the journal Proceedings of the Combustion Institute.

Quantum Computing Is Bigger Than Donald Trump

Quantum Computing Is Bigger Than Donald Trump

But what the hearing was really about was our continuing inability to figure out what to do with a technological infrastructure that gives every single person on the planet the ability to broadcast their thoughts, whether illuminating or poisonous.

Apple's T2 Security Chip Has an Unfixable Flaw

Apple's T2 Security Chip Has an Unfixable Flaw

A recently released tool is letting anyone exploit an unusual Mac vulnerability to bypass Apple's trusted T2 security chip and gain deep system access.

Activists at Amazon Say Its Climate Efforts Still Fall Short

Activists at Amazon Say Its Climate Efforts Still Fall Short

Amazon Employees for Climate Justice has demanded that the company commit to reaching zero carbon emissions by 2030, a far more ambitious agenda than the one Bezos announced last year.

Covid Vaccines in Phase III, New Risk Calculators, and More Coronavirus News

Covid Vaccines in Phase III, New Risk Calculators, and More Coronavirus News

More vaccines enter Phase III trials, researchers continue to learn about the long-term impacts of Covid-19, and risk calculation becomes increasingly difficult as the country reopens.New tools aim to help you calculate risk as cases rise and the country reopens.

Neuralink Is Impressive Tech, Wrapped in Musk Hype

Neuralink Is Impressive Tech, Wrapped in Musk Hype

The Neuralink picks up electrical signals—the “spikes” or “action potentials” that run the length of neurons when they’re activated, and signal the squirting of neurotransmitter chemicals across synapses.

A Critical Flaw Is Affecting Thousands of WordPress Sites

A Critical Flaw Is Affecting Thousands of WordPress Sites

Hackers are actively exploiting a vulnerability that allows them to execute commands and malicious scripts on websites running File Manager, a WordPress plugin with more than 700,000 active installations, researchers said on Tuesday.