How to Make Podcasts Better for People With Hearing Loss

How to Make Podcasts Better for People With Hearing Loss

“In short,” she says, “I've got no control over what my brain chooses to process, and there's all sorts of things that trigger it and create stress.” And so when it comes to podcasts, sound design is especially important for Benjamin and other people with auditory processing disorder, because they hear lots of sounds that other people may not pick up on.

What Is Zero Trust? It Depends What You Want to Hear

What Is Zero Trust? It Depends What You Want to Hear

Under the old model, all the computers, servers, and other devices physically in an office building were on the same network and trusted each other.Once an attacker slipped by those perimeter defenses, remotely or by physically infiltrating an organization, the network would instantly grant them a lot of trust and freedom.

The FBI Takes a Drastic Step to Fight China’s Hacking Spree

The FBI Takes a Drastic Step to Fight China’s Hacking Spree

A disproportionate number of Hafnium victims appear to have been small- to medium-sized businesses, which are more inclined to run a dedicated on-premises Exchange server for their email needs.

Encryption Has Never Been More Essential—or Threatened

Encryption Has Never Been More Essential—or Threatened

Five years ago today, WhatsApp completed our roll out of end-to-end encryption, which provides people all over the world with the ability to communicate privately and securely.

Cops Take Down the ‘World’s Biggest' Video Game Cheating Ring

Cops Take Down the ‘World’s Biggest' Video Game Cheating Ring

Ubiquiti Appears to Have Downplayed a 'Catastrophic' BreachA whistleblower tells independent security journalist Brian Krebs that a recent breach of networking equipment company Ubiquiti was much worse than initially reported.

Myanmar’s Internet Shutdown Is an Act of ‘Vast Self-Harm’

Myanmar’s Internet Shutdown Is an Act of ‘Vast Self-Harm’

Over the past two months the military junta has continued to use the mechanisms for digital control put in place by Myanmar's previous regimes, escalating platform-blocking and digital censorship across Myanmar and initiating different combinations of mobile data and wireless broadband outages, including various overnight connectivity blackouts for 46 consecutive days.

Hackers Accessed Security Cams Inside Tesla and Beyond

Hackers Accessed Security Cams Inside Tesla and Beyond

Microsoft-Owned GitHub Takes Down Exchange Server ExploitSecurity researchers warned this week that a full, public proof-of-concept exploit for recently-patched Microsoft Exchange Server vulnerabilities would further roil a hacking frenzy that had already escalated in recent days.

Democrats Are Getting Serious About Universal Broadband

Democrats Are Getting Serious About Universal Broadband

Under the text of the new law, schools that get funding would distribute it to students and staff to pay for broadband service and equipment at "locations that include locations other than the school."

Challenging Conservation Not to Leave Women Behind

Challenging Conservation Not to Leave Women Behind

There is a persistent perception that men should be the decision-makers and leaders in most contexts, both within conservation/natural resource management organizations and in the communities where they work.

The 15 Best Weekend Deals on Phones, Smartwatches, and More

The 15 Best Weekend Deals on Phones, Smartwatches, and More

WIRED writer Matt Jancer says it's his pick for most people in his Best Webcams guide .The T7, Samsung's latest, includes USB-C and USB-C-to-USB-A cables so you can connect them to your laptop or computer.

Thousands of Android and iOS Apps Leak Data From the Cloud

Thousands of Android and iOS Apps Leak Data From the Cloud

Zimperium ran automated analysis on more than 1.3 million Android and iOS apps to detect common cloud misconfigurations that exposed data.

What Life Is Like Under Myanmar's Internet Shutdown

What Life Is Like Under Myanmar's Internet Shutdown

Sophie*, an American software developer, was at home with her young son and her husband Aung*, a union worker and Myanmar national, when Myanmar’s military took control in the early hours of February 1.

China Hijacked an NSA Hacking Tool in 2014—and Used It for Years

China Hijacked an NSA Hacking Tool in 2014—and Used It for Years

More than four years after a mysterious group of hackers known as the Shadow Brokers began wantonly leaking secret NSA hacking tools onto the internet, the question that debacle raised—whether any intelligence agency can prevent its "zero-day" stockpile from falling into the wrong hands —still haunts the security community.

Valheim Is the Viking Survival Game You've Been Craving

Valheim Is the Viking Survival Game You've Been Craving

For an Early Access game, it's honestly hard to tell where Valheim's content thus far runs out.Like Minecraft, every new Valheim quest begins in a randomly generated 3D universe.

Covid-19 Vaccine Scams Spread Under Facebook and Telegram's Watch

Covid-19 Vaccine Scams Spread Under Facebook and Telegram's Watch

The offers ranged from Facebook page operators willing to ship Sinovac Covid-19 vaccine—which is not authorized for use in the United States—from China, to apparent scammers on Telegram claiming to have access to Moderna, Pfizer, and AstraZeneca’s vaccines.

A Hacker Tried to Poison a Florida City's Water Supply, Officials Say

A Hacker Tried to Poison a Florida City's Water Supply, Officials Say

Around 8 am on Friday morning, an employee of a water treatment plant in the 15,000-person city of Oldsmar, Florida, noticed that his mouse cursor was moving strangely on his computer screen, out of his control, as local police would later tell it.

Forget Blood—Your Skin Might Know If You’re Sick

Forget Blood—Your Skin Might Know If You’re Sick

But in a paper published in January in Nature Biomedical Engineering, researchers from Washington University in St. Louis reported catching ISF biomarkers with disposable microneedle patches and measuring them up to about 800 times more sensitively than comparable biomarker tests.

A Second SolarWinds Hack Deepens Third-Party Software Fears

A Second SolarWinds Hack Deepens Third-Party Software Fears

It now appears that Russia wasn't alone; Reuters reports that suspected Chinese hackers independently exploited a different flaw in SolarWinds products last year at around the same time, apparently hitting the US Department of Agriculture's National Finance Center.

The SolarWinds Hackers Used Tactics Other Groups Will Copy

The SolarWinds Hackers Used Tactics Other Groups Will Copy

Once an attacker has the network privileges to manipulate this authentication scheme, they can generate legitimate tokens to access any of the organization's Microsoft 365 and Azure accounts, no passwords or multifactor authentication required.

Wikipedia's Biggest Challenge Awaits in 2021

Wikipedia's Biggest Challenge Awaits in 2021

Yet as Wikipedia begins a new year with a burnished reputation as a trusted, fact-based resource, it faces thorny questions beyond accuracy that threaten its grand, encyclopedic mission: Can the community of editors and administrators who collect and present the facts become as sturdy and reliable as the facts themselves?

Gear and Tips to Winter-Proof Your Home and Stay Warm

Gear and Tips to Winter-Proof Your Home and Stay Warm

You can get an idea if there are gaps in your door frames and baseboards and if you can feel the cold air rushing in through the weatherstripping around your windows.

Ransomware Is Headed Down a Dire Path

Ransomware Is Headed Down a Dire Path

At the end of September, an emergency room technician in the United States gave WIRED a real-time account of what it was like inside their hospital as a ransomware attack raged .

The NSA Warns That Russia Is Attacking Remote Work Platforms

The NSA Warns That Russia Is Attacking Remote Work Platforms

In an advisory today, the National Security Agency said that Russian state-sponsored groups have been actively attacking a vulnerability in multiple enterprise remote-work platforms developed by VMware.

This ‘Magical Bug’ Exposed Any iPhone in a Hacker's Wi-Fi Range

This ‘Magical Bug’ Exposed Any iPhone in a Hacker's Wi-Fi Range

The genius of the attack, though, is that the bug was exploitable through an iPhone's Wi-Fi features, meaning that an attacker just needed some antennas and adapters to launch the assault whenever they chose, compromising any nearby iOS device.

31 Cyber Monday Phone and Tablet Deals We Love (2020)

31 Cyber Monday Phone and Tablet Deals We Love (2020)

The good news is the best phones and tablets are on sale for Cyber Monday.Whether you want to watch some movies before bed, or want to get your kid their first screen, Amazon's Fire tablets are cheap and good enough.

11 Early Cyber Monday Deals on Earth-Friendly Gear

11 Early Cyber Monday Deals on Earth-Friendly Gear

This Showerhead Uses Half the Water You'd Expect ($215, $54 off).Uses about half the water of a normal showerhead.This T-Shirt Helps Support National Parks ($29, $7 off).

A 4K OLED TV for $900? This Vizio Deal Is a Steal

A 4K OLED TV for $900? This Vizio Deal Is a Steal

It has cut the price of its 55-inch 4K TV by $400, meaning you can finally get OLED for under $1,000.OLED (organic LED) TVs work differently than traditional backlit displays, because each pixel acts as its own backlight, instead of being lit by a separate light source.

An Enormous Iceberg Is Headed for South Georgia Island—Again

An Enormous Iceberg Is Headed for South Georgia Island—Again

A massive Antarctic iceberg is headed straight for South Georgia Island, a remote outpost in the southern Atlantic Ocean that is home to millions of seabirds, penguins, and seals that may find their route to the sea blocked if the Delaware-sized chunk of ice gets stranded near their breeding grounds.

Zoom Finally Has End-to-End Encryption. Here's How to Use It

Zoom Finally Has End-to-End Encryption. Here's How to Use It

It’s on by default for iMessage and WhatsApp , a staple of encrypted messaging platforms like Signal , and an optional feature in Facebook Messenger .With all of that out of the way, here’s how to actually use Zoom’s end-to-end encryption, if it’s right for you.

The Russian Hackers Playing 'Chekhov's Gun' With US Infrastructure

The Russian Hackers Playing 'Chekhov's Gun' With US Infrastructure

Last week the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency published an advisory warning that a group known as Berserk Bear—or alternately Energetic Bear, TEMP.Isotope, and Dragonfly—had carried out a broad hacking campaign against US state, local, territorial, and tribal government agencies, as well aviation sector targets.