To Help Migrants at the Border, Aid Groups Deploy Tech

To Help Migrants at the Border, Aid Groups Deploy Tech

It’s unfair,” says Ian Philabaum, a program director at Immigration Law Lab. Of the nearly 1 million asylum cases waiting to be heard, about 74 percent are for people coming from El Salvador, Guatemala, Honduras, and Mexico.

This Teen Hacker Found Bugs in School Software That Exposed Millions of Records

This Teen Hacker Found Bugs in School Software That Exposed Millions of Records

In Follett's software, Demirkapi says he found bugs that would have given a hacker access to student data like grade point average, special education status, number of suspensions, and passwords.

Cashless Stores Alienate Customers in the Name of Efficiency

Cashless Stores Alienate Customers in the Name of Efficiency

There’s been growing support from both consumers and retailers to move away from cash in favor of digital payment options .It’s one thing for luxury brands to self-select their customers on the basis of price point, but it’s another for a retailer to deny access to a person trying to buy a pack of gum.

Tweets Can Be Deleted, but Your Likes Are Forever

Tweets Can Be Deleted, but Your Likes Are Forever

Through the API, the services can delete all your terrible 2009-era takes, says Fayssal Martani, creator of Tweet Archive Eraser.Richard West, creator of TweetDelete, says Twitter appears to limit services like his to deleting roughly 3,200 likes.

Having Broadband Issues? This Tool Helps You Learn Local Laws

Having Broadband Issues? This Tool Helps You Learn Local Laws

The tool grew out of Pew’s Broadband Research Initiative, which researches policy issues like the economic impact of broadband access and expanding broadband in rural and low-income communities.

A Critical Device Hack, China's Social Credit, and More News

A Critical Device Hack, China's Social Credit, and More News

A Critical Device Hack, China's Social Credit, and More News. A bug is allowing hackers remote access to medical devices, China's social credit score is not actually that dystopian, and we've got a fun robot for kids.

Facebook's Ex-Security Chief Details His 'Observatory' for Internet Abuse

Facebook's Ex-Security Chief Details His 'Observatory' for Internet Abuse

It aspires to be a central outlet for the study of all manner of internet abuse, assembling for visiting researchers the necessary machine learning tools, big data analysts, and perhaps most importantly, access to major tech platforms' user data—a key to the project that may hinge on which tech firms cooperate, and to what degree.

How to Share Books and Movies Through Amazon Household

How to Share Books and Movies Through Amazon Household

Amazon’s first step in its plan for world domination seems to be making sure that every single person alive is a shopper with an Amazon Prime account. Sign someone else up and they can share access to Amazon's media services, as well as free Prime delivery.

Social Media Could Make It Impossible to Grow Up

Social Media Could Make It Impossible to Grow Up

Jenkins argued that the real problem was not the new media, but rather the myth of childhood innocence itself: The myth of “childhood innocence” “empties” children of any thoughts of their own, stripping them of their own political agency and social agendas so that they may become vehicles for adult needs, desires, and politics .

What to Look Forward to in MacOS Catalina

What to Look Forward to in MacOS Catalina

It’s a framework that allows developers to easily port iOS apps over to the Mac, which means mobile apps like Twitter—and many others once app makers have time to tool around with this—can now run as MacOS apps.

Microsoft’s Ebook Apocalypse, Facebook Drug Ads, and More News

Microsoft’s Ebook Apocalypse, Facebook Drug Ads, and More News

Microsoft’s Ebook Apocalypse, Facebook Drug Ads, and More News. It turns out you don't actually own your ebooks; those "Hims" and "Hers" ads you always see are against the rules; and WIRED took a look at the importance of photographing women in sports.

A Likely Chinese Hacker Crew Targeted 10 Phone Carriers to Steal Metadata

A Likely Chinese Hacker Crew Targeted 10 Phone Carriers to Steal Metadata

Cybereason says that the company found no evidence that the hackers stole the actual content of communications from victims, but the firm's principal security researcher Amit Serper argues that the metadata alone—device and SIM identifiers, call records, and which cell tower a phone connected to at any given time—can provide a frighteningly high-resolution picture of a target's life.

Iranian Hackers Launch a New US-Targeted Campaign as Tensions Mount

Iranian Hackers Launch a New US-Targeted Campaign as Tensions Mount

Analysts at two security firms, Crowdstrike and Dragos, tell WIRED that they've seen a new campaign of targeted phishing emails sent to a variety of US targets last week from a hacker group known by the names APT33 , Magnallium, or Refined Kitten, and widely believed to be working in the service of the Iranian government.

Subscriptions Are About to Swallow Gaming

Subscriptions Are About to Swallow Gaming

This trend was on full display at industry conference E3 last week, where developer Ubisoft revealed its UPlay Plus subscription, Google detailed its streaming Stadia platform , and Microsoft announced pricing for using Xbox Game Pass on a PC.

The Ambitious Plan Behind Facebook’s Cryptocurrency, Libra

The Ambitious Plan Behind Facebook’s Cryptocurrency, Libra

Mission: “a simple global currency and infrastructure that empowers billions of people.” It begins with a new cryptocurrency designed for payments ranging from micropayments to remittances without fees (“as easy to send money as an email”) as well as enabling more exotic “smart money” use cases like dynamic contracts, which could enable blockchain-based loans or insurance.

A Plan to Stop Breaches With Dead Simple Database Encryption

A Plan to Stop Breaches With Dead Simple Database Encryption

That means MongoDB itself and cloud providers won't be able to access customer data, and a database's administrators or remote managers don't need to have access to everything either.

Comcast Now Lets You Control Your TV With Your Eyes

Comcast Now Lets You Control Your TV With Your Eyes

Comcast customers can visit the interface in a web browser, log in with their Xfinity credentials, and pair their accessibility device to an existing set. An eye-controlled remote may seem to serve a small niche, but Wlodkowski likes to think about accessibility tech as driving broader innovations for consumers.

Cloudflare’s Five-Year Project to Protect Nonprofits Online

Cloudflare’s Five-Year Project to Protect Nonprofits Online

So Al Shafei wrote to the internet infrastructure company Cloudflare and its initiative "Project Galileo," which offers free defense tools and technical support to human rights groups, activists, journalists, and artistic organizations around the world.

Apple Just Patched a Modem Bug That's Been in Macs Since 1999

Apple Just Patched a Modem Bug That's Been in Macs Since 1999

But 12-year-old Joshua Hill didn't have an iMac. To take advantage of all the new connectivity from his parents' mid-'90s Mac Performa, he needed a modem that would plug into the computer through one of its chunky "serial" ports.

Why Net Neutrality Advocates Remain Optimistic

Why Net Neutrality Advocates Remain Optimistic

“There is great power in us,” said Rosenworcel, one of two FCC members who in 2017 voted against repealing the Obama-era rules that prohibited internet service providers from intentionally slowing or blocking web traffic.

Google Is Finally Making Chrome Extensions More Secure

Google Is Finally Making Chrome Extensions More Secure

After years of issues with rogue Chrome extensions , hijacks, and malware, Google announced a slew of new policies Thursday to ensure the little browser applets are secure. The changes announced Thursday will make it harder for Chrome extensions distributed through Google's Chrome Web Store to quietly grab user data.

Snapchat Employees Reportedly Spied on Private Snaps

Snapchat Employees Reportedly Spied on Private Snaps

Security News This Week: Snapchat Employees Reportedly Spied on Private Snaps. Motherboard reports that according to former and current employees, Snapchat developed a tool called SnapLion to allow the company to access user accounts in order to comply with legitimate legal requests from law enforcement.

The False Promise of “Lawful Access” to Private Data

The False Promise of “Lawful Access” to Private Data

Terrorists should not feel free to upload terrible images of slaughter, but neither should they be empowered to empty people’s bank accounts or to tap the phones of presidents and prime ministers.“But,” people say, “What if only legitimate requests can get into the protected communications?” Weaknesses in computer systems are discovered by attackers all the time.

New Jean-Luc Picard Star Trek Series Is Coming to Amazon. Sorta

New Jean-Luc Picard Star Trek Series Is Coming to Amazon. Sorta

Also, Avengers: Endgame is still dominating the box office, and we have new trailers for HBO's Watchmen series and It Chapter Two . First up, some good news for Star Trek fans who live outside the US: Amazon has picked up the rights to the upcoming Jean-Luc Picard spinoff series currently in the works.

The Internet Changed Astrology. Then Came the Memes

The Internet Changed Astrology. Then Came the Memes

The abundance of information online about celestial movements and a seemingly infinite number of people writing horoscopes has transformed the practice from a devout subculture to a subject so popular that there are hundreds, maybe thousands, of social media accounts dedicated solely to star signs.

The CIA Sets Up Shop on Tor, the Anonymous Internet

The CIA Sets Up Shop on Tor, the Anonymous Internet

The anonymity service has been open source since its public release in 2002, and it transitioned to being overseen by a nonprofit, dubbed the Tor Project, in 2006.It can seem confusing at first that the US government would fund the creation of a tool that has since been used by criminals and foreign governments to conduct secret operations.

The Law Being Used to Prosecute Julian Assange Is Broken

The Law Being Used to Prosecute Julian Assange Is Broken

Now the UK courts will evaluate the US’s request to send Assange to Virginia to stand trial in federal court for a single felony charge of conspiracy to commit unauthorized access to a government computer, a violation of the Computer Fraud and Abuse Act (CFAA).

A Hacking Spree, a Fight for Open Internet, and More News

A Hacking Spree, a Fight for Open Internet, and More News

Hackers are hacking, Portland is leading the charge for open internet, and Paris is pondering what to do with what's left of the Notre Dame Cathedral. Over the past three years, insidious supply chain attacks on at least six companies have all been tied to a single group of hackers .

Portland Is Again Blazing Trails for Open Internet Access

Portland Is Again Blazing Trails for Open Internet Access

Portland is taking seriously the idea of a publicly overseen dark-fiber network over which private providers could compete to offer cheap, ubiquitous internet access.

How to Watch Game of Thrones Online

How to Watch Game of Thrones Online

With only four episodes left in the final season, it’s worth a quick refresher on how and when to watch Game of Thrones live, no matter what coast you’re on. Game of Thrones airs Sunday nights on HBO, at 9 pm in each respective time zone.

More