Easy access to environmental research data

Easy access to environmental research data

New Zealand’s seven Crown Research Institutes (CRIs) have created the National Environmental Data Centre (NEDC) website to make the environmental information held by CRIs more accessible to all New Zealanders.

Inside the Negotiations to Decide the Fate of Our Planet

Inside the Negotiations to Decide the Fate of Our Planet

“It is a lot of work,” says Agripina Jenkins Rojas, a Costa Rican negotiator who is representing the group of Latin American and Caribbean countries together known as AILAC in talks on transparency at COP26.

Biden’s FCC Picks Are a ‘Dream Team’ for Broadband Advocates

Biden’s FCC Picks Are a ‘Dream Team’ for Broadband Advocates

Biden will also fill the empty Democratic slot on the commission by nominating Gigi Sohn, a longtime consumer advocate who was an FCC official during the Obama years.

Blind People Won the Right to Break Ebook DRM. In 3 Years, They'll Have to Do It Again

Blind People Won the Right to Break Ebook DRM. In 3 Years, They'll Have to Do It Again

For the past year, they've once again undergone a lengthy petitioning process to earn a critical exemption to the 1998 Digital Millennium Copyright Act that provides legal cover for people to create accessible versions of ebooks.

Why Diablo II: Resurrected Kept Its Rough Edges

Why Diablo II: Resurrected Kept Its Rough Edges

But for Vicarious Visions, a 30-year-old game studio acquired by Activision Blizzard in 2005, revamping Diablo II meant looking at the game through the eyes of a circa-1990s game developer.“Those spiky bits are the things people remember," Gallerani says.

What Music Labels Learn When You Pre-Save Music

What Music Labels Learn When You Pre-Save Music

In a recent TikTok video, musician Clinton Kane riffs on the push by labels to get fans to pre-save music from artists, even before their songs are released.The benefits for the artists and labels are arguably greater: Pre-saving music requires direct access to your account on whatever music service you use.

How to Make Podcasts Better for People With Hearing Loss

How to Make Podcasts Better for People With Hearing Loss

“In short,” she says, “I've got no control over what my brain chooses to process, and there's all sorts of things that trigger it and create stress.” And so when it comes to podcasts, sound design is especially important for Benjamin and other people with auditory processing disorder, because they hear lots of sounds that other people may not pick up on.

What Is Zero Trust? It Depends What You Want to Hear

What Is Zero Trust? It Depends What You Want to Hear

Under the old model, all the computers, servers, and other devices physically in an office building were on the same network and trusted each other.Once an attacker slipped by those perimeter defenses, remotely or by physically infiltrating an organization, the network would instantly grant them a lot of trust and freedom.

The FBI Takes a Drastic Step to Fight China’s Hacking Spree

The FBI Takes a Drastic Step to Fight China’s Hacking Spree

A disproportionate number of Hafnium victims appear to have been small- to medium-sized businesses, which are more inclined to run a dedicated on-premises Exchange server for their email needs.

Encryption Has Never Been More Essential—or Threatened

Encryption Has Never Been More Essential—or Threatened

Five years ago today, WhatsApp completed our roll out of end-to-end encryption, which provides people all over the world with the ability to communicate privately and securely.

Cops Take Down the ‘World’s Biggest' Video Game Cheating Ring

Cops Take Down the ‘World’s Biggest' Video Game Cheating Ring

Ubiquiti Appears to Have Downplayed a 'Catastrophic' BreachA whistleblower tells independent security journalist Brian Krebs that a recent breach of networking equipment company Ubiquiti was much worse than initially reported.

Myanmar’s Internet Shutdown Is an Act of ‘Vast Self-Harm’

Myanmar’s Internet Shutdown Is an Act of ‘Vast Self-Harm’

Over the past two months the military junta has continued to use the mechanisms for digital control put in place by Myanmar's previous regimes, escalating platform-blocking and digital censorship across Myanmar and initiating different combinations of mobile data and wireless broadband outages, including various overnight connectivity blackouts for 46 consecutive days.

Hackers Accessed Security Cams Inside Tesla and Beyond

Hackers Accessed Security Cams Inside Tesla and Beyond

Microsoft-Owned GitHub Takes Down Exchange Server ExploitSecurity researchers warned this week that a full, public proof-of-concept exploit for recently-patched Microsoft Exchange Server vulnerabilities would further roil a hacking frenzy that had already escalated in recent days.

Democrats Are Getting Serious About Universal Broadband

Democrats Are Getting Serious About Universal Broadband

Under the text of the new law, schools that get funding would distribute it to students and staff to pay for broadband service and equipment at "locations that include locations other than the school."

Challenging Conservation Not to Leave Women Behind

Challenging Conservation Not to Leave Women Behind

There is a persistent perception that men should be the decision-makers and leaders in most contexts, both within conservation/natural resource management organizations and in the communities where they work.

The 15 Best Weekend Deals on Phones, Smartwatches, and More

The 15 Best Weekend Deals on Phones, Smartwatches, and More

WIRED writer Matt Jancer says it's his pick for most people in his Best Webcams guide .The T7, Samsung's latest, includes USB-C and USB-C-to-USB-A cables so you can connect them to your laptop or computer.

Thousands of Android and iOS Apps Leak Data From the Cloud

Thousands of Android and iOS Apps Leak Data From the Cloud

Zimperium ran automated analysis on more than 1.3 million Android and iOS apps to detect common cloud misconfigurations that exposed data.

What Life Is Like Under Myanmar's Internet Shutdown

What Life Is Like Under Myanmar's Internet Shutdown

Sophie*, an American software developer, was at home with her young son and her husband Aung*, a union worker and Myanmar national, when Myanmar’s military took control in the early hours of February 1.

China Hijacked an NSA Hacking Tool in 2014—and Used It for Years

China Hijacked an NSA Hacking Tool in 2014—and Used It for Years

More than four years after a mysterious group of hackers known as the Shadow Brokers began wantonly leaking secret NSA hacking tools onto the internet, the question that debacle raised—whether any intelligence agency can prevent its "zero-day" stockpile from falling into the wrong hands —still haunts the security community.

Valheim Is the Viking Survival Game You've Been Craving

Valheim Is the Viking Survival Game You've Been Craving

For an Early Access game, it's honestly hard to tell where Valheim's content thus far runs out.Like Minecraft, every new Valheim quest begins in a randomly generated 3D universe.

Covid-19 Vaccine Scams Spread Under Facebook and Telegram's Watch

Covid-19 Vaccine Scams Spread Under Facebook and Telegram's Watch

The offers ranged from Facebook page operators willing to ship Sinovac Covid-19 vaccine—which is not authorized for use in the United States—from China, to apparent scammers on Telegram claiming to have access to Moderna, Pfizer, and AstraZeneca’s vaccines.

A Hacker Tried to Poison a Florida City's Water Supply, Officials Say

A Hacker Tried to Poison a Florida City's Water Supply, Officials Say

Around 8 am on Friday morning, an employee of a water treatment plant in the 15,000-person city of Oldsmar, Florida, noticed that his mouse cursor was moving strangely on his computer screen, out of his control, as local police would later tell it.

Forget Blood—Your Skin Might Know If You’re Sick

Forget Blood—Your Skin Might Know If You’re Sick

But in a paper published in January in Nature Biomedical Engineering, researchers from Washington University in St. Louis reported catching ISF biomarkers with disposable microneedle patches and measuring them up to about 800 times more sensitively than comparable biomarker tests.

A Second SolarWinds Hack Deepens Third-Party Software Fears

A Second SolarWinds Hack Deepens Third-Party Software Fears

It now appears that Russia wasn't alone; Reuters reports that suspected Chinese hackers independently exploited a different flaw in SolarWinds products last year at around the same time, apparently hitting the US Department of Agriculture's National Finance Center.

The SolarWinds Hackers Used Tactics Other Groups Will Copy

The SolarWinds Hackers Used Tactics Other Groups Will Copy

Once an attacker has the network privileges to manipulate this authentication scheme, they can generate legitimate tokens to access any of the organization's Microsoft 365 and Azure accounts, no passwords or multifactor authentication required.

Wikipedia's Biggest Challenge Awaits in 2021

Wikipedia's Biggest Challenge Awaits in 2021

Yet as Wikipedia begins a new year with a burnished reputation as a trusted, fact-based resource, it faces thorny questions beyond accuracy that threaten its grand, encyclopedic mission: Can the community of editors and administrators who collect and present the facts become as sturdy and reliable as the facts themselves?

Gear and Tips to Winter-Proof Your Home and Stay Warm

Gear and Tips to Winter-Proof Your Home and Stay Warm

You can get an idea if there are gaps in your door frames and baseboards and if you can feel the cold air rushing in through the weatherstripping around your windows.

Ransomware Is Headed Down a Dire Path

Ransomware Is Headed Down a Dire Path

At the end of September, an emergency room technician in the United States gave WIRED a real-time account of what it was like inside their hospital as a ransomware attack raged .

The NSA Warns That Russia Is Attacking Remote Work Platforms

The NSA Warns That Russia Is Attacking Remote Work Platforms

In an advisory today, the National Security Agency said that Russian state-sponsored groups have been actively attacking a vulnerability in multiple enterprise remote-work platforms developed by VMware.

This ‘Magical Bug’ Exposed Any iPhone in a Hacker's Wi-Fi Range

This ‘Magical Bug’ Exposed Any iPhone in a Hacker's Wi-Fi Range

The genius of the attack, though, is that the bug was exploitable through an iPhone's Wi-Fi features, meaning that an attacker just needed some antennas and adapters to launch the assault whenever they chose, compromising any nearby iOS device.