The Serious Money Is Warming to Bitcoin

The Serious Money Is Warming to Bitcoin

The better custody arrangements are another draw, he suggests, making it more appealing for institutional investors who could potentially store hundreds of millions of dollars worth of digital assets.

How Facebook Catches Bugs in Its 100 Million Lines of Code

How Facebook Catches Bugs in Its 100 Million Lines of Code

So four years ago, Facebook engineers began building a customized assessment tool that not only checks for known types of bugs but can fully scan the entire codebase in under 30 minutes—helping engineers catch issues in tweaks, changes, or major new features before they go live.

How a 'NULL' License Plate Landed One Hacker in Ticket Hell

How a 'NULL' License Plate Landed One Hacker in Ticket Hell

Tartaro next turned to the DMV, which he says worked with the Citation Processing Center to void out the bulk of tickets that had errantly come his way.

Hackers Could Decrypt Your GSM Phone Calls

Hackers Could Decrypt Your GSM Phone Calls

But at the DefCon security conference in Las Vegas on Saturday, researchers from the BlackBerry are presenting an attack that can intercept GSM calls as they're transmitted over the air and decrypt them to listen back to what was said.

Attention Apple Retro-Heads: Claris is Back!

Attention Apple Retro-Heads: Claris is Back!

FileMaker, still a wholly owned subsidiary of Apple, said Tuesday that it has changed its name to Claris International as it diversifies its portfolio of products and services beyond its flagship FileMaker Pro. To that end, Claris said it has acquired the Italian startup Stamplay, which lets people stitch together web services like Dropbox and Slack without writing code.

Let's Break Down the Physics of a Wickedly Curving Baseball

Let's Break Down the Physics of a Wickedly Curving Baseball

This change in momentum of the air produces a force on the ball in the other direction. The magnitude of the force depends on the velocity, the angular velocity, the area of the ball, the density of air and a Magnus coefficient (CM).

When Open Source Software Comes With a Few Catches

When Open Source Software Comes With a Few Catches

Taking a slightly different tack, MongoDB relicensed its flagship database product last year under a new "Server Side Public License" (SSPL) that requires companies that sell the database system as a cloud service also release the source code of any additional software they include.

Hackers Used Two Firefox Zero Days to Hit a Crypto Exchange

Hackers Used Two Firefox Zero Days to Hit a Crypto Exchange

Security News This Week: Hackers Used Two Firefox Zero Days to Hit a Crypto Exchange. The first zero-day made headlines midweek when Mozilla confirmed that it had patched a bug which would allowed hackers to gain remote access to a Firefox browser and execute code.

A Plan to Stop Breaches With Dead Simple Database Encryption

A Plan to Stop Breaches With Dead Simple Database Encryption

That means MongoDB itself and cloud providers won't be able to access customer data, and a database's administrators or remote managers don't need to have access to everything either.

Cryptocurrency Company Hacks Itself Before Hackers Can Hack It

Cryptocurrency Company Hacks Itself Before Hackers Can Hack It

Security News This Week: Cryptocurrency Company Hacks Itself Before Hackers Can Hack It. Alyssa Walker. But Microsoft took the rare step this week of reversing course on some of its initiatives, deleting a database of 10 million images built from publicly available shots of 100,000 notable people.

Netflix's Anything-Goes Philosophy Gets to Parody Rap

Netflix's Anything-Goes Philosophy Gets to Parody Rap

Netflix's Anything-Goes Philosophy Gets to Parody Rap. The Unauthorized Bash Brothers Experience , a surprise visual album from Lonely Island, dives expertly into sports and rap nostalgia—and tightens Netflix's grip on comedy gambles.

Platforms Want Centralized Censorship. That Should Scare You

Platforms Want Centralized Censorship. That Should Scare You

Responding to many questions about the speed of their reaction and the continued availability of the shooting video, several companies published posts or gave interviews that revealed new information about their content moderation efforts and capacity to respond to such a high-profile incident. The post-Christchurch push for centralizing censorship goes well beyond the GIFCT hash database.

Third-Party Apps Exposed Over 540 Million Facebook Records

Third-Party Apps Exposed Over 540 Million Facebook Records

According to UpGuard, one of the exposed databases belonged to a Mexican company called Cultura Colectiva, which used Amazon cloud services to store some 146 gigabytes of data, including 540 million different records.

Scientists Reveal Ancient Social Networks Using AI—and X-Rays

Scientists Reveal Ancient Social Networks Using AI—and X-Rays

The project is part of a recent trend in the last few years, where more historians have been trying to use data science to mine new information out of old texts.

Here's What It's Like to Accidentally Expose the Data of 230M People

Here's What It's Like to Accidentally Expose the Data of 230M People

"As you can imagine," Hardigree says, "I went into panic mode." The day before that scrum, WIRED had revealed that Exactis exposed a database of 340 million records on the open internet, as first spotted by an independent security researcher named Vinny Troia.

Security News This Week: The US Tracked Journalists Reporting on the Migrant Caravan

Security News This Week: The US Tracked Journalists Reporting on the Migrant Caravan

After the Migrant Caravan, the US Gov Tracked Journalists and Activists According to documents obtained by the local NBC 7 news station in San Diego, the US government has reportedly created a secret database to track journalists, activists, and at least one lawyer.

An Email Marketing Company Left 809 Million Records Exposed Online

An Email Marketing Company Left 809 Million Records Exposed Online

"This is just another case where someone has my data, and hundreds of millions of other people’s data, and I’ve absolutely no idea how they got it." Security Researcher Troy Hunt In the exposed database, the researchers also found some of what appear to be Verifications.io’s own internal tools like test email accounts, hundreds of SMTP (email sending) servers, the text of emails, anti-spam evasion infrastructure, keywords to avoid, and IP addresses to blacklist.

An Email Marketing Company Left 809 Million Records Exposed Online

An Email Marketing Company Left 809 Million Records Exposed Online

Last week, security researchers Bob Diachenko and Vinny Troia discovered an unprotected, publicly accessible MongoDB database containing 150 gigabytes-worth of detailed, plaintext marketing data—including 763 million unique email addresses. The database, owned by the "email validation" firm Verifications.io, was taken offline the same day Diachenko reported it to the company.

Inside the ‘Black Box’ of a Neural Network

Inside the ‘Black Box’ of a Neural Network

By inserting a postage-stamp image of a baseball, they found they could confuse the neural network into thinking a whale was a shark.

Game of Thrones Season 8 Trailer: HBO Plays to Its Meme Base

Game of Thrones Season 8 Trailer: HBO Plays to Its Meme Base

Game of Thrones Season 8 Trailer: HBO Plays to Its Meme Base This is the face of someone fixin' for a fight. The trailer for the eighth and final season of Game of Thrones dropped this morning and hoo boy is it a doozy.

Trump's North Korea Summit Inspires Spearphishing

Trump's North Korea Summit Inspires Spearphishing

Security News This Week: North Korean Hackers Go Spearfishing This week’s summit between President Donald Trump and North Korea's Kim Jong-Un inspired a flurry of hacking activity. During President Trump’s first meeting with North Korea last year, there was a similar “spike in malware” from presumed North Korean hackers, one expert told CyberScoop.

Gene Editing Is Trickier Than Expected—but Fixes Are in Sight

Gene Editing Is Trickier Than Expected—but Fixes Are in Sight

Using a new method for measuring unplanned edits, a team of American, Chinese, and European scientists has found that the same base editor, widely in use by researchers today, actually messes up the genome at an eyebrow-raising rate. Besides the base editors, Steinmetz’s group also tested good ‘ol Crispr 1.0, the gene-editing workhorse of the biological research world.

A Google Chrome Extension Will Save You From Unsafe Passwords

A Google Chrome Extension Will Save You From Unsafe Passwords

A Google Chrome Extension Will Save You From Unsafe Passwords Casey Chin Data breaches that compromise people's usernames and passwords have become so common, and used in crime for so long, that millions of stolen credential pairs have actually become practically worthless to criminals, circulating online for free.

FilmStruck Has 2 Weeks Left—Spend Them With These 10 Movies

FilmStruck Has 2 Weeks Left—Spend Them With These 10 Movies

But because 2018 is the year in which literally nothing good has happened, their pleas are likely to be ignored.For those hoping to cram one last movie-blitz before the site departs, here are 10 invaluable classics that illustrate FilmStruck’s breadth, depth, and sheer art-house-in-your-house joy.Alice in the Cities (1974)The first entry in writer-director Wim Wenders’ famed mid-’70s “Road Movie” trilogy casts Rüdiger Vogler as an aimless, irritable writer who’s tasked with accompanying a rebellious young teenager (played by Yella Rottländer) from America to Germany.

Handwritten files provide sediment treasure chest

Handwritten files provide sediment treasure chest

Dr Bostock first started work on the database 10 years ago when she was looking for information for a project that required her to look up archived paper files dating back to the 1970s and then digitise them.

Introducing the online guide to the World Development Indicators: A new way to discover data on development

Introducing the online guide to the World Development Indicators: A new way to discover data on development

The goal is to provide a useful, easily accessible guide to the database and make it easy for users to discover what type of indicators are available, how they’re collected, and how they can be visualized to analyze development trends.

How Our Biological Clock Could Dictate Medical Treatments

How Our Biological Clock Could Dictate Medical Treatments

(The gold-standard test, the dim light melatonin onset assay, or DLMO for short, involves closely monitoring a patient's melatonin levels by sitting them in a dimly lit room and collecting their spit or blood every 30 minutes for a day or more.) And second, it's not always easy or practical to tell which therapies would benefit most from optimally timed administration.This week, researchers announced advances that confront both those issues: A simple blood test that researchers say could help infer a person's circadian rhythm, and a database of clock genes that encode targets for thousands of existing drugs.