100 Million More IoT Devices Are Exposed—and They Won’t Be the Last

100 Million More IoT Devices Are Exposed—and They Won’t Be the Last

Dubbed Name:Wreck, the newly disclosed flaws are in four ubiquitous TCP/IP stacks, code that integrates network communication protocols to establish connections between devices and the internet.

The Healing Power of JavaScript

The Healing Power of JavaScript

Ellen Ullman writes in her book Life in Code: A Personal History of Technology, “Until I became a programmer, I didn’t thoroughly understand the usefulness of such isolation: the silence, the reduction of life to thought and form; for example, going off to a dark room to work on a program when relations with people get difficult.”.

Our Favorite Photography Backpack is $50 Off

Our Favorite Photography Backpack is $50 Off

It's our top backpack recommendation in our roundup of the Best Camera Bags .The bag usually costs $170, but through the end of the day on March 31, you can enter code BESTBACKPACK to get $50 off, making your total $120 shipped.

Hackers Accessed Security Cams Inside Tesla and Beyond

Hackers Accessed Security Cams Inside Tesla and Beyond

Microsoft-Owned GitHub Takes Down Exchange Server ExploitSecurity researchers warned this week that a full, public proof-of-concept exploit for recently-patched Microsoft Exchange Server vulnerabilities would further roil a hacking frenzy that had already escalated in recent days.

A Barcode Scanner App With Millions of Downloads Goes Rogue

A Barcode Scanner App With Millions of Downloads Goes Rogue

“It is frightening that with one update an app can turn malicious while going under the radar of Google Play Protect,” Collier wrote.The researcher wrote:No, in the case of Barcode Scanner, malicious code had been added that was not in previous versions of the app.

Hackers Used Zero-Days to Infect Windows and Android Devices

Hackers Used Zero-Days to Infect Windows and Android Devices

This story originally appeared on Ars Technica, a trusted source for technology news, tech policy analysis, reviews, and more.This story originally appeared on Ars Technica, a trusted source for technology news, tech policy analysis, reviews, and more.📩 Want the latest on tech, science, and more?

The SolarWinds Hackers Shared Tricks With a Notorious Russian Spy Group

The SolarWinds Hackers Shared Tricks With a Notorious Russian Spy Group

On Monday morning Kaspersky published new evidence of technical similarities between malware used by the mysterious SolarWinds hackers, known by security industry names including UNC2452 and Dark Halo, and the well-known hacker group Turla, believed to be Russian in origin and also known by the names Venomous Bear and Snake.

7 Simple Ways to Make Your Android Phone More Secure

7 Simple Ways to Make Your Android Phone More Secure

There are times when you will want to hand your unlocked phone to the people around you—showing photos to friends, for instance, or giving it to your kids to play on—and you may want to consider putting some extra locks on the apps you want to be more secure.

This Bluetooth Attack Can Steal a Tesla Model X in Minutes

This Bluetooth Attack Can Steal a Tesla Model X in Minutes

But one security researcher has shown how vulnerabilities in the Tesla Model X's keyless entry system allow a different sort of update: A hacker could rewrite the firmware of a key fob via Bluetooth connection, lift an unlock code from the fob, and use it to steal a Model X in just a matter of minutes.

Forget Imposters. Among Us Is a Playground for Hackers

Forget Imposters. Among Us Is a Playground for Hackers

The crux of the game's security bugs, Sebree says, is that its servers aren't designed to validate information sent by the game client running on the players' computers, a basic safeguard against cheating in most popular PC games.

A Deepfake Porn Bot Is Being Used to Abuse Thousands of Women

A Deepfake Porn Bot Is Being Used to Abuse Thousands of Women

Sensity was only able to count images shared publicly and the bot gives people the option to generate photos privately.The images are automatically created once people upload a clothed image of the victim to the Telegram bot from their phone or desktop.

Researchers Found 55 Flaws in Apple's Corporate Network

Researchers Found 55 Flaws in Apple's Corporate Network

“If the issues were used by an attacker, Apple would’ve faced massive information disclosure and integrity loss,” Curry said in an online chat a few hours after posting a 9,200-word writeup titled We Hacked Apple for 3 Months: Here’s What We Found.

A China-Linked Group Repurposed Hacking Team’s Stealthy Spyware

A China-Linked Group Repurposed Hacking Team’s Stealthy Spyware

The malware the Kaspersky researchers discovered uses its UEFI foothold to plant a second, more traditional piece of spyware on the computer's hard drive, a unique piece of code Kaspersky has called MosaicRegressor.

Windows XP Source Code Got Leaked All Over the Internet

Windows XP Source Code Got Leaked All Over the Internet

Windows XP Source Code Leaks OnlineWindows XP's refusal to die has caused a multitude of security problems ; Microsoft stopped officially providing updates to the operating system in 2014, meaning any vulnerabilities largely don't get fixed on the millions of computers that still run it.

The Future of American Industry Depends on Open Source Tech

The Future of American Industry Depends on Open Source Tech

Open source is a technology development and distribution methodology, where the codebase and all development—from setting a roadmap to building new features, fixing bugs, and writing documentation—is done in public.

A Dogfight Renews Concerns About AI's Lethal Potential

A Dogfight Renews Concerns About AI's Lethal Potential

Supersmart algorithms won't take all the jobs, But they are learning faster than ever, doing everything from medical diagnostics to serving up ads.“The technology is developing much faster than the military-political discussion is going,” says Max Tegmark, a professor at MIT and cofounder of the Future of Life Institute, the organization behind the 2015 letter opposing AI weapons.

How to Stop Butt Dialing Everyone with Your Smartphone

How to Stop Butt Dialing Everyone with Your Smartphone

You can disable this feature on the iPhone in Settings > Accessibility > Touch > Tape to Wake (it only appears on the home-button-less iPhones like the X and newer), and Android phones at Settings > Display > Lock Screen Display > Double-Tap to Check Phone .

In a Touch-Free World, the QR Code Is Having Its Moment

In a Touch-Free World, the QR Code Is Having Its Moment

“I’d never really thought of using them.” Now, visitors to Eat Drink Sleep hotels can access the food menu, drinks list, and details on room bookings via QR code (QR stands for quick response).Nils Engelking, cofounder of Egoditor, a mobile marketing company that runs an online QR code generator and works with companies to implement them, says the coronavirus pandemic was something of a roller coaster for the business.

The 16 Best Weekend Deals on Tech, Mattresses, and More

The 16 Best Weekend Deals on Tech, Mattresses, and More

Hunting through deals has been one of the few ways the WIRED Gear team has been staying sane during quarantine , specifically finding discounts on tech devices that help us work from home better or sales on home goods that improve our living spaces.

Tech Confronts Its Use of the Labels ‘Master’ and ‘Slave’

Tech Confronts Its Use of the Labels ‘Master’ and ‘Slave’

Microsoft’s GitHub , a popular software development platform with 50 million users, will replace the word “master” as the default branch name for new repositories, a spokesperson says.

25 of the Best Sales and Deals for the July 4th Weekend

25 of the Best Sales and Deals for the July 4th Weekend

Layla Memory Foam Queen Mattress for $849 ($150 off): You can flip Layla's mattress to pick the soft or firm side, depending on your sleeping preferences.Leesa Queen Hybrid Mattress for $1,499 ($200 off): Like the Helix, Jeffrey says the Leesa is one of the best picks on the market.

The 18 Best Weekend Deals: Videogames, Sex Tech, Home Goods, and More

The 18 Best Weekend Deals: Videogames, Sex Tech, Home Goods, and More

The bundle includes one of our favorite remote prostate vibrators, as well as the Loki Wave rabbit vibe, a free Remoji toy of your choosing (with code STAYSAFE ), a 36-pack of condoms, and a bottle of lube.

How ‘Sustainable’ Web Design Can Help Fight Climate Change

How ‘Sustainable’ Web Design Can Help Fight Climate Change

“All of that information really adds up.” When the European Union's regulations forced US companies to remove some tracking code from their sites for European visitors, USA Today's homepage shed 90 percent of its data size and loaded 15 times faster, as the designers at Mightybytes reported.

A Legion of Bugs Puts Hundreds of Millions of IoT Devices at Risk

A Legion of Bugs Puts Hundreds of Millions of IoT Devices at Risk

Israeli security firm JSOF revealed on Tuesday a collection of vulnerabilities it's calling Ripple20, a total of 19 hackable bugs it has identified in code sold by a little known Ohio-based software company called Treck, a provider of software used in internet-of-things devices.

11 Best Mattress Deals and Sales for Memorial Day (2020)

11 Best Mattress Deals and Sales for Memorial Day (2020)

Quality mattresses generally aren't cheap, even on sale, and bed-in-a-box makers are notorious at always having a sale going of some kind, but the Memorial Day discounts on all our favorite mattresses are slightly better than the other sales throughout the year.

Now Chrome Can Block Ads That Leach Power From Your CPU

Now Chrome Can Block Ads That Leach Power From Your CPU

Chrome browser users take heart: Google developers are rolling out a feature that neuters abusive ads that covertly leach your CPU resources, bandwidth, and electricity.

Facebook and the Folly of Self-Regulation

Facebook and the Folly of Self-Regulation

What problems does the new Facebook review board propose to solve?.It has no influence on the sorts of harassment that regularly occur on Facebook or (Facebook-owned) WhatsApp. It won’t dictate policy for Facebook Groups, where much of the most dangerous content thrives.

How a Facebook Bug Took Down Spotify, TikTok, and Other Major iOS Apps

How a Facebook Bug Took Down Spotify, TikTok, and Other Major iOS Apps

And lots of apps that don’t use Login With Facebook still use the SDK, which is why the issue Wednesday was so widespread.“It’s something people are not made aware of, and what’s more frustrating is that attempting to block it will break things a user may actually want, such as Login With Facebook.”.

The US Supreme Court Rules That Laws Can’t Be Paywalled

The US Supreme Court Rules That Laws Can’t Be Paywalled

The state claimed to own the copyright for the Official Code of Georgia Annotated and sued a nonprofit called Public.The copyright status of the annotated code matters because the state doesn't publish any other official version.

Valve Confirms the Leak of 'CS:GO' Code

Valve Confirms the Leak of 'CS:GO' Code

Source code for Counter-Strike: Global Offensive and Team Fortress 2 has leaked, and fans of both games worry about the potential for cheating, malware, and other unwanted exploits.