25 of the Best Sales and Deals for the July 4th Weekend

25 of the Best Sales and Deals for the July 4th Weekend

Layla Memory Foam Queen Mattress for $849 ($150 off): You can flip Layla's mattress to pick the soft or firm side, depending on your sleeping preferences.Leesa Queen Hybrid Mattress for $1,499 ($200 off): Like the Helix, Jeffrey says the Leesa is one of the best picks on the market.

The 18 Best Weekend Deals: Videogames, Sex Tech, Home Goods, and More

The 18 Best Weekend Deals: Videogames, Sex Tech, Home Goods, and More

The bundle includes one of our favorite remote prostate vibrators, as well as the Loki Wave rabbit vibe, a free Remoji toy of your choosing (with code STAYSAFE ), a 36-pack of condoms, and a bottle of lube.

How ‘Sustainable’ Web Design Can Help Fight Climate Change

How ‘Sustainable’ Web Design Can Help Fight Climate Change

“All of that information really adds up.” When the European Union's regulations forced US companies to remove some tracking code from their sites for European visitors, USA Today's homepage shed 90 percent of its data size and loaded 15 times faster, as the designers at Mightybytes reported.

A Legion of Bugs Puts Hundreds of Millions of IoT Devices at Risk

A Legion of Bugs Puts Hundreds of Millions of IoT Devices at Risk

Israeli security firm JSOF revealed on Tuesday a collection of vulnerabilities it's calling Ripple20, a total of 19 hackable bugs it has identified in code sold by a little known Ohio-based software company called Treck, a provider of software used in internet-of-things devices.

11 Best Mattress Deals and Sales for Memorial Day (2020)

11 Best Mattress Deals and Sales for Memorial Day (2020)

Quality mattresses generally aren't cheap, even on sale, and bed-in-a-box makers are notorious at always having a sale going of some kind, but the Memorial Day discounts on all our favorite mattresses are slightly better than the other sales throughout the year.

Now Chrome Can Block Ads That Leach Power From Your CPU

Now Chrome Can Block Ads That Leach Power From Your CPU

Chrome browser users take heart: Google developers are rolling out a feature that neuters abusive ads that covertly leach your CPU resources, bandwidth, and electricity.

Facebook and the Folly of Self-Regulation

Facebook and the Folly of Self-Regulation

What problems does the new Facebook review board propose to solve?.It has no influence on the sorts of harassment that regularly occur on Facebook or (Facebook-owned) WhatsApp. It won’t dictate policy for Facebook Groups, where much of the most dangerous content thrives.

How a Facebook Bug Took Down Spotify, TikTok, and Other Major iOS Apps

How a Facebook Bug Took Down Spotify, TikTok, and Other Major iOS Apps

And lots of apps that don’t use Login With Facebook still use the SDK, which is why the issue Wednesday was so widespread.“It’s something people are not made aware of, and what’s more frustrating is that attempting to block it will break things a user may actually want, such as Login With Facebook.”.

The US Supreme Court Rules That Laws Can’t Be Paywalled

The US Supreme Court Rules That Laws Can’t Be Paywalled

The state claimed to own the copyright for the Official Code of Georgia Annotated and sued a nonprofit called Public.The copyright status of the annotated code matters because the state doesn't publish any other official version.

Valve Confirms the Leak of 'CS:GO' Code

Valve Confirms the Leak of 'CS:GO' Code

Source code for Counter-Strike: Global Offensive and Team Fortress 2 has leaked, and fans of both games worry about the potential for cheating, malware, and other unwanted exploits.

Everyone Is Watching Code 8 on Netflix—and That's a Big Deal

Everyone Is Watching Code 8 on Netflix—and That's a Big Deal

Having a film like Code 8 break into those ranks proves there is an audience for indie sci-fi offerings and shows that fact to the world—which only encourages more people to watch.

The JavaScript Framework That Puts Web Pages on a Diet

The JavaScript Framework That Puts Web Pages on a Diet

Svelte performs its middle-layer work before a developer uploads code to a web server, well before a user ever downloads it.Wang says he likes to use Svelte for web pages, but he still uses React for larger applications, including his professional work.

An Elite Spy Group Used 5 Zero-Days to Hack North Koreans

An Elite Spy Group Used 5 Zero-Days to Hack North Koreans

In just the last three years, Raiu says Kaspersky has found DarkHotel using three zero-day vulnerabilities beyond the five now linked to the group based on Google's blog post.

Ransomware Groups Promise Not to Hit Hospitals Amid Pandemic

Ransomware Groups Promise Not to Hit Hospitals Amid Pandemic

BleepingComputer reached out to the operators of multiple strains of ransomware, asking if they had plans to stop hitting hospitals during the coronavirus pandemic.WIRED is providing unlimited free access to stories about the coronavirus pandemic .

A Brief History of Instagram’s Trouble With ‘Weight-Loss Tea’

A Brief History of Instagram’s Trouble With ‘Weight-Loss Tea’

Among the most ubiquitous tea companies claiming to be able to help you lose weight, stop your migraines, unclog your arteries, and cure cancer and the common cold is Teami, whose products have been promoted by celebrities like Cardi B.

Microsoft's Secured-Core PC Feature Protects Critical Code

Microsoft's Secured-Core PC Feature Protects Critical Code

Microsoft already offers Windows Secure Boot, a feature that checks for cryptographic signatures to confirm software integrity.Instead of relying on firmware, Microsoft has worked with AMD, Intel, and Qualcomm to make new central processing unit chips that can run integrity checks during boot in a controlled, cryptographically verified way.

Spot the Robot Dog Trots Into the Big, Bad World

Spot the Robot Dog Trots Into the Big, Bad World

Once they set Spot’s path by joysticking it around so it can remember the route, then they can let Spot autonomously roam the site, doing the work of a human who’d have to wander around doing the same.

Scientists Figured Out the Indian Cobra's Genome—at Last

Scientists Figured Out the Indian Cobra's Genome—at Last

To finally fit together these elusive sections of the genome, Somasekar Seshagiri, a geneticist and president of the SciGenom Research Foundation in Bangalore, and his collaborators used a combination of older sequencing methods with new ones that read out very long stretches of DNA .

How to Make a Tree With Fractals

How to Make a Tree With Fractals

Here is the basic plan for this tree fractal:Start at some point and move a certain distance in a certain direction.In the code, this pointing vector is the variable a—it's this vector that gets rotated in each branching.

11 Tips to Get the Most Out of Your New Switch Lite

11 Tips to Get the Most Out of Your New Switch Lite

It can't be docked for playing on a TV, and it has a smaller battery than the full-size Switch (about six hours of gameplay depending on the game).

The Pride and Prejudice of Online Fan Culture

The Pride and Prejudice of Online Fan Culture

For their part, Janeites riffed off Jane Austen's written work, which they made supremely accessible to Austen readers without advanced degrees by creating indices, committing passages to memory, reenacting scenes, anatomizing the film adaptations, and extending the novels with fan fiction in which they, real people, interact with Darcy and Bingley and Knightley and all the rest.

New Emoji Are So Boring—but They Don't Have to Be

New Emoji Are So Boring—but They Don't Have to Be

After it encoded the original set of emoji from Japanese cellphone carriers, Unicode started looking to search results: If you submit a proposal for a new emoji, you need to provide screenshots showing how many webpages are found when you search for its associated word or phrase in Google Search, Bing Search, and Google Video Search, plus Google Trends.

It's Time to Outsource Your Passwords to an App

It's Time to Outsource Your Passwords to an App

Features like Travel Mode, which automatically deletes sensitive data from devices before you go on a trip, and Watchtower, which identifies weak or reused passwords, help justify the cost: $36 a year for one user, $60 for the whole family.

Facebook Sweetens Deal for Hackers to Catch Security Bugs

Facebook Sweetens Deal for Hackers to Catch Security Bugs

Last year, the company began paying bounties for certain bugs researchers might find in third-party services that integrate with Facebook.“Reports submitted to us thanks to security researchers allow us to learn from their insights," says Dan Gurfinkel, who heads Facebook's bug bounty program.

An Open Source License That Requires Users to Do No Harm

An Open Source License That Requires Users to Do No Harm

Whether human rights violations qualify as a "specific field of endeavor" under that definition is something of an open question, because Ehmke hasn't formally submitted the Hippocratic License to the OSI for review.

The First Drone Airline, a Critical Device Vulnerability, and More News

The First Drone Airline, a Critical Device Vulnerability, and More News

An old industry standard is putting millions of critical devices at risk, UPS lays claim to the first official drone airline, and our reviewers have a trail-running jacket recommendation.UPS now runs the first official drone airline.

Want Free Coding Lessons? Twitch Makes It Happen in Real Time

Want Free Coding Lessons? Twitch Makes It Happen in Real Time

Unlike most programmers who work on open source projects on their own in their spare time, she programs as hundreds of people watch online.

A Developer Deletes His Code to Protest Its Use by ICE

A Developer Deletes His Code to Protest Its Use by ICE

Discouraged by the company’s silence, former Chef employee Seth Vargo removed several Chef-related open source tools that he had hosted on two code repositories.In a Thursday night to Chef employees that the company posted online, CEO Barry Crist called Chef’s work with ICE, which he said began under the Obama administration, a "principled decision.".

How Safari and iMessage Have Made iPhones Less Secure

How Safari and iMessage Have Made iPhones Less Secure

"If you want to compromise an iPhone, these are the best ways to do it," says independent security researcher Linus Henze of the two apps.

Is It OK to Change Hurricane Forecasts With a Sharpie Doodle?

Is It OK to Change Hurricane Forecasts With a Sharpie Doodle?

Photograph: Chip Somodevilla/Getty ImagesTo do that, I’m going to use a much simpler problem—predicting the path of a tennis ball tossed into the air.In our model above, the ball lands between 7.93 and 8.06 meters.