How Safari and iMessage Have Made iPhones Less Secure

How Safari and iMessage Have Made iPhones Less Secure

"If you want to compromise an iPhone, these are the best ways to do it," says independent security researcher Linus Henze of the two apps.

Is It OK to Change Hurricane Forecasts With a Sharpie Doodle?

Is It OK to Change Hurricane Forecasts With a Sharpie Doodle?

Photograph: Chip Somodevilla/Getty ImagesTo do that, I’m going to use a much simpler problem—predicting the path of a tennis ball tossed into the air.In our model above, the ball lands between 7.93 and 8.06 meters.

Why 'Zero Day' Android Hacking Now Costs More Than iOS Attacks

Why 'Zero Day' Android Hacking Now Costs More Than iOS Attacks

Shwartz says that a web-based attack that targets a high-end Android phone can now sell for more than $2 million non-exclusively, meaning that the researcher can sell it for that price to multiple buyers.

All Our Favorite Box Mattresses Are on Sale for Labor Day

All Our Favorite Box Mattresses Are on Sale for Labor Day

Earlier this year, I lounged around on 25 of the top memory foam and hybrid (individually wrapped springs + foam) mattresses you can order online.You can read all about it in WIRED's Best Mattress You Can Buy in a Box guide.

Top 3 Computers for Introducing Your Kids to Comp Sci

Top 3 Computers for Introducing Your Kids to Comp Sci

The 14-inch laptop is powerful enough for academic tasks, but there's more: Under the guidance of playful characters and cheery challenges, kids can click a Flip-to-Hack button and directly manipulate the source code behind all their favorite apps and games.

How Facebook Catches Bugs in Its 100 Million Lines of Code

How Facebook Catches Bugs in Its 100 Million Lines of Code

So four years ago, Facebook engineers began building a customized assessment tool that not only checks for known types of bugs but can fully scan the entire codebase in under 30 minutes—helping engineers catch issues in tweaks, changes, or major new features before they go live.

AI Algorithms Need FDA-Style Drug Trials

AI Algorithms Need FDA-Style Drug Trials

To protect the cognitive autonomy of individuals and the political health of society at large, we need to make the function and application of algorithms transparent, and the FDA provides a useful model.

How a 10-Year-Old Desk Phone Bug Came Back From the Dead

How a 10-Year-Old Desk Phone Bug Came Back From the Dead

Povolny says that with the Avaya desk phones, it took only basic hacking skills to gain access to the device's systems and firmware (the foundational code that coordinates a device's hardware and software) and analyze them for flaws.

Hackers Can Break Into an iPhone Just by Sending a Text

Hackers Can Break Into an iPhone Just by Sending a Text

Lily Hay Newman covers information security, digital privacy, and hacking for WIRED.Silvanovich, who worked on the research with fellow Project Zero member Samuel Groß, got interested in interaction-less bugs because of a recent, dramatic WhatsApp vulnerability that allowed nation-state spies to compromise a phone just by calling it—even if the recipient didn’t answer the call.

Let's Break Down the Physics of a Wickedly Curving Baseball

Let's Break Down the Physics of a Wickedly Curving Baseball

This change in momentum of the air produces a force on the ball in the other direction. The magnitude of the force depends on the velocity, the angular velocity, the area of the ball, the density of air and a Magnus coefficient (CM).

When Open Source Software Comes With a Few Catches

When Open Source Software Comes With a Few Catches

Taking a slightly different tack, MongoDB relicensed its flagship database product last year under a new "Server Side Public License" (SSPL) that requires companies that sell the database system as a cloud service also release the source code of any additional software they include.

Hack Brief: A Card-Skimming Hacker Group Hit 17K Domains—and Counting

Hack Brief: A Card-Skimming Hacker Group Hit 17K Domains—and Counting

A new report from threat detection firm RiskIQ details how Magecart hackers have found a way to scan Amazon S3 buckets—cloud repositories that hold data and and other backend necessities for sites and companies—for any that are misconfigured to allow anyone with an Amazon Web Services account to not just read their contents, but write to them, implementing whatever changes they want.

Facebook Unleashes Software to Make Programming Robots Easy

Facebook Unleashes Software to Make Programming Robots Easy

“If I'm a machine learning researcher, and I only care about going to this X,Y location, I really do not want to be bothered by all the low-level details of how actually the robot ends up getting there,” says Facebook AI researcher Abhinav Gupta.

GitHub ‘Sponsors’ Now Lets Users Back Open Source Projects

GitHub ‘Sponsors’ Now Lets Users Back Open Source Projects

But even though you can technically host any type of file on GitHub, Friedman says the company probably won't allow people to use Sponsors for non-software projects for the time being.

16 Last-Minute Mother's Day Gifts on Sale Now

16 Last-Minute Mother's Day Gifts on Sale Now

Last-Minute Home Gifts for Mom. Eufy SpaceView Monitor for $120 ($40 off): Use code EUFYMD88 to get $40 off one of the most convenient and best baby monitors . Amazon Mother's Day Gift Ideas. Best Buy Mother's Day Gift Ideas.

My Wild Ride in a Robot Race Car

My Wild Ride in a Robot Race Car

It’s a cloudy spring day, and we’re in the pit area at Thunderhill West Raceway in Willows, California, where, for the fourth year running, self-driving-car companies are gathering to test out their wares on a closed racecourse.

This Programming Tool Makes It Easier for Apps to Work Anywhere

This Programming Tool Makes It Easier for Apps to Work Anywhere

Mozilla, the maker of the Firefox web browser, introduced WASM in 2017 as a new way to create applications that run in browsers.

A Mysterious Hacker Group Is On a Supply Chain Hijacking Spree

A Mysterious Hacker Group Is On a Supply Chain Hijacking Spree

By breaking into a developer's network and hiding malicious code within apps and software updates that users trust, supply chain hijackers can smuggle their malware onto hundreds of thousands—or millions—of computers in a single operation, without the slightest sign of foul play.

Facebook Bans Extremists, Jakarta Is Drowning, and More News

Facebook Bans Extremists, Jakarta Is Drowning, and More News

Facebook Bans Extremists, Jakarta Is Drowning, and More News. Facebook took down some conspiracy theorists, Indonesia has to move its capital because of climate change, and Mother's Day is coming.

When Coding Is Criminal

When Coding Is Criminal

That same year, the SEC filed its first charges against a blockchain company, related to the issuance of an ICO.In Chicago, the case against Thakkar hinged largely on the testimony of Navinder Sarao, the British futures trader blamed for the 2010 crash.

For Open Source, It's All About GitHub Now

For Open Source, It's All About GitHub Now

The most requested feature, Stein says, was probably "pull requests," which make it easy for developers to submit bug fixes and other changes to open source code.

Don’t See Yourself on Your Emoji Keyboard? She Can Help

Don’t See Yourself on Your Emoji Keyboard? She Can Help

Until then, Lee will be on Slack with her people and in the Unicode meetings with the bureaucrats, shepherding new emoji proposals through committee and onto keyboards.

The WIRED Guide to Open Source Software

The WIRED Guide to Open Source Software

Google open sourced its artificial intelligence engine, TensorFlow, in 2015, enabling companies and researchers to build applications using some of the same software the search giant used to create tools that search photos, recognize spoken words, and translate languages.

Supply Chain Hackers Snuck Malware Into Videogames

Supply Chain Hackers Snuck Malware Into Videogames

Now researchers at security firms Kaspersky and ESET have uncovered evidence that the same hackers who targeted Asus with that sort of supply chain hack earlier this year have also targeted three different videogame developers—this time aiming even higher upstream, corrupting the programming tools relied on by game developers.

Phoebe Waller-Bridge Is Working on the Next James Bond Movie

Phoebe Waller-Bridge Is Working on the Next James Bond Movie

Phoebe Waller-Bridge Is Polishing the Script for the New James Bond Movie. As an amuse-bouche for last night’s Game of Thrones , HBO unveiled the first trailer for the second season of Big Little Lies .

Our 12 Favorite Deals on Beats, Razer, iPhone SE, and More

Our 12 Favorite Deals on Beats, Razer, iPhone SE, and More

Our 12 Favorite Deals on Beats, Razer, iPhone SE, and More. We also found great deals on our favorite Beats headphones, a free Google Home Mini, and more. Check out our latest buying guides and best deals all year round📩 Want more?

How Android Fought an Epic Botnet—and Won

How Android Fought an Epic Botnet—and Won

Google Play Protect , which helps weed out bogus Android apps, has been increasingly able to detect when Chamois is running on a device and disable it.

An IOS App That Secretly Spies on You, And More News

An IOS App That Secretly Spies on You, And More News

Say hello to your new speaker-lamp. A cervix-navigating robot could save the rhinos. To be fair, these rhinos will need a lot more than a cervix-navigating robot to survive.

Coding Is for Everyone—as Long as You Speak English

Coding Is for Everyone—as Long as You Speak English

When you put translating code in terms of the billions of the people in the world who don't speak English, access to high-paying jobs and the ability to tinker with your own device is no longer a hypothetical benefit.

A Fight Over Specialized Chips Threatens an Ethereum Split

A Fight Over Specialized Chips Threatens an Ethereum Split

A spokesperson for Linzhi, in an email to WIRED, called it a move to “counter Chinese supremacy in crypto.” But many critiques have centered on Minehan herself, focusing on her experience working with GPU makers and alleging that she had been paid to develop the algorithm.

More