Why France’s New Tech ‘Repairability Index’ Is a Big Deal

Why France’s New Tech ‘Repairability Index’ Is a Big Deal

Manufacturers selling these devices in France must give their products a score, or “repairability index,” based on a range of criteria, including how easy it is to take the product apart and the availability of spare parts and technical documents.

NASA Lands the Perseverance Rover on Mars

NASA Lands the Perseverance Rover on Mars

The Lockheed engineers had been working on this project for years, and today, Scholz and his team could finally watch it be put to use.

How to Use Your PS5 or Xbox Controller Everywhere Else

How to Use Your PS5 or Xbox Controller Everywhere Else

On your computer, you should see Wireless Controller pop up in the Add a device list, and you can click on it to pair.

A Windows Defender Vulnerability Lurked Undetected for 12 Years

A Windows Defender Vulnerability Lurked Undetected for 12 Years

The flaw, discovered by researchers at the security firm SentinelOne, showed up in a driver that Windows Defender—renamed Microsoft Defender last year—uses to delete the invasive files and infrastructure that malware can create.

Here’s the Right Way to Rescue a Soaking Wet Smartphone

Here’s the Right Way to Rescue a Soaking Wet Smartphone

So when your phone decides to take a dive, as soon as you're done freaking out, you'll probably begin frantically tapping all the buttons, blowing on it, or blasting it with a hair dryer to quickly get rid of all that water.

CES 2021 Highlights: 79 Gadgets and Glimpses Into the Future

CES 2021 Highlights: 79 Gadgets and Glimpses Into the Future

Wi-Fi 6E is a new standard for home networking gadgets—routers, security cameras, internet-connected doorbells—that allows these devices to utilize the 6-GHz wireless spectrum.This new 6-GHz band is also a higher-bandwidth slice of the wireless spectrum, so Wi-Fi 6E devices can send stronger, faster signals that contain more information.

How Law Enforcement Gets Around Your Smartphone's Encryption

How Law Enforcement Gets Around Your Smartphone's Encryption

“It just really shocked me, because I came into this project thinking that these phones are really protecting user data well,” says Johns Hopkins cryptographer Matthew Green, who oversaw the research.

How to Set Up Your New iPhone

How to Set Up Your New iPhone

When you turn on your new iPhone, you’ll be greeted by the Setup Assistant, through which you’ll establish essentials like your Wi-Fi network and six-digit passcode, Face ID, your Apple ID and iCloud account, and whether you want to activate Find My Phone and Location Services.

How to Set Up Your New Android Phone

How to Set Up Your New Android Phone

Being signed into your Google account makes it easy to set up a new phone from there, especially if you've previously owned an Android device.

The Secret History of the First Microprocessor, the F-14, and Me

The Secret History of the First Microprocessor, the F-14, and Me

Ray and I reconnected over the summer, and after he told me his story, I wanted to learn more about the Central Air Data Computer and its place in history—and how his life might have branched around mine.

A Massive Fraud Operation Stole Millions From Online Bank Accounts

A Massive Fraud Operation Stole Millions From Online Bank Accounts

Researchers from IBM Trusteer say they’ve uncovered a massive fraud operation that used a network of mobile device emulators to drain millions of dollars from online bank accounts in a matter of days.

This ‘Magical Bug’ Exposed Any iPhone in a Hacker's Wi-Fi Range

This ‘Magical Bug’ Exposed Any iPhone in a Hacker's Wi-Fi Range

The genius of the attack, though, is that the bug was exploitable through an iPhone's Wi-Fi features, meaning that an attacker just needed some antennas and adapters to launch the assault whenever they chose, compromising any nearby iOS device.

Underground Brine Could Be a Source of Oxygen on Mars

Underground Brine Could Be a Source of Oxygen on Mars

When powered up, brine flowed through the device, splitting into pure oxygen gas captured on the anode side and pure hydrogen gas on the cathode side.DOI: 10.1073/pnas.2008613117 (About DOIs).This story originally appeared on Ars Technica.📩 Want the latest on tech, science, and more?

How to Make Multiple Smart Speakers Work Together

How to Make Multiple Smart Speakers Work Together

To put two Nest speakers together as a stereo pair, they need to be in the same room: Tap any speaker, then the cog icon, then Room to set this.David Nield via GoogleWith that done, tap on the first speaker, then the cog icon, then Speaker pair .

I Bricked My Computer With a BIOS Update. But There's Hope!

I Bricked My Computer With a BIOS Update. But There's Hope!

When I pressed the soft glowing plastic power button, the lights on the case fluttered to life.I had never performed either of the viable remaining options; a power button menu update or recovery by security jumper.

What to Do With Old Phones, Cameras, Laptops, and Tablets

What to Do With Old Phones, Cameras, Laptops, and Tablets

Turn an Old Phone or Tablet Into a Media Remote.What this means for your old phone or tablet is that you can use it as a dedicated media remote or hub.

This Camera App Is Designed to Fight Fake News

This Camera App Is Designed to Fight Fake News

The Truepic technology will support a system being developed by Adobe and others that tags images and video with cryptographically encoded information on where and how they were captured.

Split-Second ‘Phantom’ Images Can Fool Tesla’s Autopilot

Split-Second ‘Phantom’ Images Can Fool Tesla’s Autopilot

"The attacker just shines an image of something on the road or injects a few frames into a digital billboard, and the car will apply the brakes or possibly swerve, and that's dangerous," says Yisroel Mirsky, a researcher for Ben Gurion University and Georgia Tech who worked on the research, which will be presented next month at the ACM Computer and Communications Security conference.

When Coffee Machines Demand Ransom, You Know IoT Is Screwed

When Coffee Machines Demand Ransom, You Know IoT Is Screwed

The same researchers found that version 2 of the iKettle and the then-current version of the Smarter coffee maker had additional problems, including no firmware signing and no trusted enclave inside the ESP8266, the chipset that formed the brains of the devices.

The iOS 14 Privacy and Security Features You Should Know

The iOS 14 Privacy and Security Features You Should Know

If you open Settings in iOS 14 and then choose Privacy and Location Services , you can tap on an app to configure how it can access your phone's location: never, always, only when the app is open, or only when you give explicit permission.

Apple's iOS and iPadOS 14 Have Dropped. Here's What’s New

Apple's iOS and iPadOS 14 Have Dropped. Here's What’s New

The latest version of Apple's mobile operating system, iOS 14, is now available for download, and you'll notice several visual tweaks when you first install it.Notably, your home screen looks very different, with an app library, widgets everywhere, and a new look for Siri.

How to Play Xbox and PC Games on Your Android Phone

How to Play Xbox and PC Games on Your Android Phone

Like Google's Stadia , cloud gaming via Game Pass Ultimate doesn't actually run the game on your Android device.

Could Breathalyzers Make Covid Testing Quicker and Easier?

Could Breathalyzers Make Covid Testing Quicker and Easier?

Earlier this summer, Gouma began running a clinical study to test the device at the Ohio State Wexner Medical Center, which included people who had Covid-19 and those who did not.

Ever Seen Inside a Mummified Cat? Well Now You Have

Ever Seen Inside a Mummified Cat? Well Now You Have

“But then there's a resolution limit to that technology,” says Swansea University materials scientist Rich Johnston, lead author on the new paper.“You can't really make out features, you can't do accurate measurements” at human-scale resolution, Johnston says.

9 Apps to Boost Your Phone's Security and Privacy

9 Apps to Boost Your Phone's Security and Privacy

Screenshot: David Nield via Access DotsiOS 14 adds a new feature to iPhones that shows an on-screen alert if an app is trying to use your device's camera or mic—just like the 'active' light that might be next to your laptop's webcam.

Student quad bike invention a winner

Student quad bike invention a winner

Lachlan Coleman, a student at St. Paul's Collegiate, invented a device called “Roll Gauge” that helps prevent rollover on vehicles like quadbikes and tractors that operate on uneven ground.

How to Install Apps From Outside Your Phone's App Store

How to Install Apps From Outside Your Phone's App Store

Before you rush to start downloading and installing things, it's important you know that sideloading apps removes the security protections that Google and Apple give you: Their app stores are carefully patrolled for malware, stalkerware , and anything that might try to steal your data or break your device.

Thieves Are Emptying ATMs Using a New Form of Jackpotting

Thieves Are Emptying ATMs Using a New Form of Jackpotting

In previous jackpotting attacks, the attached devices, known in the industry as black boxes, usually invoked programming interfaces contained in the ATM operating system to funnel commands that ultimately reached the hardware component that dispenses cash.

The Anatomy of a Cisco Counterfeit Shows Its Dangerous Potential

The Anatomy of a Cisco Counterfeit Shows Its Dangerous Potential

The units F-Secure analyzed posed as Cisco Catalyst 2960-X Series switches—trusted devices that connect computers on an internal network to route data between them.In their analysis, the F-Secure researchers found subtle cosmetic differences between the counterfeit devices and a genuine Cisco 2960-X Series switch used for reference.

Hackers Are Exploiting a 5-Alarm Bug in Networking Equipment

Hackers Are Exploiting a 5-Alarm Bug in Networking Equipment

The agencies recommended security professionals immediately implement a patch to protect the devices from hacking techniques that could fully take control of the networking equipment, offering access to all the traffic they touch and a foothold for deeper exploitation of any corporate network that uses them.