How to Get Free Kindle Books With Your Library Card

How to Get Free Kindle Books With Your Library Card

With a library card, an internet connection, and an e-reader, you can start reading the book right away without ever leaving your house.There are two ways to read your borrowed book: Directly in the Libby app, or on any Kindle device.

The Best and Worst Browsers for Privacy, Ranked

The Best and Worst Browsers for Privacy, Ranked

Microsoft Edge received the lowest privacy rating in a recently published study that compared the user information collected by major browsers.Edge also sends the hardware UUID of the device to Microsoft and Yandex similarly transmits a hashed hardware identifier to back end servers.

The Perma-Viral World of the At-Home Nose Job

The Perma-Viral World of the At-Home Nose Job

“Can it be used on my 13-year-old daughter?” one customer asks about a product called “Nose Up Lifting Magic Nose Shaper Clip Beauty Nose Slimming Device Pain Free High Up Tool.” The seller’s answer?

Cisco Flaws Put Millions of Workplace Devices at Risk

Cisco Flaws Put Millions of Workplace Devices at Risk

Attackers could use related flaws, also disclosed by Armis, to attack batches of Cisco devices at once—like all the desk phones or all the webcams—to shut them down or turn them into eyes and ears inside a target organization.

One Small Fix Would Curb Stingray Surveillance

One Small Fix Would Curb Stingray Surveillance

Stingrays derive their power by pretending to be cell towers, tricking nearby devices into connecting to them instead of the real thing.Without confirming that a cell tower is genuine, devices could wind up connecting to any rogue base station that's set up to broadcast system information messages.

This Government-Subsidized Phone Comes With Malware

This Government-Subsidized Phone Comes With Malware

An Android phone subsidized by the US government for low-income users comes preinstalled with malware that can't be removed without making the device cease to work, researchers reported on Thursday.

Mind Control for the Masses—No Implant Needed

Mind Control for the Masses—No Implant Needed

His startup, NextMind, makes a non-invasive neural interface that sits on the back of one’s head, and translates brain waves into data that can be used to control compatible software.

Why Ring Doorbells Perfectly Exemplify the IoT Security Crisis

Why Ring Doorbells Perfectly Exemplify the IoT Security Crisis

News reports this week are raising a different issue: hackers are breaking into users' Ring accounts, which can also be connected to indoor Ring cameras, to take over the devices and get up to all sorts of invasive shenanigans.

Metal Wants to Float, Once It’s Etched With a Fricking Laser

Metal Wants to Float, Once It’s Etched With a Fricking Laser

A great way to anger the gods is to call your ship unsinkable.Using an absurdly powerful laser, the researchers etched fine patterns into the metal, which trap air.

146 New Vulnerabilities All Come Preinstalled on Android Phones

146 New Vulnerabilities All Come Preinstalled on Android Phones

“We wanted to understand how easy it is for someone to be able to penetrate the device without the user downloading an application,” says Kryptowire CEO Angelos Stavrou.

Motorola Reboots the Razr, This Time With a Folding Display

Motorola Reboots the Razr, This Time With a Folding Display

This allows it to fold closed like an OG Razr, then unfold to become a touchscreen smartphone with a 6.2-inch diagonal.The new Motorola Razr, all folded up.When the Razr is closed, you can use the 16-megapixel rear camera as a selfie camera through this 2.7-inch “Quick View” display.

As 5G Rolls Out, Troubling New Security Flaws Emerge

As 5G Rolls Out, Troubling New Security Flaws Emerge

The researchers from Purdue University and the University of Iowa are detailing 11 new design issues in 5G protocols that could expose your location, downgrade your service to old mobile data networks, run up your wireless bills, or even track when you make calls, text, or browse the web.

A ‘Safe’ Smoking Gadget, Vodka Made From Air, and More News

A ‘Safe’ Smoking Gadget, Vodka Made From Air, and More News

Tobacco is warming and new alcohols are forming, but first, a cartoon about the dangers of self-diagnosis .Here's the news you need to know, in two minutes or less.You can sign up right here to make sure you get the news delivered fresh to your inbox every weekday!

A New Smoking Gadget Says It's Safe. Should You Trust It?

A New Smoking Gadget Says It's Safe. Should You Trust It?

After reviewing the device and reams of data presented by Philip Morris, the agency decided that although Iqos isn’t risk-free, it was “appropriate for the protection of the public health” because the devices had “fewer or lower levels of some toxins.” The authorization doesn’t mean the regulator approves of the device or thinks it’s safe; it just means the FDA believes Iqos isn’t more dangerous than regular cigarettes.

Hackers Can Use Lasers to ‘Speak’ to Your Amazon Echo or Google Home

Hackers Can Use Lasers to ‘Speak’ to Your Amazon Echo or Google Home

Video: The University of Electro-Communications; The University of Michigan When they used a 60 milliwatt laser to "speak" commands to 16 different smart speakers, smartphones, and other voice activated devices, they found that almost all of the smart speakers registered the commands from 164 feet away, the maximum distance they tested.

Cut Your Own Vinyl Records With This $1,100 Machine

Cut Your Own Vinyl Records With This $1,100 Machine

The Phonocut is an analog vinyl lathe, the first consumer device capable of making custom records immediately, right there in your home (assuming you’re willing to pay $1,100 for the privilege).The device cuts 10-inch vinyl records, which can hold about 10 to 15 minutes of audio on each side.

USB-C Has Finally Come Into Its Own

USB-C Has Finally Come Into Its Own

While the body that governs USB protocol, the USB Implementers Forum, sets a Power Delivery standard, manufacturers have come up with their own unique implementations as well.To know exactly what you’re getting, you’re best off sticking with the USB-C cable that comes in the box.

The Internet’s Horrifying Way to Get Google Apps on Huawei Phones

The Internet’s Horrifying Way to Get Google Apps on Huawei Phones

Unfortunately, none of these methods work on the Mate 30 Pro. They rely on either an unlocked bootloader, which allows users to flash Google apps to the normally read-only system partition, or on "stub apps" left in the system partition by the device manufacturer specifically for the Google apps, so sideloaded versions can get the system-level permissions they need to work.

Microsoft's Surface Pro X Is a New, Improved Surface RT

Microsoft's Surface Pro X Is a New, Improved Surface RT

It’s just 0.28 of an inch thick and weighs 1.7 pounds (the same weight as the other new Surface device announced Wednesday, the Surface Pro 7; more on that below).Microsoft is claiming this “pro” tablet running on Qualcomm’s ARM-based processor should be three times as powerful as the Surface Pro 6 and get about 13 hours of battery life on a single charge.

Microsoft Surface Duo Will Be a Dual-Screen Android 'Device'

Microsoft Surface Duo Will Be a Dual-Screen Android 'Device'

It will run on an Intel heterogeneous chip, designed for smaller form factors, and it will run on a new version of the OS called Windows 10X, which is designed for dual-screen PCs. The Surface Duo, which at first glance looks like a Mini Me of the Surface Neo, is in many ways a completely different product.

Decades-Old Code Is Putting Millions of Critical Devices at Risk

Decades-Old Code Is Putting Millions of Critical Devices at Risk

Today Armis, the Department of Homeland Security, the Food and Drug Administration, and a broad swath of so-called real-time operating system and device companies disclosed that Urgent/11, a suite of network protocol bugs, exist in far more platforms than originally believed.

The Speculum Finally Gets a Modern Redesign

The Speculum Finally Gets a Modern Redesign

Asiedu tested her prototype in a pilot study with 15 volunteers this year, the results of which were published in the journal PLOS One in May. Every single patient said the smaller device provided a better experience than the speculum.The Duke study looked at patient satisfaction, and Asiedu acknowledges that physicians may offer more criticism of the device.

NASA's Nuclear Idea, an Unfixable Apple Flaw, and More News

NASA's Nuclear Idea, an Unfixable Apple Flaw, and More News

Nuclear rockets could wind up in space, a researcher unveiled a massive and unfixable iPhone flaw, and US police forces are using doorbell cameras to fight crime.NASA wants to send nuclear rockets to the moon and Mars.

Little Talk of Sustainability at Amazon's Big Hardware Event

Little Talk of Sustainability at Amazon's Big Hardware Event

Amazon’s annual hardware event on Wednesday was not unlike its product announcements from years prior: The company unveiled a dizzying number of new Echo speakers, showed off how it's improving Alexa through sophisticated speech technology, and even revealed a couple of skunkworks projects—smart glasses and a smart ring—at the very end of its presentation.

Cloudflare Launches Its Security-Focused Mobile VPN, Again

Cloudflare Launches Its Security-Focused Mobile VPN, Again

The VPN builds on Cloudflare's existing mobile app 1.1.1.1, which encrypts "domain name system" connections, so your internet service provider or other lurkers can't see which websites you access.

A Simple Way to Make It Harder for Mobile Ads to Track You

A Simple Way to Make It Harder for Mobile Ads to Track You

Both Android and iOS force apps to use a special "ad ID" for tracking smartphones, which gets linked to whatever data marketers collect from you.

On Roku and Amazon Fire TV, Channels Are Watching You

On Roku and Amazon Fire TV, Channels Are Watching You

They found that 89 percent of Amazon Fire TV channels and 69 percent of Roku channels contained easily spottable trackers that collected information about a viewing habits and preferences, along with unique identifiers like device serial numbers and IDs, Wi-Fi network names, and the Wi-Fi identifiers known as MAC addresses.

'Simjacker' Attack Can Track Phones Just by Sending a Text

'Simjacker' Attack Can Track Phones Just by Sending a Text

The good news is that the so-called Simjacker attack revealed this week by AdaptiveMobile Security doesn't appear to affect the major US carriers.The Treasury Department this week leveled sanctions against three North Korean hacking groups, including the Lazarus Group, a team thought responsible for the 2014 hack of Sony Pictures and other major targets.

An Unprecedented iPhone Hack, a Wi-Fi Leg Implant, and More News

An Unprecedented iPhone Hack, a Wi-Fi Leg Implant, and More News

A hacker has been taking advantage of iPhone security flaws, a man implanted a streaming device in his leg, and Uber and Lyft are fighting to avoid treating their drivers as employees.

Hackers Can Turn Everyday Speakers Into Acoustic Cyberweapons

Hackers Can Turn Everyday Speakers Into Acoustic Cyberweapons

But Matt Wixey, cybersecurity research lead at the technology consulting firm PWC UK, says that it’s surprisingly easy to write custom malware that can induce all sorts of embedded speakers to emit inaudible frequencies at high intensity, or blast out audible sounds at high volume.