An Elite Spy Group Used 5 Zero-Days to Hack North Koreans

An Elite Spy Group Used 5 Zero-Days to Hack North Koreans

In just the last three years, Raiu says Kaspersky has found DarkHotel using three zero-day vulnerabilities beyond the five now linked to the group based on Google's blog post.

Russia Is Learning How to Bypass Facebook's Disinfo Defenses

Russia Is Learning How to Bypass Facebook's Disinfo Defenses

With the 2020 election now just seven months away, though, newly surfaced social media posts indicate that Russia’s Internet Research Agency is adapting its methods to circumvent those defenses.In September, University of Wisconsin researcher Young Mie Kim started analyzing posts on Facebook and Instagram from 32 accounts connected to the IRA.

'Baby Talk' Can Help Kids Learn Language (Oh Yes It Can !)

'Baby Talk' Can Help Kids Learn Language (Oh Yes It Can !)

But it’s not all about instinct: a paper published in PNAS this week suggests that parents can be trained to improve their parentese and that this training gives their babies’ language a boost.

Signal Is Finally Bringing Its Secure Messaging to the Masses

Signal Is Finally Bringing Its Secure Messaging to the Masses

Another new feature it's testing, called "secure value recovery," would let you create an address book of your Signal contacts and store them on a Signal server, rather than simply depend on the contact list from your phone.

Free Press Advocates Decry Cybercrime Charges Against Glenn Greenwald

Free Press Advocates Decry Cybercrime Charges Against Glenn Greenwald

The complaint goes to some lengths to emphasize that Greenwald was not initially a subject of the investigation into this alleged hacking group, but that an audio recording uncovered during a lawful search pointed to "direct participation of the journalist in criminal conduct."

Even Ultra-Tough Water Bears May Be Vulnerable to Climate Change

Even Ultra-Tough Water Bears May Be Vulnerable to Climate Change

Courtesy of Ricardo NevesFor the desiccated water bears in the tun state, you could dial up the heat to an impressive 180.86 degrees F for an hour, and about half of them would survive.

An Iranian Hacking Campaign, Social Media Surveillance, and More News

An Iranian Hacking Campaign, Social Media Surveillance, and More News

In a new report, the security firm Dragos details hacking activity against American electric utilities and attributes it to a group of Iranian hackers called Magnallium.That's the weight of Sony's new concept car , which debuted this week at CES.

Twitter Wants to Let Users Limit Who Replies. Here’s Why

Twitter Wants to Let Users Limit Who Replies. Here’s Why

“The philosophical approach we took here is, when you start a conversation, as the author of a tweet you should have a little more control over the replies to that tweet,” Beykpour said.

The Inventors Hall of Fame Honors Pioneering Brainiacs

The Inventors Hall of Fame Honors Pioneering Brainiacs

Taking the stage for Tuesday's announcement and panel discussion were Under Secretary of Commerce for Intellectual Property and USPTO director Andrei Iancu, National Inventors Hall of Fame executive vice president Rini Paiva, and two inductees for the class of 2020: Mick Mountz and Raffaello D'Andrea, cofounders of the robotics company Kiva, which is now owned by Amazon and whose robots are used to sort ecommerce orders.

The Most Dangerous People on the Internet This Decade

The Most Dangerous People on the Internet This Decade

But it makes a few very notable exceptions, including for the North Korean hackers broadly known as Lazarus, which has carried out some of the most aggressive hacking operations ever seen online.

ISIS Is Now Harder to Track Online—but That's Good News

ISIS Is Now Harder to Track Online—but That's Good News

Though you can still find many lingering rooms on Riot, the ISIS network as a whole looked elsewhere for a new home and quickly found one in TamTam, a messenger platform similar to Telegram (including a required phone number upon registering).

Book Review: Secrets of Snakes

Book Review: Secrets of Snakes

Fortunately, wildlife biologist and science communicator David Steen has taken the most common snake myths, tall tales and snake safety rules and applied real science to them in his wildly entertaining Secrets of Snakes: The Science Beyond the Myths (Texas A&M University Press).A lot of our wildlife myths are about creatures that we believe we know.

Google Employees Protest to Fight for the 'Future of Tech'

Google Employees Protest to Fight for the 'Future of Tech'

Rivers and Berland believe they are being retaliated against for speaking up, as part of a small but vocal group of employee activists who have criticized various company policies and projects over the past few years.

Iran’s APT33 Hackers Are Targeting Industrial Control Systems

Iran’s APT33 Hackers Are Targeting Industrial Control Systems

Threat intelligence firm FireEye has warned since 2017 that APT33 had links to another piece of destructive code known as Shapeshifter .Moran declined to name any of the specific industrial control system, or ICS, companies or products targeted by the APT33 hackers.

How Iran's Government Shut Off the Internet

How Iran's Government Shut Off the Internet

Places like Ethiopia that have relatively limited internet proliferation typically have just one government-controlled internet service provider, perhaps alongside some smaller private ISPs. But all usually gain access from a single undersea cable or international network node, creating "upstream" choke points that officials can use to essentially block a country's connectivity at its source.

Where Do Hippos Wander? An Aquatic Mystery, Solved

Where Do Hippos Wander? An Aquatic Mystery, Solved

Video: Keenan Stears/UCSBThe researchers divided the tranquilized hippos into three categories: large, dominant males that run things in the river; large sub-adult males that are coming up in the world but still answer to the dominant males; and small males even lower in the pecking order.

WhatsApp Hack Targeted Officials in More Than 20 Countries

WhatsApp Hack Targeted Officials in More Than 20 Countries

Government Officials in More Than 20 Countries Targeted via WhatsApp HackingLast May, WhatsApp revealed that hackers at NSO Group had been exploiting a vulnerability in its software that allowed them to compromise a phone simply by targeting it with a voice call that planted malware on the device capable of silently stealing a victim's messages.

‘Blooming heck’ - Microalgae feature in latest biodiversity memoir

‘Blooming heck’ - Microalgae feature in latest biodiversity memoir

A group of microscopic algae that form vast aquamarine blooms off the east coast is the subject of NIWA’s latest Biodiversity Memoir.Measuring as small as three microns (0.003 mm), powerful scanning electron microscopes are needed to look at the algae in detail.

Russian Hackers Are Still Targeting the Olympics

Russian Hackers Are Still Targeting the Olympics

Microsoft notes that the hackers, long believed to be working in the service of the Russian military intelligence agency known as the GRU, began their attacks on September 16, just ahead of reports that the Worldwide Anti-Doping Agency had found "inconsistencies" in Russian athletes' compliance with anti-doping standards, which may lead to the country's ban from the 2020 Tokyo Olympics, just as they were from the Pyeongchang Winter Games in 2018.

Ocean Cleanup’s New Plastic-Catcher … Kinda Already Exists?

Ocean Cleanup’s New Plastic-Catcher … Kinda Already Exists?

A little over a year ago, a group called The Ocean Cleanup launched an unprecedented campaign to rid the seas of plastic, complete with an unprecedented device: a 600-meter-long, U-shaped tube that was meant to passively gather debris in the Great Pacific Garbage Patch for a ship to come along and scoop up and take back to land.

In Flying Flags, Emoji Become Political

In Flying Flags, Emoji Become Political

Tibet’s not the only region where China’s sovereignty has been disputed, and two other territories, Taiwan and Hong Kong, both have their flags honored on the emoji keyboard.Myors and Pema Doma thought that offered good precedent for a Tibetan emoji flag, which they first proposed in March of 2018.

Maybe It’s Not YouTube’s Algorithm That Radicalizes People

Maybe It’s Not YouTube’s Algorithm That Radicalizes People

The authors say the quantity and popularity of alternative (mostly right-wing) political media on YouTube is driven by both supply and demand.“We believe that the novel and disturbing fact of people consuming white nationalist video media was not caused by the supply of this media ‘radicalizing’ an otherwise moderate audience,” they write.

A Brief History of Russian Hackers' Evolving False Flags

A Brief History of Russian Hackers' Evolving False Flags

Cyber Berkut was later revealed to be a front for the Russian military intelligence hacker group known as APT28 or Fancy Bear .Over the following years, the GRU would repeat those false flag "hacktivist" attacks again and again.

DNC Hackers Resurface, Zuckerberg Talks Free Speech, and More News

DNC Hackers Resurface, Zuckerberg Talks Free Speech, and More News

A dangerous hacker group resurfaced, Mark Zuckerberg delivered a long-winded defense of Facebook, and Volvo is going green.You can sign up right here to make sure you get the news delivered fresh to your inbox every weekday!

Iranian Hackers Targeted a US Presidential Candidate

Iranian Hackers Targeted a US Presidential Candidate

In a 30-day stretch during August and September, Microsoft saw hackers launch 2,700 attempts to identify specific target email accounts, including those belonging to current and former US government officials, journalists, and Iranians living outside Iran.

Greta Thunberg's Digital Rise Calls Back to a Pre-Digital Era

Greta Thunberg's Digital Rise Calls Back to a Pre-Digital Era

“She has a much larger platform because she’s talking about a global phenomenon.” Like the Parkland students—notably Emma González and David Hogg—Thunberg excels at using her personality to humanize a complex political issue, and, as Middaugh puts it, “clapping back at critics.” “They share this ability to use participatory, social media activism methods while also interfacing with public officials,” she says.

How Trump’s Ukraine Mess Entangled CrowdStrike

How Trump’s Ukraine Mess Entangled CrowdStrike

Like other prominent companies of its kind, CrowdStrike conducts digital forensic investigations, and defends its clients in part by removing a hacker's access to compromised accounts and devices.But when CrowdStrike or another firm investigates an incident, they typically don't physically remove a client's devices.

An End to Pornography, Sophistry, and Panty Raids

An End to Pornography, Sophistry, and Panty Raids

My hunch was confirmed later that year, at a tech conference in Oslo, when Dame Marina Warner, the visionary polymath and today the president of the Royal Society of Literature, fielded a disturbing question about pornography from the illustrious philosopher and early Edge member John Searle.

The Riddle, and Controversy, of All That Missing Plastic

The Riddle, and Controversy, of All That Missing Plastic

To complement these findings, Ocean Cleanup used data on winds and currents to show that when pieces of plastic come out of, say, rivers, they tend to stick around the coastline.Ocean Cleanup reckons that in total, just .06 percent of plastics from the shore and coastline make their way into gyres.

Exxon, J&J, P&G, Others United on Carbon Tax Plan

Exxon, J&J, P&G, Others United on Carbon Tax Plan

The more detailed blueprint set to be unveiled Wednesday by the Climate Leadership Council calls for a $40 tax to be levied on each ton of carbon dioxide, with the fee increasing at least 5% every year and proceeds rebated to American consumers.