Instagram Now Fact-Checks, but Who Will Do the Checking?

Instagram Now Fact-Checks, but Who Will Do the Checking?

Facebook pays PolitiFact to check a certain amount of content and, despite adding an entirely new platform to the deal, Sharockman says the two organizations haven’t discussed expanding the agreement.

A Newfound Neuron Might Help Keep the Brain's Cells in Sync

A Newfound Neuron Might Help Keep the Brain's Cells in Sync

For Vikaas Sohal, a neuroscientist at UC San Francisco, who was not involved in the work, the discovery of these cells might help the field move away from conflicts about gamma rhythms. If they really are clock-like cells, he says, then signs of their timekeeping should show up in the rhythm of the local field potential.

To Help Migrants at the Border, Aid Groups Deploy Tech

To Help Migrants at the Border, Aid Groups Deploy Tech

It’s unfair,” says Ian Philabaum, a program director at Immigration Law Lab. Of the nearly 1 million asylum cases waiting to be heard, about 74 percent are for people coming from El Salvador, Guatemala, Honduras, and Mexico.

Big Tech Needs to Use Hazardous Materials Warnings

Big Tech Needs to Use Hazardous Materials Warnings

Material Safety Data Sheets, the chemical equivalent of technology user terms and conditions, have offered descriptions of those hazards since the early 1900s. Even if users don’t read the safety data sheet, they are greeted by this bright, unavoidable summary of material hazards every time they look at the container.

This Teen Hacker Found Bugs in School Software That Exposed Millions of Records

This Teen Hacker Found Bugs in School Software That Exposed Millions of Records

In Follett's software, Demirkapi says he found bugs that would have given a hacker access to student data like grade point average, special education status, number of suspensions, and passwords.

The Wrong Way to Talk About a Shooter's Manifesto

The Wrong Way to Talk About a Shooter's Manifesto

“Those manifestos are specifically designed to be objects of media manipulation,” says Whitney Phillips, who researches troll culture and online extremism at Syracuse University.

5G Is Here—and Still Vulnerable to Stingray Surveillance

5G Is Here—and Still Vulnerable to Stingray Surveillance

The researchers found that they could use their first stingray attack to modify a device's stated category number during the connection process, downgrading it to an older network.

Hey, Apple! 'Opt Out' Is Useless. Let People Opt In

Hey, Apple! 'Opt Out' Is Useless. Let People Opt In

Right now it’s unclear what form Apple’s Siri opt-out will take; the company has suspended its voice data collection temporarily and says only that once it resumes, “users will have the ability to choose to participate.” Apple didn’t respond to a request for more specific information.

Scientists study eels by moonlight

Scientists study eels by moonlight

Eel larvae face a long journey from their spawning grounds in unknown parts of the Western Pacific Ocean to the freshwater rivers and streams of New Zealand where they spend most of their lives.

Equifax Might Owe You $125. Here's How to Get It

Equifax Might Owe You $125. Here's How to Get It

They've negotiated a settlement with Equifax that entitles all victims to 10 years of free credit monitoring, or $125. This (unfortunately) could actually come in handy, given that Social Security numbers taken from Equifax are starting to show up on the dark web, and consumers have already suffered identity theft related to the breach, according to Pennsylvania attorney general Josh Shapiro.

The Secret to Success on YouTube? Kids

The Secret to Success on YouTube? Kids

In a report Thursday, the Pew Research Center said that in the vast ecosystem of YouTube’s English-language videos, children’s content and content featuring kids under 13 are some of the most popular videos on the site.

A New Law Makes Bots Identify Themselves—That's the Problem

A New Law Makes Bots Identify Themselves—That's the Problem

The highly ambiguous law is tailored to address conversations that inspire purchases or sway votes, but it fails to carefully define what constitutes “influenc[ing] a vote in an election.” Is sharing legitimate news stories or voting locations a form of “influence?” After all, not all online automated accounts are malign; some are simply news or information dissemination services, while others are created by artists.

$700 Million Equifax Fine Is Still Too Little, Too Late

$700 Million Equifax Fine Is Still Too Little, Too Late

The state and federal groups that investigated Equifax touted the payout as an important wake-up call for all US corporations—especially since Equifax will also be required to make hundreds of millions of dollars of additional internal cybersecurity improvements on top of the fines.

Good News! It Just Got Easier for You to Suggest New Emoji

Good News! It Just Got Easier for You to Suggest New Emoji

Lee's group has been instrumental in helping people get emoji representation by guiding them through the daunting process of preparing a proposal for the Unicode Consortium. The new is meant to make the basic requirements more clear, and hopefully encourage more people to get involved in the emoji proposal process.

Seaweed as Sustainable Livelihood

Seaweed as Sustainable Livelihood

Photo © Kevin Arnold / TNC Our three-part Indonesia Guide: Coastal Conservation and Sustainable Livelihoods through Seaweed Aquaculture in Indonesia provides information and recommendations for how seaweed buyers can increase the sustainability of their supply chains, conservation organizations can work within seaweed aquaculture for environmental and social gains, and farmers can improve their environmental and production practices.

Who’s Listening When You Talk to Your Google Assistant?

Who’s Listening When You Talk to Your Google Assistant?

Verheyden says he gained access to the file and more than 1,000 others from a Google contractor who is part of a worldwide workforce paid to review some audio captured by the assistant from devices including smart speakers, phones, and security cameras.

The Window to Rein In Facial Recognition Is Closing

The Window to Rein In Facial Recognition Is Closing

Kade Crockford, director of ACLU of Massachusetts' Technology for Liberty Program, says findings like these surprise her even given the chaotic, unregulated intersection of law enforcement and facial recognition.

Twitter's Disinformation Data Dumps Are Helpful—to a Point

Twitter's Disinformation Data Dumps Are Helpful—to a Point

“I can see why the platforms would be hesitant,” says Ben Nimmo, a senior fellow of the Atlantic Council’s Digital Forensic Research Lab. People who followed IRA or other state-sponsored accounts may have been manipulated, but they weren’t breaking the law or even violating Twitter’s terms of service.

How to Protect Our Kids' Data and Privacy

How to Protect Our Kids' Data and Privacy

The Children's Online Privacy Protection Act of 1998 (COPPA) requires operators of websites and online services to obtain parents' explicit consent before collecting the personal information of children under 13.

The Biggest Cybersecurity Crises of 2019 So Far

The Biggest Cybersecurity Crises of 2019 So Far

In March, following a research report from the threat intelligence firm Kaspersky, computer maker Asus disclosed a supply chain attack sometime in the second half of 2018 that had compromised the company's Live Update tool to push malware to almost 1 million customers.

Ransomware Hits Georgia Courts As Municipal Attacks Spread

Ransomware Hits Georgia Courts As Municipal Attacks Spread

And whether a local government is going to rebuild from an attack on its own or pay the ransom, money to respond comes from public funds or through a municipality's cybersecurity insurance.

Health Brands Hims and Hers Flout Facebook’s Rules on Drug Ads

Health Brands Hims and Hers Flout Facebook’s Rules on Drug Ads

Such ads violate Facebook policies that prohibit promoting the sale or use of prescription drugs or suggesting that users have a specific condition. A Facebook spokesperson said that three Hims ads identified by WIRED violated Facebook’s policies by specifically referencing prescription drugs.

I Scraped Millions of Venmo Payments. Your Data Is at Risk

I Scraped Millions of Venmo Payments. Your Data Is at Risk

I could see a public API endpoint that was returning the data for this feed, meaning that anyone could make a GET request (like a simple page load) to see the latest 20 transactions made on the app by anyone around the world.

Senators Want Facebook to Put a Price on Your Data. Is That Possible?

Senators Want Facebook to Put a Price on Your Data. Is That Possible?

On Monday, when Senator Mark Warner (D-Virginia) announced a proposal to force tech companies to tell users the value of their data, he was slightly more generous, ballparking the average at $5 a month.

These Cities Will Track Scooters to Get a Handle on Regulation

These Cities Will Track Scooters to Get a Handle on Regulation

On Tuesday, 15 cities, including New York, Los Angeles, Chicago, Miami, San Francisco, and Bogota, Colombia, said they’ve created a nonprofit called the Open Mobility Foundation, devoted to collecting, maintaining, and standardizing information about where shared vehicles—including cars, scooters, jet packs, and bicycles—are parked.

Google Turns to Retro Cryptography to Keep Datasets Private

Google Turns to Retro Cryptography to Keep Datasets Private

"The net result is that we can perform this computation without exposing any individual data and only getting the aggregate result," says Amanda Walker, a privacy tools and infrastructure engineering manager at Google.

Weather Forecasts Will Soon Use Weird, Bendy GPS Signals

Weather Forecasts Will Soon Use Weird, Bendy GPS Signals

Known as the Constellation Observing System for Meteorology, Ionosphere and Climate (or COSMIC-2), the mission takes advantage of a weird property of GPS radio signals: They actually bend and slow down slightly as they travel through the atmosphere.

A Plan to Stop Breaches With Dead Simple Database Encryption

A Plan to Stop Breaches With Dead Simple Database Encryption

That means MongoDB itself and cloud providers won't be able to access customer data, and a database's administrators or remote managers don't need to have access to everything either.

Tricky Scam Plants Phishing Links in Your Google Calendar

Tricky Scam Plants Phishing Links in Your Google Calendar

Scammers are taking advantage of default calendar settings to try to trick users into clicking malicious links. "For the calendar attack, the scammers use a prepared email list to send their fraudulent invitations," says Maria Vergelis, a security researcher at Kaspersky who has been following the method.

Alphabet-Owned Jigsaw Bought a Russian Troll Campaign as an Experiment

Alphabet-Owned Jigsaw Bought a Russian Troll Campaign as an Experiment

"Let's say I want to wage a disinformation campaign to attack a political opponent or a company, but I don’t have the infrastructure to create my own Internet Research Agency," Gully told WIRED in an interview, speaking publicly about Jigsaw's year-old disinformation experiment for the first time.

More