What Is the Internet of Things? A WIRED Guide

What Is the Internet of Things? A WIRED Guide

Amazon introduces the Echo speaker, along with the Alexa voice assistant—a new way to control the smart home.Apple had introduced Siri, its own voice assistant, four years prior—but Siri lived on your phone, while Alexa lived inside the speaker and could control all of the “smart” devices in your house.

Pro-Trump Trolls Flooded the Iowa Caucus Phone Lines

Pro-Trump Trolls Flooded the Iowa Caucus Phone Lines

And flaws in a widely used Cisco protocol have put millions of workplace phones, routers, and network switches at risk .On the lighter side of hacking—well, it's all relative—artist Simon Weckert fooled Google Maps into thinking there was a traffic jam in Berlin by carting around 99 smartphones in little red wagon .

Cisco Flaws Put Millions of Workplace Devices at Risk

Cisco Flaws Put Millions of Workplace Devices at Risk

Attackers could use related flaws, also disclosed by Armis, to attack batches of Cisco devices at once—like all the desk phones or all the webcams—to shut them down or turn them into eyes and ears inside a target organization.

UK Has a Plan to Corral Huawei. But Security Concerns Linger

UK Has a Plan to Corral Huawei. But Security Concerns Linger

Washington effectively bans carriers from using the company’s equipment in US networks and has long warned that Huawei could build backdoors into its products that could be accessed by the Chinese government, something the company denies it has done or would do.

One Small Fix Would Curb Stingray Surveillance

One Small Fix Would Curb Stingray Surveillance

Stingrays derive their power by pretending to be cell towers, tricking nearby devices into connecting to them instead of the real thing.Without confirming that a cell tower is genuine, devices could wind up connecting to any rogue base station that's set up to broadcast system information messages.

Windows 10 Has a Security Flaw So Severe the NSA Disclosed It

Windows 10 Has a Security Flaw So Severe the NSA Disclosed It

In fact, Neuberger said that disclosing the code verification bug to Microsoft and the public is part of a new NSA initiative in which the agency will share its vulnerability findings more quickly and more often.

Computers Are Learning to See in Higher Dimensions

Computers Are Learning to See in Higher Dimensions

These “gauge-equivariant convolutional neural networks,” or gauge CNNs, developed at the University of Amsterdam and Qualcomm AI Research by Taco Cohen, Maurice Weiler, Berkay Kicanaoglu and Max Welling, can detect patterns not only in 2D arrays of pixels, but also on spheres and asymmetrically curved objects.

The 19 Best Shows of a Decade That Queered Television

The 19 Best Shows of a Decade That Queered Television

What’s queer about OITNB—and all the shows that followed its lead—isn’t just its cast; it’s the stories it told and the way it told them.Like queerness itself, it taught people how to participate in culture in entirely new ways.

Facebook Removes Accounts With AI-Generated Profile Photos

Facebook Removes Accounts With AI-Generated Profile Photos

A report by Graphika and DFRLab researchers, found that the majority of The BL network’s fake accounts were used to maintain a cluster of over 80 groups and pages promoting President Trump.

5G Is More Secure Than 4G and 3G—Except When It’s Not

5G Is More Secure Than 4G and 3G—Except When It’s Not

With the faster connection speeds will come increased security and privacy protections for users, as the wireless industry attempts to improve on the defenses of 3G and 4G.

The FCC's Push to Purge Huawei From US Networks

The FCC's Push to Purge Huawei From US Networks

The Federal Communication Commission first proposed the drastic overhaul at the end of October, suggesting that access to FCC subsidies from the $8.5 billion Universal Service Fund be contingent on removing all Huawei and ZTE equipment.

How Iran's Government Shut Off the Internet

How Iran's Government Shut Off the Internet

Places like Ethiopia that have relatively limited internet proliferation typically have just one government-controlled internet service provider, perhaps alongside some smaller private ISPs. But all usually gain access from a single undersea cable or international network node, creating "upstream" choke points that officials can use to essentially block a country's connectivity at its source.

As 5G Rolls Out, Troubling New Security Flaws Emerge

As 5G Rolls Out, Troubling New Security Flaws Emerge

The researchers from Purdue University and the University of Iowa are detailing 11 new design issues in 5G protocols that could expose your location, downgrade your service to old mobile data networks, run up your wireless bills, or even track when you make calls, text, or browse the web.

Want to Plant More Trees? Just Use a Different Search Engine

Want to Plant More Trees? Just Use a Different Search Engine

Kroll says Ecosia was on pace to generate 200 percent of its total energy use from new sustainable sources (“Why stop at one hundred?”) but that progress was slowed by Ecosia’s own growth.

Now the Machines Are Learning How to Smell

Now the Machines Are Learning How to Smell

On Thursday, researchers at Google Brain released a paper on the preprint site Arxiv showing how they trained a set of machine-learning algorithms to predict molecules’ smell based on their structures.

Facebook Is Losing Its Cover for Libra As More Members Flee

Facebook Is Losing Its Cover for Libra As More Members Flee

Last week, PayPal became the first to defect from the 28-member Libra Association, declining to participate in Facebook’s vision for global payments—a vision it helped seed .

Planning an ocean observation network

Planning an ocean observation network

NIWA coastal physicist Dr Joanne O’Callaghan is part of a working group aiming to establish a collaborative New Zealand ocean observing network.Climate change is making its presence felt in New Zealand waters with marine heatwaves, increasing ocean acidification and sea level rise.”.

Decades-Old Code Is Putting Millions of Critical Devices at Risk

Decades-Old Code Is Putting Millions of Critical Devices at Risk

Today Armis, the Department of Homeland Security, the Food and Drug Administration, and a broad swath of so-called real-time operating system and device companies disclosed that Urgent/11, a suite of network protocol bugs, exist in far more platforms than originally believed.

The Guy Who Wrote Facebook's Content Rules Says Its Politician Hate Speech Exemption Is 'Cowardice'

The Guy Who Wrote Facebook's Content Rules Says Its Politician Hate Speech Exemption Is 'Cowardice'

That essay is notable not just for its well-argued points but for who wrote it: Dave Willner is Facebook’s former head of content standards.

WeWork's Wi-Fi Is Woefully Insecure

WeWork's Wi-Fi Is Woefully Insecure

Add to the pile its Wi-Fi security practices, which recent scans have shown leave documents potentially exposed to anyone else who shares the space.Plus, read the latest news on artificial intelligence 🏃🏽‍♀️ Want the best tools to get healthy?

On Roku and Amazon Fire TV, Channels Are Watching You

On Roku and Amazon Fire TV, Channels Are Watching You

They found that 89 percent of Amazon Fire TV channels and 69 percent of Roku channels contained easily spottable trackers that collected information about a viewing habits and preferences, along with unique identifiers like device serial numbers and IDs, Wi-Fi network names, and the Wi-Fi identifiers known as MAC addresses.

Think Video on Your Phone Is Slow? It’s Not Your Imagination

Think Video on Your Phone Is Slow? It’s Not Your Imagination

A new report by researchers at Northeastern University confirms that the nation’s four major wireless carriers throttle at least some video content on their networks, and suggests a few workarounds for those who want the best possible video quality on their mobile devices.

A Boeing Code Leak Exposes Security Flaws Deep in a 787's Guts

A Boeing Code Leak Exposes Security Flaws Deep in a 787's Guts

An attacker could potentially pivot, Santamarta says, from the in-flight entertainment system to the CIS/MS to send commands to far more sensitive components that control the plane's safety-critical systems, including its engine, brakes, and sensors.

How a 10-Year-Old Desk Phone Bug Came Back From the Dead

How a 10-Year-Old Desk Phone Bug Came Back From the Dead

Povolny says that with the Avaya desk phones, it took only basic hacking skills to gain access to the device's systems and firmware (the foundational code that coordinates a device's hardware and software) and analyze them for flaws.

Cloudflare Ditches 8chan. What Happens Now?

Cloudflare Ditches 8chan. What Happens Now?

What Happens Now. Cloudflare CEO Matthew Prince announced Sunday that his company would stop providing protection for internet for 8chan, after a series of mass shooting manifestos were posted on the forum.

5G Is Here—and Still Vulnerable to Stingray Surveillance

5G Is Here—and Still Vulnerable to Stingray Surveillance

The researchers found that they could use their first stingray attack to modify a device's stated category number during the connection process, downgrading it to an older network.

A Black Lady Sketch Show Is a Much-Needed Jolt to TV Comedy

A Black Lady Sketch Show Is a Much-Needed Jolt to TV Comedy

In fact, the foursome are among a rising comedy avant-garde on TV that includes Spanish language curios (HBO's charming Los Espookys ), alt-sketch programs (Netflix's deliriously clever I Think You Should Leave with Tim Robinson and Comedy Central's Alternatino ), black mockumentaries (IFC's Sherman’s Showcase ), and more traditional fare ( South Side , which debuted on Comedy Central last week to impressive numbers).The boom is likely to hold, too.

The Senate's Transportation Plan Reckons With Climate Change

The Senate's Transportation Plan Reckons With Climate Change

It would offer funding for electric vehicle charging stations, pedestrian- and cyclist-friendly street design , reducing diesel emissions in ports, infrastructure resilient to floods and heat waves , and more.

Trump's Cyber Czar Is Back—and He Wants to Make Hackers Suffer

Trump's Cyber Czar Is Back—and He Wants to Make Hackers Suffer

But you never stop to believe there's an adversary outside the window interfering with the beam between the remote and TV," says Ryan, who left the NSA two years ago to start work on Trinity before recruiting Bossert six months ago.

An Operating System Bug Exposes 200 Million Critical Devices

An Operating System Bug Exposes 200 Million Critical Devices

But the Armis researchers, who first disclosed their findings to Wind River in March, say that the patching process will be long and difficult, as is often the case with IoT and critical infrastructure updates .