Parler Finds a Reprieve in Russia—but Not a Solution

Parler Finds a Reprieve in Russia—but Not a Solution

Given the Russian government’s active efforts to isolate the country’s internet and gain access to all data, Parler could expose its users to Russian surveillance if the site someday does relaunch in full with DDoS-Guard.

How Much Will Data Caps Hurt Game Streaming?

How Much Will Data Caps Hurt Game Streaming?

Put simply, will data caps kill services like Stadia and Xbox Cloud Gaming that rely on streaming huge amounts of data?Streaming video games is, without a doubt, one of the most data-heavy tasks that users can do online right now, so it’s natural to be concerned that doing so would burn through data caps.

The NSA Warns That Russia Is Attacking Remote Work Platforms

The NSA Warns That Russia Is Attacking Remote Work Platforms

In an advisory today, the National Security Agency said that Russian state-sponsored groups have been actively attacking a vulnerability in multiple enterprise remote-work platforms developed by VMware.

This ‘Magical Bug’ Exposed Any iPhone in a Hacker's Wi-Fi Range

This ‘Magical Bug’ Exposed Any iPhone in a Hacker's Wi-Fi Range

The genius of the attack, though, is that the bug was exploitable through an iPhone's Wi-Fi features, meaning that an attacker just needed some antennas and adapters to launch the assault whenever they chose, compromising any nearby iOS device.

A Broken Piece of Internet Backbone Might Finally Get Fixed

A Broken Piece of Internet Backbone Might Finally Get Fixed

Today the group known as Mutually Agreed Norms for Routing Security is announcing a task force specifically dedicated to helping "content delivery networks" and other cloud services adopt the filters and cryptographic checks needed to harden BGP.

The Science That Spans #MeToo, Memes, and Covid-19

The Science That Spans #MeToo, Memes, and Covid-19

Foucault Welles, an associate professor at Northeastern, says that network science “lets us distill vast, chaotic online communication data down to its essence” and “pull out important themes, people, and events for close reading.” This intersection with big data is critical: that it can extract patterns from terabytes of social media interactions strengthens the reach of its conclusions—the findings aren’t about how a small set of users behave, but about aggregate behavior.

On the Week of the Election, Social Media Must Go Dark

On the Week of the Election, Social Media Must Go Dark

Platforms could either collect such information through the mainstream press or set up a hotline allowing users to report election problems to the social media companies themselves, which would then verify the authenticity of tips before alerting users.

Computer Scientists Break the 'Traveling Salesperson' Record

Computer Scientists Break the 'Traveling Salesperson' Record

Now, in a paper posted online in July, Klein and his advisers at the University of Washington, Anna Karlin and Shayan Oveis Gharan, have finally achieved a goal computer scientists have pursued for nearly half a century: a better way to find approximate solutions to the traveling salesperson problem.

The iPhone 12 Is a Smartphone Made for Our Terrible Times

The iPhone 12 Is a Smartphone Made for Our Terrible Times

At the very least, you have to use a VPN service anytime you connect to the internet through a network that you don't personally control.

A Ransomware Attack Has Struck a Major US Hospital Chain

A Ransomware Attack Has Struck a Major US Hospital Chain

The company's statement did confirm that the "IT network across Universal Health Services facilities is currently offline, due to an IT security issue," and that patient and employee data appear not to have been compromised in the attack.

Facebook Busts Russian Disinfo Networks as US Election Looms

Facebook Busts Russian Disinfo Networks as US Election Looms

Facebook attributed one of the disinformation distribution networks to "actors associated with election interference in the US in the past, including those involved in 'DC leaks' in 2016.The network tied to IRA-linked individuals included accounts and groups collectively posing as a Turkey-based think tank.

New tsunami monitoring system for Pacific

New tsunami monitoring system for Pacific

A network of state-of-the-art tsunami buoys is being deployed from New Zealand up into the Pacific to keep communities safer.Every 15 seconds the BPR records the height of the ocean above it and sends that information to the surface buoy once an hour.

The iOS 14 Privacy and Security Features You Should Know

The iOS 14 Privacy and Security Features You Should Know

If you open Settings in iOS 14 and then choose Privacy and Location Services , you can tap on an app to configure how it can access your phone's location: never, always, only when the app is open, or only when you give explicit permission.

Now’s the Perfect Time to Switch to a Cheaper Phone Plan

Now’s the Perfect Time to Switch to a Cheaper Phone Plan

Our favorite Mint Mobile plans are $25 per month for 3 GB and $40 per month for unlimited talk, text, and data.For an unlimited plan, it's affordable at $40 per month for one line, including taxes and fees, and it comes with unlimited talk, text, and LTE data with no speed cap.

The Progressive Case for a TikTok Sale

The Progressive Case for a TikTok Sale

The first, long championed by China, is net nationalism, which makes the State the predominant authority over all things internet, and at bottom sees the network as nothing more than an instrument of state power.

The NIH Launches a Global Hunt for Animal-to-Human Diseases

The NIH Launches a Global Hunt for Animal-to-Human Diseases

What was not at at all normal: The group was launching an international network to detect pathogens that can jump from wildlife to the human population, a field of inquiry that’s become politicized since the coronavirus pandemic began—and they were doing it with federal money, even though the United States government has been the source of the politicization.

The FBI Botched Its DNC Hack Warning in 2016—but Says It Won’t Next Time

The FBI Botched Its DNC Hack Warning in 2016—but Says It Won’t Next Time

"I see a key change in practice and emphasis, getting our special agents in charge keyed up to gain the full cooperation of potential victims," says Herrington, who says he's personally notified dozens of victims of hacking incidents over his career.

A Tesla Employee Thwarted an Alleged Ransomware Plot

A Tesla Employee Thwarted an Alleged Ransomware Plot

The next day, Kriuchkov took his Tesla contact to a Reno bar and made the offer: Half a million dollars in cash or bitcoin to install malware on Tesla's network, using either a USB drive or by opening an email's malicious attachment.

A Radical New Model of the Brain Illuminates Its Wiring

A Radical New Model of the Brain Illuminates Its Wiring

Phrenology depended on the assumption that different parts of the brain are associated with different traits and abilities, a position called “localizationism.” And the absurdity of skull-measuring did not necessarily invalidate this notion.

Google Is Launching a Global Earthquake-Detection Network

Google Is Launching a Global Earthquake-Detection Network

Proactive earthquake alerts will only be in California for now (which already has ShakeAlert and an established data set), and Google says that "over the coming year, you can expect to see the earthquake alerts coming to more states and countries using Android’s phone-based earthquake detection.".

What's the Best Unlimited Data Plan?

What's the Best Unlimited Data Plan?

Essentials is the best choice for most people with big families, but the Magenta and Magenta Plus plans are also great value if you are connecting only a few lines and you use features like tethering with a hot spot, you watch videos on the go, or if you travel abroad a lot.

The Anatomy of a Cisco Counterfeit Shows Its Dangerous Potential

The Anatomy of a Cisco Counterfeit Shows Its Dangerous Potential

The units F-Secure analyzed posed as Cisco Catalyst 2960-X Series switches—trusted devices that connect computers on an internal network to route data between them.In their analysis, the F-Secure researchers found subtle cosmetic differences between the counterfeit devices and a genuine Cisco 2960-X Series switch used for reference.

An Ethics Guide for Tech Gets Rewritten With Workers in Mind

An Ethics Guide for Tech Gets Rewritten With Workers in Mind

Now, the Omidyar Network has a new tool kit, designed to get tech workers talking about the way their products shape society, democracy, and more.Some companies in Silicon Valley have even created internal corporate positions to focus on those issues, like Salesforce’s Office of Ethical and Humane Use.

A Report Blames ‘CIA Failures’ for the Agency's Worst Hack

A Report Blames ‘CIA Failures’ for the Agency's Worst Hack

"The lax cybersecurity practices documented in the CIA's WikiLeaks Task Force report do not appear to be limited to just one part of the intelligence community," Wyden wrote.

We Can Protect the Economy From Pandemics. Why Didn't We?

We Can Protect the Economy From Pandemics. Why Didn't We?

Photograph: Christie Hemm KlokThat night Wolfe told me he was forming a network of research outposts around the globe, in hot spots where potentially devastating viruses were poised to make the jump: Cameroon, where HIV likely passed from chimpanzees into local hunters; the Democratic Republic of Congo, which had seen human outbreaks of monkeypox; Malaysia, home to a 1998 emergence of the Nipah virus; and China, where SARS-CoV had crossed over, likely from bats, in 2002.

NSA: Russia's Sandworm Hackers Have Hijacked Mail Servers

NSA: Russia's Sandworm Hackers Have Hijacked Mail Servers

On Thursday, the NSA issued an advisory that the Russian hacker group known as Sandworm , a unit of the GRU military intelligence agency, has been actively exploiting a known vulnerability in Exim, a commonly used mail transfer agent—an alternative to bigger players like Exchange and Sendmail—running on email servers around the world.

Now Chrome Can Block Ads That Leach Power From Your CPU

Now Chrome Can Block Ads That Leach Power From Your CPU

Chrome browser users take heart: Google developers are rolling out a feature that neuters abusive ads that covertly leach your CPU resources, bandwidth, and electricity.

LockBit Is the New Ransomware for Hire

LockBit Is the New Ransomware for Hire

A recent infection by a fairly new strain called LockBit explains why: After it ransacked one company’s poorly secured network in a matter of hours, leaders had no viable choice other than to pay the ransom.

The Covid-19 Pandemic Reveals Ransomware's Long Game

The Covid-19 Pandemic Reveals Ransomware's Long Game

New research from Microsoft shows that ransomware attackers are actively making that crisis worse, forcing health care and critical infrastructure organizations to pay up when they can least afford downtime.The Microsoft researchers often observed attackers getting their initial network access by exploiting unpatched vulnerabilities in victims' web infrastructure.

Get Lost in Nature With These Psychedelic Images

Get Lost in Nature With These Psychedelic Images

To that end, we sent Cody Cobb, a photographer known for his meditative, dream-like landscapes, to make images of a large swath of the American West.