What Is the Internet of Things? A WIRED Guide

What Is the Internet of Things? A WIRED Guide

Amazon introduces the Echo speaker, along with the Alexa voice assistant—a new way to control the smart home.Apple had introduced Siri, its own voice assistant, four years prior—but Siri lived on your phone, while Alexa lived inside the speaker and could control all of the “smart” devices in your house.

Cisco Flaws Put Millions of Workplace Devices at Risk

Cisco Flaws Put Millions of Workplace Devices at Risk

Attackers could use related flaws, also disclosed by Armis, to attack batches of Cisco devices at once—like all the desk phones or all the webcams—to shut them down or turn them into eyes and ears inside a target organization.

FAO - News Article: Global cooperation and climate friendly technologies are key to tackling global food loss and waste

FAO - News Article: Global cooperation and climate friendly technologies are key to tackling global food loss and waste

7 November 2019, Rome – FAO Director-General Qu Dongyu said today international co-operation and innovative, climate friendly technologies were critical to address global food loss and waste which totals more than 1.3 billion tonnes a year.

Think Drones are Bad for Wildlife? These Videos May Change Your Mind

Think Drones are Bad for Wildlife? These Videos May Change Your Mind

Lozada, technology manager for The Nature Conservancy in Colorado , knows that many people that increasing drone use will only harass and terrify wild animals.Gustavo Lozada “Many people just want exciting video footage, and don’t think about how it may be affecting animals,” he says.

NIWA UV research reinforces success of Montreal Protocol

NIWA UV research reinforces success of Montreal Protocol

On the eve of the 30th anniversary since the Montreal Protocol came into force, new research by NIWA scientists reinforces its reputation as the world’s most successful environmental treaty.

Quantum Computers Could Be True Randomness Generators

Quantum Computers Could Be True Randomness Generators

In our case, to randomly output a 50-bit string, you can build a quantum circuit that puts 50 qubits, taken together, into a superposition of states that captures the distribution you’d like to re-create.

An Illicit Chemical Is Again Jeopardizing the Ozone Layer

An Illicit Chemical Is Again Jeopardizing the Ozone Layer

Based on data from the Mauna Loa Observatory in Hawaii, the previous study reported new emissions of about 13,000 tons a year of CFC-11 from somewhere in eastern Asia starting in 2012.That was two years after the 2010 date for ending all CFC production under the terms of the Montreal Protocol.

Bluetooth's Complexity Has Become a Security Risk

Bluetooth's Complexity Has Become a Security Risk

"One major reason Bluetooth is involved in so many cases is just how complex this protocol is," says Ben Seri, one of the researchers who discovered BlueBorne and vice president of research at the embedded device security firm Armis.

Holes in 4G and 5G Networks Could Let Hackers Track Your Location

Holes in 4G and 5G Networks Could Let Hackers Track Your Location

"Average consumers are at the risk of exposing their privacy to malicious third parties who sell location data and other private information." With the exception of the Piercer flaws, the vulnerabilities the researchers discovered would need to be fixed above the individual carrier level by the industry group GSMA, which oversees development of mobile data standards including 4G and 5G.

Facebook Messenger Lets You Unsend Now. Why Doesn't Every App?

Facebook Messenger Lets You Unsend Now. Why Doesn't Every App?

(Also note that Facebook apparently did not bother asking those questions when giving the power to Zuckerberg and other company executives.) “With a feature like Remove Message, we wanted to carefully balance flexibility and control with protecting our users from abuse of the feature,” says a Facebook spokesperson.

Be Careful Using Bots on Telegram

Be Careful Using Bots on Telegram

"A bot would dramatically undercut the security properties of a chat." Kenn White, Open Crypto Audit Project But Telegram's bot platform relies instead on the Transport Layer Security protocol used in HTTPS web encryption. While researching one such malware scheme, Forcepoint accidentally discovered that Telegram chats that include bots have reduced security.