Guide explores the benefits of combating marine biofouling

Guide explores the benefits of combating marine biofouling

GloFouling Project Technical Analyst John Alonso, based in London, said the guide developed in partnership with NIWA will help each country deliver an economic analysis to understand the potential benefits of a policy to prevent or manage invasive aquatic species introduced by biofouling.

The positives of Wellington’s wet weather: marine pest control

The positives of Wellington’s wet weather: marine pest control

Marine scientists from NIWA have been on the hunt for high-risk invasive species as part of their latest biosecurity survey, designed to detect marine animals and plants that come in from overseas.

US Wins Appeal to Extradite Julian Assange

US Wins Appeal to Extradite Julian Assange

In the good news department, Microsoft this week said it seized domains used by a Chinese hacking group , the latest in a series of actions by the company that have cumulatively resulted in over 10,000 sites being taken down.

The Best Discord Bots for Your Server

The Best Discord Bots for Your Server

MEE6 facilitates moderation, custom commands (like answering frequently asked questions), and creating polls and can log activity on a Discord server relevant to moderators.For a premium fee of $12 per month, MEE6 offers more advanced custom commands (like letting you know when a streamer is live on Twitch) and moderation capabilities.

FAO - News Article: Food security and water security go hand-in-hand

FAO - News Article: Food security and water security go hand-in-hand

The Director-General spoke at a high-level launch of the report "2021 State of Climate Services: Water" led by World Meteorological Organization (WMO) featuring inputs from FAO experts.

Why James Bond Doesn’t Use an iPhone

Why James Bond Doesn’t Use an iPhone

“Pegasus spyware would no doubt be used by adversaries to target James Bond if he were an iPhone user,” says Moore.

Hundreds of Scam Apps Hit Over 10 Million Android Devices

Hundreds of Scam Apps Hit Over 10 Million Android Devices

The techniques are common in malicious Play Store apps, and premium SMS fraud in particular is a notorious issue.But the researchers say it's significant that attackers were able to string these known approaches together in a way that was still extremely effective—and in staggering numbers—even as Google has continuously improved its Android security and Play Store defenses.

Everything Amazon Announced—Including a Cute Security Robot

Everything Amazon Announced—Including a Cute Security Robot

You’ll get professional monitoring, backup internet on all Ring devices, access to the Alexa Guard Plus helpline, and more robust online security using Eero Secure.Photograph: AmazonWorking with The Home Depot, Ring's new JobSite Security bundle aims to make it easier to monitor job sites.

Cloudflare Is Taking a Shot at Email Security

Cloudflare Is Taking a Shot at Email Security

“I think what I had assumed is that hosting providers like Google and Microsoft and Yahoo were going to solve this issue, so we weren’t sure there was anything for us to do in the space,” Prince says.

How to Go Passwordless on Your Microsoft Account

How to Go Passwordless on Your Microsoft Account

You can replace your Microsoft account password with a code from the Microsoft Authenticator app, the Windows Hello biometric login system (usually facial or fingerprint recognition), a physical security key that you keep with you, or a verification code sent via email or text.

Security News This Week: Even the CIA and NSA Use Ad Blockers to Stay Safe Online

Security News This Week: Even the CIA and NSA Use Ad Blockers to Stay Safe Online

Attackers who try to run malicious ads on unscrupulous ad networks or taint legitimate-looking ads can steal data or sneak malware onto your device if you click, or sometimes by exploiting web vulnerabilities.

He Escaped the Dark Web's Biggest Bust. Now He's Back

He Escaped the Dark Web's Biggest Bust. Now He's Back

AlphaBay's dark web site is now accessible not only via Tor, like the original AlphaBay, but also I2P, a less popular anonymity system that DeSnake encourages users to switch to.

Ransomware Isn't Back. It Never Left

Ransomware Isn't Back. It Never Left

White House deputy national security adviser Anne Neuberger even noted at the beginning of August that BlackMatter—an apparent successor to Darkside with technical similarities—had committed to avoid critical infrastructure targets in its attacks.

The iOS 15 Privacy Settings You Should Change Right Now

The iOS 15 Privacy Settings You Should Change Right Now

The technology has moved on in the past four years and with iOS 15 Apple is giving the option to hide your IP address from trackers.

AI Can Write Code Like Humans—Bugs and All

AI Can Write Code Like Humans—Bugs and All

Alex Naka, a data scientist at a biotech firm who signed up to test Copilot, says the program can be very helpful, and it has changed the way he works.Despite such flaws, Copilot and similar AI-powered tools may herald a sea change in the way software developers write code.

Former US Intelligence Operatives Admit They Hacked for UAE

Former US Intelligence Operatives Admit They Hacked for UAE

India May Have Used US-Company's Tech in Hacking SpreeBased in Austin, Texas, Exodus Intelligence is a so-called zero day broker, a firm that sells information about vulnerabilities in software that the developers don't know about—and therefore can't fix—and the exploits required to compromise them.

You Can Now Ditch the Password on Your Microsoft Account

You Can Now Ditch the Password on Your Microsoft Account

"I remember it was 2017 and we started talking about what if instead of improving multifactor authentication we change course to just eliminate passwords," says Microsoft chief information security officer Bret Arsenault.

It’s a Good Day to Update All Your Devices. Trust Us

It’s a Good Day to Update All Your Devices. Trust Us

But if you haven’t, today is an especially good day to be on top of it, because Apple, Google, and Microsoft have all pushed security fixes in the past two days for vulnerabilities that hackers are actively exploiting.

What Is Zero Trust? It Depends What You Want to Hear

What Is Zero Trust? It Depends What You Want to Hear

Under the old model, all the computers, servers, and other devices physically in an office building were on the same network and trusted each other.Once an attacker slipped by those perimeter defenses, remotely or by physically infiltrating an organization, the network would instantly grant them a lot of trust and freedom.

The Biggest DDoS Attack in History Hit Russian Tech Giant Yandex

The Biggest DDoS Attack in History Hit Russian Tech Giant Yandex

The Russian tech giant Yandex said this week that in August and September it was hit with the internet's largest-ever recorded distributed denial-of-service or DDoS attack.

WhatsApp Fixes Its Biggest Encryption Loophole

WhatsApp Fixes Its Biggest Encryption Loophole

It’s a complex solution to a longstanding issue, and one that sets a precedent for companies that don’t want to rely quite so extensively on the security of the world’s handful of dominant cloud providers .“We’ve been working on this problem for many years and to build this, we had to develop an entirely new framework for key storage and cloud storage that can be used across the world’s largest operating systems,” says WhatsApp product manager Calvin Pappas.

BrakTooth Flaws Affect Billions of Bluetooth Devices

BrakTooth Flaws Affect Billions of Bluetooth Devices

The latest version, demonstrated this week, comes in new formats like Lightning to USB-C and USB-C to USB-C, has a wider range, and introduces geofencing features.

Apple Backs Down on Its Controversial Photo-Scanning Plans

Apple Backs Down on Its Controversial Photo-Scanning Plans

“Last month we announced plans for features intended to help protect children from predators who use communication tools to recruit and exploit them, and limit the spread of Child Sexual Abuse Material,” the company said in statement Friday.

6 Things You Need to Do to Prevent Getting Hacked

6 Things You Need to Do to Prevent Getting Hacked

Even if you do have a password that’s easy to guess (we’ll get to that shortly), an attacker is unlikely to get access to an account with multi-factor authentication turned on unless they have your phone.

California Man Stole 620,000 iCloud Photos in Search of Nudes

California Man Stole 620,000 iCloud Photos in Search of Nudes

Razer said it's going to vix the vulnerability, but it speaks to broader concerns around similar software that relies on the Windows "plug-and-play" set-up.📩 The latest on tech, science, and more: Get our newsletters !When the next animal plague hits, can this lab stop it.

The Stealthy iPhone Hacks That Apple Still Can't Stop

The Stealthy iPhone Hacks That Apple Still Can't Stop

Apple hasn't issued a fix for this particular vulnerability and corresponding attack, dubbed “Megalodon” by Amnesty International and “ForcedEntry” by Citizen Lab. An Apple spokesperson told WIRED that it intends to harden iMessage security beyond BlastDoor, and that new defenses are coming with iOS 15, which will likely come out next month.

38M Records Were Exposed Online—Including Contact-Tracing Info

38M Records Were Exposed Online—Including Contact-Tracing Info

More than a thousand web apps mistakenly exposed 38 million records on the open internet, including data from a number of Covid-19 contact tracing platforms, vaccination sign-ups, job application portals, and employee databases.

100 Million More IoT Devices Are Exposed—and They Won’t Be the Last

100 Million More IoT Devices Are Exposed—and They Won’t Be the Last

Dubbed Name:Wreck, the newly disclosed flaws are in four ubiquitous TCP/IP stacks, code that integrates network communication protocols to establish connections between devices and the internet.

How to Log In to Your Devices Without Passwords

How to Log In to Your Devices Without Passwords

Screenshot: Microsoft via David NieldWindows Hello is the name Microsoft gives you password-free access to your computer: It can include facial recognition via a webcam, fingerprint scanning via a sensor, and the use of a short PIN code.

The Opportunities—and Obstacles—for Women at NSA and Cyber Command

The Opportunities—and Obstacles—for Women at NSA and Cyber Command

Inequalities persist, but three senior-level women at the National Security Agency and Cyber Command offered WIRED rare insights into how those organizations have evolved—and the hard work that remains to be done.