How to Get Great Tech Support—From Home

How to Get Great Tech Support—From Home

Thank God. When I left my corporate advertising job to freelance full-time from my home near Philadelphia, I luxuriated in the freedom of being my own boss, but I quickly discovered that some needs can’t be satisfied solo.

The SolarWinds Investigation Ramps Up

The SolarWinds Investigation Ramps Up

Now, after a federal career that many credited with helping to secure the 2020 presidential election from foreign interference, Krebs is venturing into the other massive cybersecurity story of the last year: the Russian hacker intrusion into SolarWinds , a Texas-based company whose software was hijacked and used to penetrate the networks of at least half a dozen federal agencies.

Copyright Law Is Bricking Your Game Console. Time to Fix That

Copyright Law Is Bricking Your Game Console. Time to Fix That

At Replay’d, Harwell’s Boston repair and game shop, one out of every 10 customers brings in a console with a broken optical drive.Next week, with the help of Public Knowledge and our fellow advocates for Right to Repair, iFixit will ask the US Copyright Office to make fixing consoles, along with other software-enabled devices, legal.

AI Can Run Your Work Meetings Now

AI Can Run Your Work Meetings Now

Green and I had been chatting on Headroom, a new video conferencing platform he and cofounder Andrew Rabinovich launched this fall.

5 New Features to Explore in MacOS Big Sur

5 New Features to Explore in MacOS Big Sur

For several years, Apple has been naming its annual software releases after California locales, and this year we're treated to Big Sur. If you want to be technical, it's macOS 11.You get a fresh look, widgets, and a whole lot more.

7 Simple Tech Tips to Keep Your Family Safe This Holiday

7 Simple Tech Tips to Keep Your Family Safe This Holiday

Most of them have auto-updates turned on by default, but it's worth double-checking with family members to make sure they're not putting off an update for whatever reason (a lack of free storage space might be a problem on older devices, or one stalled or failed update may mean no updates since the failed one.).

With Its Own Chips, Apple Aims to Define the Future of PCs

With Its Own Chips, Apple Aims to Define the Future of PCs

Tuesday the company unveiled the first Macs built on a processor, the M1, designed by Apple’s own chip engineers, abandoning the industry’s dominant supplier, Intel.

Why Are Lines at Polling Places So Long? Math

Why Are Lines at Polling Places So Long? Math

In the name of “voter protection,” this team was working with a balky spreadsheet that was supposed to estimate the capacity of a given polling place based on data like how many check-in stations and voting machines it had, and how many people were likely to vote there—the numbers county election workers use to plan for what each station needs so everyone can vote fast.

The Unsinkable Maddie Stone, Google’s Bug-Hunting Badass

The Unsinkable Maddie Stone, Google’s Bug-Hunting Badass

Finding previously undiscovered software bugs and motivating developers to patch them quickly is core to the group’s mission: “Make zero-day hard.” But in 2019, the team broadened its focus beyond just disclosing unique zero-days the researchers found themselves to tracking and studying those that hackers actively exploit in the wild—the exact types of flaws Stone had been stamping out on Android.“The key thing to remember is that the problem we’re working on is not theoretical.

There's No Turning Back on AI in the Military

There's No Turning Back on AI in the Military

The Air Force and Space Force had their own “move 37” moment last month during the first AI-enabled shoot-down of a cruise missile at blistering machine speeds.

To Make Fairer AI, Physicists Peer Inside Its Black Box

To Make Fairer AI, Physicists Peer Inside Its Black Box

Specifically, Pierini has begun simulating proton collisions with an AI algorithm known as a generative adversarial network, or GAN.But physicist Brian Nord of Fermilab uses algorithms derived from facial-recognition technology to identify abnormal-looking galaxies whose light is warped by curved spacetime.

Apple's iOS and iPadOS 14 Have Dropped. Here's What’s New

Apple's iOS and iPadOS 14 Have Dropped. Here's What’s New

The latest version of Apple's mobile operating system, iOS 14, is now available for download, and you'll notice several visual tweaks when you first install it.Notably, your home screen looks very different, with an app library, widgets everywhere, and a new look for Siri.

What to Expect From Tuesday's Apple Event

What to Expect From Tuesday's Apple Event

Apple executives have already warned that this year’s new iPhone would be delayed by a few weeks, into October.Bloomberg has also reported that new Apple Watches are in the works.

Peloton Is Betting You’ll Never Go Back to the Gym

Peloton Is Betting You’ll Never Go Back to the Gym

At one point John Mills and his wife, Erica, were members at three different gyms, where John could lift weights and Erica could take indoor cycling classes.Mills quickly figured out how to cast Peloton classes from the bike’s tablet to the playroom’s giant projector screen, using a native Android streaming option.

Apple Accidentally Approved Malware to Run on MacOS

Apple Accidentally Approved Malware to Run on MacOS

Wardle notified Apple about the rogue software on August 28 and the company revoked the Shlayer notarization certificates that same day, neutering the malware anywhere that it was installed and for future downloads.

ATM Hackers Have Picked Up Some Clever New Tricks

ATM Hackers Have Picked Up Some Clever New Tricks

Criminals have increasingly tuned their malware to manipulate even niche proprietary bank software to cash out ATMs, while still incorporating the best of the classics—including uncovering new remote attacks to target specific ATMs. During Black Hat, Kevin Perlow, the technical threat intelligence team lead at a large, private financial institution, analyzed two cash-out tactics that represent different current approaches to jackpotting.

A Plan to Turn Military Bases Into ‘Sandboxes’ for 5G

A Plan to Turn Military Bases Into ‘Sandboxes’ for 5G

In his Georgetown speech, Kratsios laid out a vision of the US locked in a high-stakes battle with China for supremacy in economic, technological, military, and ideological spheres.

The Pixel 4 Is One of Our Fave Phones, and It's $250 Off

The Pixel 4 Is One of Our Fave Phones, and It's $250 Off

Please also consider subscribing to WIRED .Is the Pixel 4 Right for You. Google has plenty of awesome smart software features too, like Call Screen, which scans calls from unknown numbers to prevent robocalls and spam.

Cheap, Easy Deepfakes Are Getting Closer to the Real Thing

Cheap, Easy Deepfakes Are Getting Closer to the Real Thing

To make them, Tully needed only to gather a few hundred images of Hanks online and spend less than $100 to tune open-source face-generation software to his chosen subject.

Apple’s Hackable iPhones Are Finally Here

Apple’s Hackable iPhones Are Finally Here

Plus, most jailbreaks only work on outdated hardware and old versions of the firmware, Apple argues, because the vulnerabilities used to achieve jailbreaks get patched.iOS-focused security researchers told WIRED on Wednesday that the new devices will be useful in many ways.

Thieves Are Emptying ATMs Using a New Form of Jackpotting

Thieves Are Emptying ATMs Using a New Form of Jackpotting

In previous jackpotting attacks, the attached devices, known in the industry as black boxes, usually invoked programming interfaces contained in the ATM operating system to funnel commands that ultimately reached the hardware component that dispenses cash.

Chinese Hackers Charged in Decade-Long Crime and Spying Spree

Chinese Hackers Charged in Decade-Long Crime and Spying Spree

Dong would research victims and how they might be exploited; Li did the dirty work of compromising the networks and exfiltrating the data.Not to mention a hit list that included multiple videogame and pharmaceutical companies, an educational software firm, Covid-19 research, and hundreds of other victims worldwide.

How to Check Your Devices for Stalkerware

How to Check Your Devices for Stalkerware

Plus, with company-owned phones and laptops, it's always safer to assume you are being monitored.This guide focuses on software designed to be hidden—but remember there are plenty of legitimate parental control apps and built-in tracking tools (like Apple's Find My) that can be used by people in your family or by people who set up your devices.

The Anatomy of a Cisco Counterfeit Shows Its Dangerous Potential

The Anatomy of a Cisco Counterfeit Shows Its Dangerous Potential

The units F-Secure analyzed posed as Cisco Catalyst 2960-X Series switches—trusted devices that connect computers on an internal network to route data between them.In their analysis, the F-Secure researchers found subtle cosmetic differences between the counterfeit devices and a genuine Cisco 2960-X Series switch used for reference.

Kano's New Kids Laptop Is Repairable, Cheap, and Runs Windows

Kano's New Kids Laptop Is Repairable, Cheap, and Runs Windows

Now, thanks in part to a new partnership with Microsoft, Kano is releasing the Kano PC, a cheap, powerful, and repairable Windows laptop aimed at the education market.Microsoft, which has struggled of late against iPads and Chromebooks in the education market, gets a new way to put Windows into schools.

Microsoft Warns of a 17-Year-Old ‘Wormable’ Bug

Microsoft Warns of a 17-Year-Old ‘Wormable’ Bug

On top of all of that, says Check Point's head of vulnerability research Omri Herscovici, the Windows DNS bug can in some cases be exploited with no action on the part of the target user, creating a seamless and powerful attack.

New Mac Ransomware Is Even More Sinister Than It Appears

New Mac Ransomware Is Even More Sinister Than It Appears

In addition to ransomware, ThiefQuest has a whole other set of spyware capabilities that allow it to exfiltrate files from an infected computer, search the system for passwords and cryptocurrency wallet data, and run a robust keylogger to grab passwords, credit card numbers, or other financial information as a user types it in.

NASA’s New Moon-Bound Space Suits Will Get a Boost From AI

NASA’s New Moon-Bound Space Suits Will Get a Boost From AI

PTC’s software combines several different approaches to AI, like generative adversarial networks and genetic algorithms.A generative adversarial network is a game-like approach in which two machine-learning algorithms face off against one another in a competition to design the most optimized component.

Amazon Touts AI for Social Distancing Amid Worker Complaints

Amazon Touts AI for Social Distancing Amid Worker Complaints

When a reviewer sees cause for concern in a photo, they include the details in a regular report sent to building managers that summarizes recent social distancing violations in their facility.

A Legion of Bugs Puts Hundreds of Millions of IoT Devices at Risk

A Legion of Bugs Puts Hundreds of Millions of IoT Devices at Risk

Israeli security firm JSOF revealed on Tuesday a collection of vulnerabilities it's calling Ripple20, a total of 19 hackable bugs it has identified in code sold by a little known Ohio-based software company called Treck, a provider of software used in internet-of-things devices.