The Tweets That Got Trump Banned Were Far From His Worst

The Tweets That Got Trump Banned Were Far From His Worst

On Friday night, with just 12 days left in his presidency and two days after a mob of his supporters stormed the US Capitol, leading to several deaths, Twitter said it had permanently suspended Trump’s account “due to the risk of further incitement of violence.” The pair of tweets that did him in, however, wouldn't even crack his thousand most egregious:.

Ransomware Is Headed Down a Dire Path

Ransomware Is Headed Down a Dire Path

At the end of September, an emergency room technician in the United States gave WIRED a real-time account of what it was like inside their hospital as a ransomware attack raged .

Russia's SolarWinds Hack Is a Historic Mess

Russia's SolarWinds Hack Is a Historic Mess

But because the SolarWinds hack was what's known as a "supply chain" attack, in which Russia compromised a trusted tool rather than using known malware to break in, Einstein failed spectacularly.

Ransomware Hits Dozens of Hospitals in an Unprecedented Wave

Ransomware Hits Dozens of Hospitals in an Unprecedented Wave

The US government alert lays out recommendations and best practices for how hospitals can protect themselves, and private firms like Mandiant have been sharing "indicators of comprise" as well, so health care facilities can monitor their systems extra closely and try to head off potential attacks.

Your Car Is Spewing Microplastics That Blow Around the World

Your Car Is Spewing Microplastics That Blow Around the World

Now that scientists know the Arctic is laced with microplastics blown in from Europe, and now that this new work has modeled that route of transport in fine detail, they are concerned that synthetic particles might be darkening snow and ice, accelerating melting.

In Minneapolis, Neighbors Are Mobilizing—Offline

In Minneapolis, Neighbors Are Mobilizing—Offline

That morning, Minnesota Governor Tim Walz had claimed during a press conference that highly-organized outside groups, including white supremacists and drug cartels, were believed to be part of the protests that had turned violent in South Minneapolis, leaving hundreds of buildings damaged and burned in recent days.

The Nigerian Fraudsters Ripping Off the Unemployment System

The Nigerian Fraudsters Ripping Off the Unemployment System

The email security firm Agari today will release findings that an actor within the Nigerian cybercriminal group "Scattered Canary" is filing fraudulent unemployment claims and receiving benefits from multiple states, while also receiving CARES payouts from the Internal Revenue Service.

The Covid-19 Pandemic Reveals Ransomware's Long Game

The Covid-19 Pandemic Reveals Ransomware's Long Game

New research from Microsoft shows that ransomware attackers are actively making that crisis worse, forcing health care and critical infrastructure organizations to pay up when they can least afford downtime.The Microsoft researchers often observed attackers getting their initial network access by exploiting unpatched vulnerabilities in victims' web infrastructure.

The 2020 Election Shows the Techlash Has Only Gone So Far

The 2020 Election Shows the Techlash Has Only Gone So Far

Elizabeth Warren, who has been criticizing monopolistic corporations for years, trained her fire on Silicon Valley early last year with an audacious plan to break up Big Tech , a call that Bernie Sanders joined.

Please Stop Sending Terrifying Alerts to My Cell Phone

Please Stop Sending Terrifying Alerts to My Cell Phone

Blue Alerts are mass notifications, now used in 35 states, that are sent to mobile phones and flashed on electronic highway signs when a suspect on the loose is thought to be an “imminent and credible threat to law enforcement.” The hope is that pinging the public will lead to tips for the police, and then a speedier capture.

The Decade Big-Money Email Scams Took Over

The Decade Big-Money Email Scams Took Over

"For a long time cybercriminals believed that the money was within the masses," says Crane Hassold, senior director of threat research at the email security firm Agari and former digital behavior analyst for the Federal Bureau of Investigation.

Acidifying Oceans Could Eat Away at Sharks' Skin and Teeth

Acidifying Oceans Could Eat Away at Sharks' Skin and Teeth

They found that on average, a quarter of the denticles on the sharks in acidic water were damaged, compared to 9.2 percent on the controls.

Silicon Valley Cynicism in the Age of Trump and Zuckerberg

Silicon Valley Cynicism in the Age of Trump and Zuckerberg

To Trump and Facebook alike, any attempt to push back, whether from politicians or the press, is treated as an existential threat.

7 Cybersecurity Threats That Can Sneak Up on You

7 Cybersecurity Threats That Can Sneak Up on You

The right browser extensions are able to add useful functionality and features to your daily window on the web, but these add-ons need to be vetted like any other piece of software—after all, they have the privilege of being able to see everything you're doing online, if they want to.

The Desperate Race to Neutralize a Lethal Superbug Yeast

The Desperate Race to Neutralize a Lethal Superbug Yeast

C. auris has been diagnosed in patients in more than 30 countries on six continents, and when investigators talk about it, they use ominous phrases such as “pandemic potential.” (At an international conference last year, the head of fungal studies at the CDC described the super-yeast as “more infectious than Ebola.”).

Hackers Are Poking at a MacOS Flaw Apple Left Unfixed

Hackers Are Poking at a MacOS Flaw Apple Left Unfixed

According to Cavallarin, Apple said it would fix the problem by mid-May. When the company still hadn’t done so by the time a standard 90-day disclosure deadline had passed, Cavallarin went public, publishing a full description and proof-of-concept code on May 24.

How Not To Prevent a Cyberwar With Russia

How Not To Prevent a Cyberwar With Russia

"The idea that we can use cyber offense capabilities to impose sabotage-like effects, and to do so in increasingly large scale and costly ways until they get it through their head that they can’t win, I don’t think that's going to work," says Tom Bossert, who served as White House homeland security advisor and the president's most senior cybersecurity-focused official until April of last year .

The Highly Dangerous 'Triton' Hackers Have Probed the US Grid

The Highly Dangerous 'Triton' Hackers Have Probed the US Grid

or E-ISAC, and the critical infrastructure security firm Dragos have been tracking a group of sophisticated hackers carrying out broad scans of dozens of US power grid targets, apparently looking for entry points into their networks.

The Grid Might Survive an Electromagnetic Pulse Just Fine

The Grid Might Survive an Electromagnetic Pulse Just Fine

The study by the Electric Power Research Institute, a utility-funded research organization, finds that existing technology can protect various components of the electric grid to buffer it from the effects of solar flares, lightning strikes, as well as an EMP from a nuclear blast, all at the same time.

The Case Against Watching the Rest of Game of Thrones

The Case Against Watching the Rest of Game of Thrones

Fans have been waiting years for the living to confront the Night King on Game of Thrones . All along, Martin's series The Song of Ice and Fire , on which the show is based, has driven home the point that the battle for the Iron Throne is a game.

Captain Marvel Has a Very Important Message About Skrulls

Captain Marvel Has a Very Important Message About Skrulls

The first two acts of the movie may set them up as the enemies, and Captain Marvel's Kree as the saviors, but the third act flips that dangerous assumption entirely. (Kree, even with their blue skin, still look more human than Skrulls do.) Or do we side with the people who are forced into hiding?

Machine Learning Can Use Tweets To Spot Critical Security Flaws

Machine Learning Can Use Tweets To Spot Critical Security Flaws

Researchers at Ohio State University, the security company FireEye, and research firm Leidos last week published a paper describing a new system that reads millions of tweets for mentions of software security vulnerabilities, and then, using their machine-learning-trained algorithm, assessed how much of a threat they represent based on how they're described.

Trump Can’t Make a North Korea Deal on His Own

Trump Can’t Make a North Korea Deal on His Own

And while he acknowledges that tensions between Kim and Trump may have escalated to such a dangerous point last summer—thanks in no small part to Trump’s own rhetoric—that a shotgun summit in Singapore was needed, he and others argue that it’s not a viable process for substantive change.

Star Wars News: Is 'Episode IX' Called 'Balance of the Force'?

Star Wars News: Is 'Episode IX' Called 'Balance of the Force'?

The Real Deal: Speaking of Episode IX spoilers on Reddit, someone on there shared what looked like costume reference and concept artwork and photos for new and returning characters, including Kylo Ren wearing a repaired helmet, a new robot to cause trouble for BB-8, and the first glimpse of Old Lando Calrissian, wearing an outfit not unlike something that Donald Glover was wearing in Solo: A Star Wars Story .

What Is Credential Stuffing?

What Is Credential Stuffing?

Credential stuffing attacks also can't try massive numbers of logins on a site with all the tries coming from the same IP address, because web services have basic rate-limiting protections in place to block floods of activity that could be destabilizing.

The Threat That the US Can't Ignore: Itself

The Threat That the US Can't Ignore: Itself

"ISIS very likely will continue to pursue external attacks from Iraq and Syria against regional and Western adversaries." Dan Coats, Director of National Intelligence The hearing instead focused on questions from senators about anti-terrorism efforts, nuclear proliferation, infrastructure hacking, and foreign intelligence and counter-intelligence-gathering.

George Soros Attacks China's AI Push as 'Mortal Danger'

George Soros Attacks China's AI Push as 'Mortal Danger'

“I want to call attention to the mortal danger facing open societies from the instruments of control that machine learning and artificial intelligence can put in the hands of repressive regimes,” Soros said.

The Year Cryptojacking Ate the Web

The Year Cryptojacking Ate the Web

For example, the cloud monitoring and defense firm RedLock said in February that Tesla's Amazon Web Services cloud infrastructure was running mining malware thanks to an inconspicuous, but extensive cryptojacking campaign.

Nationwide Bomb Threats Look Like a New Spin on an Old Bitcoin Scam

Nationwide Bomb Threats Look Like a New Spin on an Old Bitcoin Scam

Nationwide Bomb Threats Look Like a New Spin on an Old Bitcoin ScamEduardo Munoz Alvarez/Getty ImagesIn offices and universities all across the country Thursday, the same threat appeared in email inboxes: Pay $20,000 worth of bitcoin, or a bomb will detonate in your building.

Thousands of Unstudied Plants May Be at Risk of Extinction

Thousands of Unstudied Plants May Be at Risk of Extinction

Other regions, they found, like the fog-nurtured biome hugging the southern coast of the Arabian peninsula, harbored a large number of potentially threatened species that hadn’t received nearly as much attention.IUCN ratings aren’t the end-all-be-all of conservation assessment; but they do have bearing on which areas are protected as biodiversity hotspots abroad, and are fed into databases that extractive industries use for reducing threats to endangered species as they work.