China Hijacked an NSA Hacking Tool in 2014—and Used It for Years

China Hijacked an NSA Hacking Tool in 2014—and Used It for Years

More than four years after a mysterious group of hackers known as the Shadow Brokers began wantonly leaking secret NSA hacking tools onto the internet, the question that debacle raised—whether any intelligence agency can prevent its "zero-day" stockpile from falling into the wrong hands —still haunts the security community.

Researchers Are Studying These Worm Blobs to Build Robots

Researchers Are Studying These Worm Blobs to Build Robots

“If you take a blob of these worms and you hold them in your hand, they behave like Silly Putty and they flow through your fingers,” says Saad Bhamla, assistant professor of chemical and biomolecular engineering at Georgia Tech.

Want to Write a Book This Year? These Tools Can Help

Want to Write a Book This Year? These Tools Can Help

You kind of have to work on them, brainstorming different ideas, doing research, and taking notes before you can really get started.Both writers stressed that what tool you use for taking notes doesn’t matter as much as the act of doing it.

Bike Hacking 101: Learn to Maintain and Upgrade Your Ride

Bike Hacking 101: Learn to Maintain and Upgrade Your Ride

The company’s new Home Mechanic Starter Kit ($160) offers 15 basic tools and products that beginners need to clean, maintain, and repair their bikes.Added bonus: The tools come in their own box and, best of all, it includes a copy of the Big Blue Book of Bicycle Repair.

How We Came to Live in a Split-Screen Reality

How We Came to Live in a Split-Screen Reality

“When I saw the split screen,” O’Donnell said later in a video on her website, “I knew it was over.”.While reaction videos cleave an artwork into its substance and its effects, the split screen is also being used on social media for the purposes of political activism.

Apple's T2 Security Chip Has an Unfixable Flaw

Apple's T2 Security Chip Has an Unfixable Flaw

A recently released tool is letting anyone exploit an unusual Mac vulnerability to bypass Apple's trusted T2 security chip and gain deep system access.

A China-Linked Group Repurposed Hacking Team’s Stealthy Spyware

A China-Linked Group Repurposed Hacking Team’s Stealthy Spyware

The malware the Kaspersky researchers discovered uses its UEFI foothold to plant a second, more traditional piece of spyware on the computer's hard drive, a unique piece of code Kaspersky has called MosaicRegressor.

FAO - News Article: Google and FAO launch new Big Data tool for all

FAO - News Article: Google and FAO launch new Big Data tool for all

Earth Map has also been designed to empower and provide integrative synergies with the federated FAO's Hand-in-Hand geospatial platform , a more comprehensive tool to provide Members, their partners and donors with the means to identify and execute highly-targeted rural development initiatives with multiple goals ranging from climate adaptation and mitigation to socio-economic resilience.

How VR—and Marvel Superheroes—Might Elicit Empathy

How VR—and Marvel Superheroes—Might Elicit Empathy

After watching up close as a woman is sexually harassed in her place of work, you might gain more understanding of the power imbalance between genders.The goal of Messy Truth is to immerse viewers in situations where they normally would not find themselves because of their gender, their race, or where they live.

The NSA and FBI Expose Fancy Bear's Sneaky Hacking Tool

The NSA and FBI Expose Fancy Bear's Sneaky Hacking Tool

The attack has some important limitations, but it's a good reminder that modern telephony still has more than its share of security holes—and 5G isn't looking that much better .Crooks Use 'Russian SIMs' to Outfox Law EnforcementMotherboard this week took a deep dive down the rabbit hole of Russian SIMs, also known as white SIMs, that let criminals spoof phone numbers at will, or in some cases allow for real-time voice manipulation.

DoNotPay Unsubscribes You From Spam—and Tries to Get You Paid

DoNotPay Unsubscribes You From Spam—and Tries to Get You Paid

If you forward a message to the antispam tool and then keep getting emails from the same entity, the service will take the hallmark DoNotPay approach and automatically help you sue the spammer in small-claims court for up to $500 under the CAN-SPAM Act .

Google Chrome Is Getting a Bunch of New Privacy Features

Google Chrome Is Getting a Bunch of New Privacy Features

"Chrome checks the URL of each site you visit or file you download against a local list, which is updated approximately every 30 minutes," Google explains in a blog post about the new setting.

What to Do If You (or a Loved One) Might Have Covid-19

What to Do If You (or a Loved One) Might Have Covid-19

The first thing you should do is check to make sure your symptoms match what we know about Covid-19.These symptoms are not commonly associated with Covid-19.Runny Nose (except in some children)Sneezing.

Space Photos of the Week: Rovers Taking Selfies—for Science

Space Photos of the Week: Rovers Taking Selfies—for Science

And one of the very first things NASA does when a spacecraft lands on another planet is to have it take a selfie: “Let me see your wheels in the dirt so I know you got there safely.” Or “Snap a photo of your solar panels so we can see how dirty they are.” A simple selfie can tell a science team if an instrument is broken, say, or how close it might be to an object.

Windows 10 Has a Security Flaw So Severe the NSA Disclosed It

Windows 10 Has a Security Flaw So Severe the NSA Disclosed It

In fact, Neuberger said that disclosing the code verification bug to Microsoft and the public is part of a new NSA initiative in which the agency will share its vulnerability findings more quickly and more often.

The Firefox Browser Settings You Should Tweak Right Now

The Firefox Browser Settings You Should Tweak Right Now

Open the Firefox menu and choose Customize ; from there, you can drag and drop shortcuts to certain features—including edit tools, your browsing history, and private browsing—into the toolbar, so they're always available to you.

It's Now Easy to Shift Facebook Pics to Google (in Europe Anyway)

It's Now Easy to Shift Facebook Pics to Google (in Europe Anyway)

The data-moving tool has been created as a result of the Data Transfer Project (DTP), which was set up in 2018 and is a collaboration between the world's biggest tech companies: Apple, Facebook, Google, Microsoft , and are the group's key members.

Floodplains: Protecting & Restoring an Overlooked Ecosystem

Floodplains: Protecting & Restoring an Overlooked Ecosystem

A new tool developed by The Nature Conservancy provides answers, using a research-based approach to help agencies, communities and other stakeholders obtain the information they need to prioritize floodplain protection and restoration.

A Twitter #Fartgate, A Google Dream's Death, and More News From Today

A Twitter #Fartgate, A Google Dream's Death, and More News From Today

Within 12 minutes the clip was up on Twitter, and for a little while the internet came together to ignore the terrifying news cycle and gather 'round the great unifier: the objective hilarity of a fart.

Amazon Cracks Down on Third-Party Apps Over Privacy Violations

Amazon Cracks Down on Third-Party Apps Over Privacy Violations

To streamline their operations, many sellers rely on specialized business apps that tap into the Amazon Marketplace Web Service APIs, which can integrate data including sensitive customer information like names, emails, and delivery addresses.

Facebook’s New Privacy Feature Comes With a Loophole

Facebook’s New Privacy Feature Comes With a Loophole

Erin Egan, Facebook’s chief privacy officer, and David Baser, the director of product management, noted in a blog post that the new tool “could have some impact” on Facebook’s business, but that “giving people control over their data is more important.”.

How Facebook Catches Bugs in Its 100 Million Lines of Code

How Facebook Catches Bugs in Its 100 Million Lines of Code

So four years ago, Facebook engineers began building a customized assessment tool that not only checks for known types of bugs but can fully scan the entire codebase in under 30 minutes—helping engineers catch issues in tweaks, changes, or major new features before they go live.

To Help Migrants at the Border, Aid Groups Deploy Tech

To Help Migrants at the Border, Aid Groups Deploy Tech

It’s unfair,” says Ian Philabaum, a program director at Immigration Law Lab. Of the nearly 1 million asylum cases waiting to be heard, about 74 percent are for people coming from El Salvador, Guatemala, Honduras, and Mexico.

New Zealand to have world-leading hazard risk modelling tool

New Zealand to have world-leading hazard risk modelling tool

EQC, GNS Science and NIWA have joined forces to further develop world-leading natural hazards risk modelling for New Zealand. Mr Morgan said the new partnership will broaden use of RiskScape to include more government, council and infrastructure company users, enabling more people to get a better understanding of the potential costs of natural hazards.

Myspace Employees Used to Spy on Users

Myspace Employees Used to Spy on Users

Motherboard reports week that in the golden age of Myspace, employees had access too and abused an administrative tool called Overlord.

These Cities Will Track Scooters to Get a Handle on Regulation

These Cities Will Track Scooters to Get a Handle on Regulation

On Tuesday, 15 cities, including New York, Los Angeles, Chicago, Miami, San Francisco, and Bogota, Colombia, said they’ve created a nonprofit called the Open Mobility Foundation, devoted to collecting, maintaining, and standardizing information about where shared vehicles—including cars, scooters, jet packs, and bicycles—are parked.

Google Turns to Retro Cryptography to Keep Datasets Private

Google Turns to Retro Cryptography to Keep Datasets Private

"The net result is that we can perform this computation without exposing any individual data and only getting the aggregate result," says Amanda Walker, a privacy tools and infrastructure engineering manager at Google.

Mapping Conservation & History on the Kokoda Track

Mapping Conservation & History on the Kokoda Track

Eighty years later, a Nature Conservancy scientist is creating a 3-D map of the Kokoda Track to help both preserve the site’s military history and protect the surrounding forest’s biodiversity and watershed services.

Cellebrite Now Says It Can Unlock Any iPhone for Cops

Cellebrite Now Says It Can Unlock Any iPhone for Cops

Cellebrite, too, has likely possessed the ability to unlock iOS 12.3 devices prior to this announcement, says Dan Guido, the founder of the New York-based security firm Trail of Bits and a longtime iOS-focused security researcher.

Want to bring transit-oriented development to your city? There’s a toolkit for that!

Want to bring transit-oriented development to your city? There’s a toolkit for that!

Let’s say you are a transport specialist or an urban planner who wants to implement a transit-oriented development plan, because you know that TOD, as a planning and design strategy, can help transform your city.