US Sanctions on Russia Rewrite Cyberespionage's Rules

US Sanctions on Russia Rewrite Cyberespionage's Rules

Any rule that SolarWinds violates would be a new one, he argues, given that the hacking campaign was by all appearances focused on the kind of cyberespionage US intelligence agencies routinely carry out, with no clear evidence that it was intended to cause disruptive effects.

Respawn’s Apex Legends Is Just Getting Started

Respawn’s Apex Legends Is Just Getting Started

The ping system and redeploy beacons have become, and still are, staples of the FPS genre that other developers (like Activision Blizzard, developers of Overwatch) are eager to bring to their own games, and while Respawn's new methods aren’t always practical from the start (see “heat shields”), they’re consistently rewiring the importance of team communication.

Tracking a Night-Time River of Birds

Tracking a Night-Time River of Birds

© Debbie Leick Into the early 2000’s using a telescope to count birds that flew across the moon was the most common method of nocturnal research.

Outriders Is Grinning Through the Apocalypse

Outriders Is Grinning Through the Apocalypse

Partway through Outriders, the player character—the “Outrider”—is tasked with finding a lieutenant who’s gone missing in one of the sprawling battlefields that cover the fictional planet of Enoch.

It’s Hard to Play a Character Who’s a Dick—but It’s Worth It

It’s Hard to Play a Character Who’s a Dick—but It’s Worth It

It’s clear from the start that Kratos’ wife was the nurturer, and Kratos himself was the sullen, withholding, and emotionally distant father, because when the game begins, he’s downright cruel to Atreus.

Watch Out—That Call of Duty: Warzone Cheat Might Be Malware

Watch Out—That Call of Duty: Warzone Cheat Might Be Malware

They provided a long list of Warzone Cheat Engine variants that installed a host of malware, including a cryptojacker, which uses the resources of an infected gaming computer to surreptitiously mine cryptocurrency .Activision’s analysis said that multiple malware forums have regularly advertised a kit that customizes the fake cheat.

Sneaky New Bacteria on the ISS Could Build a Future on Mars

Sneaky New Bacteria on the ISS Could Build a Future on Mars

In mid-March, NASA researchers announced that they’d found an unknown life-form hiding aboard the International Space Station.As part of an ongoing research project into the microbial life of the ISS, astronauts onboard in 2015 and 2016 swabbed down various parts of the station and sent home the wipes they used.

How to Test Early Betas of Software You Use Every Day

How to Test Early Betas of Software You Use Every Day

Choose to download and install the update, and once your phone restarts again, it'll be running the beta version rather than the standard version of iOS.It's exactly the same if you're on an iPad, except you are of course following the iPadOS and Enroll your iPad links where applicable, instead of the ones related to iOS and iPhones.

Hackers Hosed by Google Were a Counterterrorism Operation

Hackers Hosed by Google Were a Counterterrorism Operation

In an attempt to cut down on the threat posed by browser-related attacks, companies like the internet infrastructure firm Cloudflare are developing a new generation of “browser isolation” tools that keep malicious code from running directly on your computer, while being faster and more usable than past iterations.

Laptop Buying Guide: How to Choose the Right PC (Step-by-Step Guide)

Laptop Buying Guide: How to Choose the Right PC (Step-by-Step Guide)

The first thing we suggest looking at is the processor, also referred to as the chip or the CPU.There are essentially two companies that make laptop processors: Intel and AMD.

Facebook Moves Against ‘Evil Eye’ Hackers Targeting Uyghurs

Facebook Moves Against ‘Evil Eye’ Hackers Targeting Uyghurs

Its cyber espionage investigations team went so far as to trace the Android malware used in the Evil Eye campaigns to two development firms: Beijing Best United Technology Co., Ltd. and Dalian 9Rush Technology Co., Ltd. Facebook says that research from the threat intelligence firm FireEye contributed to its discovery of these connections.

How to Use Apple Music, TV, and iCloud on Non-Apple Devices

How to Use Apple Music, TV, and iCloud on Non-Apple Devices

Speaking of Chromebooks, the Android app will run on these laptops if you need offline syncing and various other features.

Homecoming Queen (and Her Mom) Arrested for Alleged Vote Hacking

Homecoming Queen (and Her Mom) Arrested for Alleged Vote Hacking

This week saw new revelations of election interference, both big and small: On one end of the spectrum, an alleged mother-daughter conspiracy to digitally rig a Florida high school's vote for homecoming queen.

So This Is What We Get After All That #SnyderCut Hype

So This Is What We Get After All That #SnyderCut Hype

Some version survived on the filmmaker's laptop, and a fully reborn, four-hour-long iteration dropped yesterday on HBO Max. Justice League Is a Beautiful Mess of a Franken-Movie.

Wikipedia Is Finally Asking Big Tech to Pay Up

Wikipedia Is Finally Asking Big Tech to Pay Up

The new service is designed for the sale and efficient delivery of Wikipedia's content directly to these online behemoths (and eventually, to smaller companies too).Conversations between the foundation’s newly created subsidiary, Wikimedia LLC, and Big Tech companies are already underway, point-people on the project said in an interview, but the next couple of months will be about seeking the reaction of Wikipedia’s thousands of volunteers.

Strap on a HoloLens and Step Into the AR Conference Room

Strap on a HoloLens and Step Into the AR Conference Room

The second version is sold to enterprise customers—entities ranging from Airbus to automakers to the US Army (which has been a source of some controversy ).If mixed-reality headsets are ever going to be used more widely, a couple of things are going to have to happen: They’ll need killer apps, and the hardware needs to be something that people will actually want to wear on their faces.

The ‘Girl Games’ of the ’90s Were Fun and Feminist

The ‘Girl Games’ of the ’90s Were Fun and Feminist

And so, in October 1996, Mattel Media released Barbie Fashion Designer on CD-ROM.Barbie Fashion Designer “really changed the conversation,” says Yasmin B.Before Barbie, “very few games thought about the play space for girls.”.

The Woman Bulldozing Video Games’ Toughest DRM

The Woman Bulldozing Video Games’ Toughest DRM

Atari used the DRM software SecuROM—also present in hits like BioShock, Mass Effect and Spore—to protect Test Drive Unlimited 2 from pirates, but it kept presenting problems for players trying to buy the game on Steam.Empress found a cracked, or DRM-disabled, version of Test Drive Unlimited 2 thanks to the piracy group Prophet.

Apple Offers Its Closest Look Yet at iOS and MacOS Security

Apple Offers Its Closest Look Yet at iOS and MacOS Security

This year's edition contains significantly expanded information about hardware like M1, new details about the secure enclave, and an accounting of a host of software features.Strafach wants to know more about how M1 chips securely handle booting other operating systems, always a question for jailbreakers when Apple releases new processors.

Malware Is Now Targeting Apple’s New M1 Processor

Malware Is Now Targeting Apple’s New M1 Processor

Longtime Mac security researcher Patrick Wardle published findings on Wednesday about a Safari adware extension that was originally written to run on Intel x86 chips, but has now been redeveloped specifically for M1.

France Ties Russia's Sandworm to a Multiyear Hacking Spree

France Ties Russia's Sandworm to a Multiyear Hacking Spree

But ANSSI's report doesn't mention a supply chain compromise, and DomainTools' Slowik says the intrusions instead appear to have been carried out simply by exploiting internet-facing servers running Centreon's software inside the victims' networks.

Aurora Partners With Toyota on Self-Driving Sienna Taxis

Aurora Partners With Toyota on Self-Driving Sienna Taxis

The company had a partnership with Volkswagen that was supposed to lead to Aurora's technology being incorporated into Volkswagen's vehicles, with plans to launch a self-driving taxi service.Aurora can work with Toyota and Denso to design and build self-driving vehicles, then offer rides via the Uber network.

A Barcode Scanner App With Millions of Downloads Goes Rogue

A Barcode Scanner App With Millions of Downloads Goes Rogue

“It is frightening that with one update an app can turn malicious while going under the radar of Google Play Protect,” Collier wrote.The researcher wrote:No, in the case of Barcode Scanner, malicious code had been added that was not in previous versions of the app.

'Cyberpunk 2077' Maker Was Hit With Ransomware—and Won't Pay Up

'Cyberpunk 2077' Maker Was Hit With Ransomware—and Won't Pay Up

The attackers encrypted some computers and stole data, but CD Projekt Red said it would not pay the ransom and that it was restoring its systems from backups.The incident comes as CD Projekt Red faces months of sustained criticism for its bug-ridden, overhyped Cyberpunk 2077 release.

Government Demands for Amazon Data Shot Up 800 Percent in 2020

Government Demands for Amazon Data Shot Up 800 Percent in 2020

This week, Twitter, Instagram, and TikTok took part in a coordinated action to reclaim hundreds of accounts that had been used to facilitate trading of those ill-gotten handles within the so-called OGUsers community.Google says that it patched a so-called zero-day bug that hackers had been actively exploiting.

There Are Spying Eyes Everywhere—and Now They Share a Brain

There Are Spying Eyes Everywhere—and Now They Share a Brain

Seconds later, a long list of possible leads appeared onscreen, including a lineup of individuals previously arrested in the neighborhood for violent crimes, the home addresses of parolees living nearby, a catalog of similar recent 911 calls, photographs and license plate numbers of vehicles that had been detected speeding away from the scene, and video feeds from any cameras that might have picked up evidence of the crime itself, including those mounted on passing buses and trains.

A Second SolarWinds Hack Deepens Third-Party Software Fears

A Second SolarWinds Hack Deepens Third-Party Software Fears

It now appears that Russia wasn't alone; Reuters reports that suspected Chinese hackers independently exploited a different flaw in SolarWinds products last year at around the same time, apparently hitting the US Department of Agriculture's National Finance Center.

Among Us Taps Into Our Obsession With Betrayal

Among Us Taps Into Our Obsession With Betrayal

In September, a small group of friends convinced me to join them in my first few rounds of Among Us. Developer Innersloth’s game had been virtually inescapable at that point, clogging up every newsfeed on all of my social media apps with fan art, memes, and jokes about the cute little space beans.

Amazon’s Greatest Gadget Hits in the Bezos Era: Kindle, Echo, and More

Amazon’s Greatest Gadget Hits in the Bezos Era: Kindle, Echo, and More

Amazon rarely shares how many devices it has sold, but the numbers are big.In January of this year, Amazon and five big publishers now face a class-action lawsuit for a price fixing scandal of their own (filed by the same law firm as the Apple case, no less).

Helping Birds Adapt to Climate Change in the Nevada Desert

Helping Birds Adapt to Climate Change in the Nevada Desert

AmeriCorp stewardship assistant Brittney Cade (front) leads a team of volunteers in planting trees along the Amargosa River.Planting 100,000 trees – and helping birds adapt to climate change – is just the latest chapter in the rich conservation history of the Amargosa.