The Best Laptop and Tablet Deals for Cyber Monday

The Best Laptop and Tablet Deals for Cyber Monday

Apple's iPads really set the standard here, with excellent battery life and a vast app ecosystem behind them, but the price of Amazon Fire HD devices is so low the software limitations may not bother you.

Opinion: Blocking the Disabled on the Web Means Blocking Innovation

Opinion: Blocking the Disabled on the Web Means Blocking Innovation

Without the inspiration and innovation of two disabled individuals, the digital world likely wouldn’t be what it is today.When Steve Jobs learned about Joybubbles’ work, he was inspired to create his first digital offering to the world.

How to Change the Default Apps on All Your Devices

How to Change the Default Apps on All Your Devices

If you want to go back to the way Windows was when you first installed it—the Mail app for email, Microsoft Edge for web browsing, and so on—click the Reset button underneath the list of default apps.Setting your default web browser is done differently: Open the Apple menu, then choose System Preferences and General .

How Safari and iMessage Have Made iPhones Less Secure

How Safari and iMessage Have Made iPhones Less Secure

"If you want to compromise an iPhone, these are the best ways to do it," says independent security researcher Linus Henze of the two apps.

Why WIRED.com Looks Different Today

Why WIRED.com Looks Different Today

For years, was run by a separate company from WIRED Magazine, and the design looked like we’d copied Craigslist while tripping.That should allow WIRED to continue to thrive and evolve for many years, redesigns, and rogue back-room operations to come.

Colonies of Aggressive, Social Spiders Boom After a Hurricane

Colonies of Aggressive, Social Spiders Boom After a Hurricane

They found that the most aggressive colonies were located in places with the highest historic exposure to cyclones.“There’s clearly some kind of selection going on here for the aggressive individuals in response to these extreme weather events, and that’s what’s really fascinating,” says George Uetz, a spider biologist at the University of Cincinnati.

How Apple Pay Buttons Can Make Websites Less Safe

How Apple Pay Buttons Can Make Websites Less Safe

Maddux has since noticed that Apple has revised its documentation for adding an Apple Pay button to make it less likely that sites will integrate it in this potentially vulnerable way.

How To Clear Out Your Zombie Apps and Online Accounts

How To Clear Out Your Zombie Apps and Online Accounts

Disconnecting third-party apps and services from Facebook, Twitter, and Google usually only takes a click or two from the pages we've just linked to, but bear in mind that this won't actually close down your unused accounts—it just means they can't get into your main accounts quite as easily.

Hack Brief: A Card-Skimming Hacker Group Hit 17K Domains—and Counting

Hack Brief: A Card-Skimming Hacker Group Hit 17K Domains—and Counting

A new report from threat detection firm RiskIQ details how Magecart hackers have found a way to scan Amazon S3 buckets—cloud repositories that hold data and and other backend necessities for sites and companies—for any that are misconfigured to allow anyone with an Amazon Web Services account to not just read their contents, but write to them, implementing whatever changes they want.

Zoom Will Fix the Flaw That Let Hackers Hijack Webcams

Zoom Will Fix the Flaw That Let Hackers Hijack Webcams

On Tuesday afternoon, company CEO Eric Yuan told Leitschuh and other researchers that Zoom would remove the local web server functionality it was using to bypass protections in Safari and facilitate instant meeting joins.

A Zoom Flaw Gives Hackers Easy Access to Your Webcam

A Zoom Flaw Gives Hackers Easy Access to Your Webcam

Zoom patched this DoS issue in a May update but for now is only adjusting its auto-join video settings, giving users a more prominent way of choosing whether their video feed automatically launches when they click a Zoom call link.

How Facial Recognition Is Fighting Child Sex Trafficking

How Facial Recognition Is Fighting Child Sex Trafficking

Tom Simonite covers artificial intelligence for WIRED.Using Amazon’s facial recognition technology, Spotlight quickly returned a list of online sex ads featuring the girl’s photo. Thorn has previously built language processing tools to help law enforcement officers find child abuse content on the dark web.

Google's Push to Close a Major Encrypted Web Loophole

Google's Push to Close a Major Encrypted Web Loophole

Which means that today, when you register a site through Google that uses ".app," ".dev," or ".page," that page and any you build off of it are automatically added to a list that all mainstream browsers, including Chrome, Safari, Edge, Firefox, and Opera, check when they're setting up encrypted web connections.

All the Ways Google Tracks You—And How to Stop It

All the Ways Google Tracks You—And How to Stop It

Both are structured in the same way as Voice & Audio Activity , with options to erase records one by one, a day at a time, or all together via the Delete activity by link, if you click Manage activity .You do have options when it comes to temporarily stopping Google tracking you, as well—staying signed out when using YouTube for example, not signing into Google Chrome, or using incognito mode when searching and browsing in Chrome.

This Spider Uses a Silk Slingshot to Hurl Itself at Prey

This Spider Uses a Silk Slingshot to Hurl Itself at Prey

Plus, it’s likely that because those extra threads are trapping the victim, the spider is able to capture larger prey than it would if it built a more traditional web.

Feds Dismantled the Dark-Web Drug Trade—but It's Already Rebuilding

Feds Dismantled the Dark-Web Drug Trade—but It's Already Rebuilding

Judging by that buzzing trade, there's little hint that just the week before, global law enforcement announced the takedowns of two of the world's largest dark-web drug sites, known as Wall Street Market and Valhalla.

You'll Soon Be Able to Run Linux Apps on Any Chromebook

You'll Soon Be Able to Run Linux Apps on Any Chromebook

According to Google's Crostini page, the system works by running a streamlined version of Linux called Termina inside what's called a virtual machine. Within Termina, you can then run Linux applications inside "containers," which are similar to virtual machines but virtualize only parts of an operating system.

Limit How Long Google Keeps Your Data With This Overdue Setting

Limit How Long Google Keeps Your Data With This Overdue Setting

The feature allows users to set a time limit for Google to retain certain types of data, either three months or 18 months, after which the information is automatically deleted.

The Brave Browser Will Pay You to Surf the Web

The Brave Browser Will Pay You to Surf the Web

Today, ad networks pay sites like for ad space and web browsers like Brave and Chrome deliver content from those publishers to users. Eventually, the company plans to offer a service that will replace any blocked ads on a publisher's site with ads placed by Brave and give those publishers a cut of the ad revenue.

A Top Dark Web Drug Ring Goes Down—Thanks to ATM Withdrawals

A Top Dark Web Drug Ring Goes Down—Thanks to ATM Withdrawals

It took in millions of dollars shipping fentanyl-laced heroin, methamphetamines, and hundreds of thousands of counterfeit Xanax tablets across the US—until the Manhattan district attorney's office shut it down, and arrested the three men who allegedly ran it.

Coding Is for Everyone—as Long as You Speak English

Coding Is for Everyone—as Long as You Speak English

When you put translating code in terms of the billions of the people in the world who don't speak English, access to high-paying jobs and the ability to tinker with your own device is no longer a hypothetical benefit.

HTTPS Isn't Always As Secure As It Seems

HTTPS Isn't Always As Secure As It Seems

Vulnerabilities that are full-on "leaky" involve more deeply flawed encryption channels between browsers and web servers that would enable an attacker to decrypt all the traffic passing through them.

An Android Vulnerability Went Unfixed for Over Five Years

An Android Vulnerability Went Unfixed for Over Five Years

But Toshin points out that attackers could also use the bug to gain inappropriate device access by tricking users into clicking a malicious link that would then open through Android's Instant App feature.

The World Wide Web Turns Thirty. Where Does It Go From Here?

The World Wide Web Turns Thirty. Where Does It Go From Here?

Now too, as the web reshapes our world, we have a responsibility to make sure it is recognised as a human right and built for the public good. This is why the Web Foundation is working with governments, companies and citizens to build a new Contract for the Web .

Android Is Helping Kill Passwords on a Billion Devices

Android Is Helping Kill Passwords on a Billion Devices

Google's Brand points out that under FIDO2, developers will even be able to streamline their mobile browser and local app sign-in infrastructure so a user can set up password-less login on the web, and have that same easy authentication step carry over to the service's app or vice versa.

The Soothing Promise of Our Own Artisanal Internet

The Soothing Promise of Our Own Artisanal Internet

“I don’t know what the Michael Pollan version would be: Eat independent sites, mostly not Facebook?” says Glitch CEO Anil Dash, who helped create some early social web tools 15 years ago at Six Apart and has long argued that tech needs to reintroduce community and user control.

Captain Marvel Has the Best Movie Website Since Space Jam

Captain Marvel Has the Best Movie Website Since Space Jam

“I give them a huge amount of credit,” says Dara-Lynn Weiss, one of the producers who built the Space Jam site in 1996, of the Captain Marvel throwback.

Google Takes Its First Steps Toward Killing the URL

Google Takes Its First Steps Toward Killing the URL

It shouldn’t take advanced knowledge of how the internet works to figure that out." "A key challenge is avoiding flagging legitimate domains as suspicious." Emily Stark, Google Chrome The Chrome team's efforts so far focus on figuring out how to detect and warn users about URLs that seem to deviate in some way from standard practice.

14 of This Week's Best Deals, From the Pixel 3 to iPad Pro

14 of This Week's Best Deals, From the Pixel 3 to iPad Pro

14 of This Week's Best Deals, From the Pixel 3 to iPad Pro Razer Has life become a little meh lately? There's also a 4-Day Best Buy Sale going on if you want to check it out.

Nest Cams Hijacked in the Name of PewDiePie and North Korea Pranks

Nest Cams Hijacked in the Name of PewDiePie and North Korea Pranks

Then they heard a hacker's voice on their Nest cameras saying, "I’m going to kidnap your baby, I’m in your baby’s room." For years, Internet of Things security woes have been epitomized by hackers accessing live feeds from video baby monitors.