Economy
-
Excerpt: How Google bought Android—according to folks in the room
Androids: The team that built the Android operating system is a new book from longtime Android engineer Chet Haase. Haase…
Read More » -
Leaked voting machine BIOS passwords implicate Q-friendly county clerk
Enlarge / Sensitive BIOS passwords leaked by QAnon figure Ron Watkins have been linked to a Colorado County office run…
Read More » -
Hackers siphon $600 million in digital tokens, crypto network says
Enlarge (credit: RobertAx | Getty Images) A decentralized financial network has claimed hackers absconded with about $600 million worth of…
Read More » -
AT&T delays 500,000 fiber-to-the-home builds due to severe fiber shortage
Enlarge / An AT&T technician working on a fiber project. (credit: AT&T) AT&T says that supply-chain shortages will delay fiber…
Read More » -
New “Glowworm attack” recovers audio from devices’ power LEDs
This three-minute video outlines how Glowworm works and gives examples of optically recovered audio. Researchers at Ben-Gurion University of the…
Read More » -
Paragon is working to get its ntfs3 filesystem into the Linux kernel
Enlarge / Your hard drives and SSDs aren’t any better than the filesystem you format them with. Paragon’s ntfs3 driver…
Read More » -
Apple explains how iPhones will scan photos for child-sexual-abuse images
Enlarge (credit: Getty Images | Oscar Wong) Shortly after reports today that Apple will start scanning iPhones for child-abuse images,…
Read More » -
Apple plans to scan US iPhones for child abuse imagery
Enlarge / The 2020 iPhone lineup. From left to right: iPhone 12 Pro Max, iPhone 12 Pro, iPhone 12, iPhone…
Read More » -
SpaceX previews ruggedized Starlink dish for vehicles, ships, and aircraft
Enlarge (credit: SpaceX) SpaceX says that Starlink user terminals for moving vehicles will be ruggedized to withstand “harsh environments” with…
Read More » -
Critical Cobalt Strike bug leaves botnet servers vulnerable to takedown
Enlarge / You did a bad bad thing. (credit: Getty Images) Governments, vigilantes, and criminal hackers have a new way…
Read More »