The lawsuits come after a Motherboard investigation showed AT&T, Sprint, and T-Mobile sold phone location data that ended up with bounty hunters, and The New York Times covered an instance of Verizon selling data. | Continue reading
Hackers are trying a novel approach to extort developers of some money. | Continue reading
The story of the PDF, the file format that’s become one of the internet’s defining information tools. It’ll be with us after we’re long gone. | Continue reading
The bill would have been the first in North America to empower average people to repair their own devices. | Continue reading
The demands are the latest move to pressure telecom companies, who said they would stop the sale of location data to third parties after Motherboard’s coverage. | Continue reading
An Apple lobbyist brought an iPhone to meetings with California lawmakers and said consumers could hurt themselves by puncturing a lithium-ion battery. | Continue reading
In worst case scenarios, nearly half of these protected glaciers would disappear by the end of the century. | Continue reading
American consumers pay some of the highest prices in the world for 4G mobile data. Don’t expect that to change with 5G. | Continue reading
The data was stolen from Citycomp, which provides internet infrastructure for dozens of companies including Oracle, Airbus, Toshiba, and Volkswagen. | Continue reading
Earlier this month, Motherboard revealed that Microsoft's email services were compromised. Multiple victims now say that hackers stole their cryptocurrency. | Continue reading
We talked to the Norwegian marine biologist who freed a beluga whale from a harness that said "Equipment of St. Petersburg." | Continue reading
With access to the source code, a group of dedicated fans is now tinkering with the Zork Implementation Language (ZIL). | Continue reading
Docker Hub lost keys and tokens for around 190,000 accounts, which could have downstream effects if hackers used them to access source code at big companies. | Continue reading
A big ‘ol sphere of nothingness 1.8 billion light years across might explain a longstanding mystery about the formation of the universe—but its existence is a mystery in itself. | Continue reading
Voat founder Justin Chastain said that a “US agency” had contacted the platform, allegedly over threats on the website. | Continue reading
If you're sick of MacBooks but love MacOS, be brave and convert a new laptop into a Hackintosh with our exhaustive guide. | Continue reading
As Slack prepares to go public, the company is warning potential investors that it's a target for malicious attacks from “sophisticated organized crime, nation-state, and nation-state supported actors,” according to an SEC filing published today. | Continue reading
Sources and a document show how Google bars nonprofits from telling activists in certain countries about their products. | Continue reading
A Twitter employee who works on machine learning believes that a proactive, algorithmic solution to white supremacy would also catch Republican politicians. | Continue reading
A Twitter employee who works on machine learning believes that a proactive, algorithmic solution to white supremacy would also catch Republican politicians. | Continue reading
Well, that would explain the road rage. | Continue reading
Debian's solution? Reproducible builds. | Continue reading
“I can absolutely make a big traffic problem all over the world,” the hacker said. | Continue reading
The meeting lasted 30 minutes, and touched on "the health of the public conversation on Twitter," according to an internal Twitter email obtained by Motherboard. | Continue reading
The meeting will last 30 minutes, and touch on "the health of the public conversation on Twitter," according to an internal Twitter email obtained by Motherboard. | Continue reading
In this week's CYBER podcast, we sat down with Edward Snowden to talk about his life in Russia, Julian Assange, and press freedom. | Continue reading
In this week's CYBER podcast, we sat down with Edward Snowden to talk about his life in Russia, Julian Assange, and press freedom. | Continue reading
Dadabots was developed by two music technologists who wanted to prove that a neural network was capable of capturing the subtle stylistic differences between Death Metal, Math Rock, and other lesser-known genres. | Continue reading
'Public Sans,' a sharp new typeface for interface design has been made freely available, courtesy of a somewhat unusual source: the United States federal government. | Continue reading
Apple’s “Don’t mess with Mother (Nature)” video—produced by the Camp4 Collective to promote the iPhone XS—included footage of a man-made avalanche. | Continue reading
“I wouldn’t call it a miracle but I’m very, very happy.” | Continue reading
Many of the laws restricting local voters’ rights were directly written by a telecom sector terrified of real broadband competition. | Continue reading
Critics say that predictive models will lead to false positives and could disproportionately affect vulnerable communities. | Continue reading
An FBI agent admitted in a newly unsealed court document that the Department of Justice does not know whether Assange’s offer to help Manning came to fruition. | Continue reading
Terry Davis, a schizophrenic programmer, has spent 10 years building an operating system to talk to God. | Continue reading
The Illinois Keep Internet Devices Safe Act would have empowered average people to sue big companies for recording them without consent, but industry association lobbying defanged it. | Continue reading
A single electronics recycler has had to destroy 66,000 iPhones in the last three years because of the iPhone's Activation Lock. | Continue reading
For years, the arrest and case has been kept under-wraps. Friday, a court sentenced Thomas White to 5 years and 4 months for his role in running a huge dark web drug marketplace. | Continue reading
For years, it has been publicly reported that Julian Assange offered to help Chelsea Manning break into a classified computer system. Now the Department of Justice has charged Assange for that. | Continue reading
A classic game helps to solve a big problem with AI as the technology makes more decisions about our lives. | Continue reading
A NASA rocket launch mission that painted the Arctic sky was compared to an “alien attack.” | Continue reading
They also found evidence that Stuxnet has ties to another malware family. The discoveries were made using tools and techniques only available to researchers in recent years. | Continue reading
Ads for cashier positions in supermarkets reached an 85% female audience, and ads for positions in taxi companies reached a 75% Black audience. | Continue reading
The 996.ICU movement has largely organized on GitHub, and has produced a software license aimed at forcing companies to treat workers fairly if they use open source software. | Continue reading
Hayabusa2 was launched with a five-gram bullet and an explosive, both meant for the Ryugu asteroid 200 million miles from Earth. | Continue reading
Is it possible to take down the internet by physically attacking its infrastructure? | Continue reading
The exposures didn’t come from Facebook itself, but do show how data generated by one company can end up exposed thanks to another service. | Continue reading
After Motherboard reported that a consumer spyware vendor left a lot of incredibly sensitive and private data online, the company’s hosting provider took it down. | Continue reading