Wired

Hackers Can Silently Control Siri From 16 Feet Away

Hackers Can Silently Control Siri From 16 Feet Away Well this is concerning: A pair of researchers at ANSSI, a French government agency devoted to information security, have shown that they can use radio waves to silently trigger voice commands on any Android phone or iPhone that has Google Now or …

How the DMCA criminalized DIY farm equipment repair

How the DMCA criminalized DIY farm equipment repairKyle Wiens, writing at Wired: Manufacturers have every legal right to put a password or an encryption over the tECU. Owners, on the other hand, don’t have the legal right to break the digital lock over their own equipment. The Digital Millennium …

MIT wants pre-release review of Secret Service file on Aaron Swartz

MIT wants pre-release review of Secret Service file on Aaron SwartzKevin Poulsen, at Wired's Threat Level blog: MIT argues that those people might face threats and harassment if their names become public. But it’s worth noting that names of third parties are already redacted from documents produced …

Strongbox and Aaron Swartz: Open source, anonymous tips

Strongbox and Aaron Swartz: Open source, anonymous tipsThere is plenty of Google news today coming out of their annual I/O conference, but this looks far more important and big-picture, if it actually gets used.

DARPA and deep learning

DARPA and deep learningThis article by Daniela Hernandez at Wired is well-done and fascinating. However, this bit most caught my eye: Half of the $100 million in federal funding allotted to this program will come from Darpa — more than the amount coming from the National Institutes of Health — and …

At Google, Constitution trumps statute

At Google, Constitution trumps statuteDavid Kravets quotes a Googler: “Google requires an ECPA search warrant for contents of Gmail and other services based on the Fourth Amendment to the Constitution, which prevents unreasonable search and seizure,” Chris Gaither, a Google spokesman, said. The …

UPenn criminologist Richard Berk's recidivism-prediction algorithm

UPenn criminologist Richard Berk’s recidivism-prediction algorithmWired's Kim Zetter: To create the software, researchers assembled a dataset of more than 60,000 crimes, including homicides, then wrote an algorithm to find the people behind the crimes who were more likely to commit murder …

Student loses suit over school ID requirement

Student loses suit over school ID requirementWired's David Kravets reports that: The girl’s father, Steven, wrote the school district explaining why removing the chip wasn’t good enough, that the daughter should be free from displaying the card altogether. “‘We must obey the word of God,” the …

Why We'll Never Stop Talking About Steve Jobs

Why We’ll Never Stop Talking About Steve JobsMat Honan, writing at Wired: Jobs, like the titans of industry before him, realized that when we think about how the world works, we are actually thinking about the way people have made it to work. And that means that if you don’t like the way the …

Apathy and ecstasy for the iPhone 5

Mat Honan, writing at Wired’s Gadget Lab blog: It is an amazing triumph of technology that gets better and better, year after year, and yet somehow is every bit as exciting as a 25 mph drive through a sensible neighborhood at a reasonable time of day. I am still waiting for Verizon to push Jelly …

Flame and Stuxnet Cousin Targets Lebanese Bank Customers, Carries Mysterious Payload

Flame and Stuxnet Cousin Targets Lebanese Bank Customers, Carries Mysterious PayloadKim Zetter, writing at Wired: The researchers don’t know if the attackers used the bank component in Gauss simply to spy on account transactions, or to steal money from targets. But given that the malware was almost …