The Best Coolers for Every Kind of Outdoor Adventure

We drank chilled beverage after chilled beverage to bring you our favorite coolers for every situation. This year, a new crop of spendy, heavy-duty coolers promised to keep your beverages icier than ever. Unfortunately, in order to unlock their magical chilling powers, you need to fulfill a series of optimum, and sometimes impossible, conditions—for example,…

Continue Reading The Best Coolers for Every Kind of Outdoor Adventure

To Help Migrants at the Border, Aid Groups Deploy Tech

Last month, a young transgender woman from Central America applied for asylum in the US. Unlike thousands of others requesting asylum at the US-Mexico border, this person was especially fortunate. She had her birth certificate as well as a lawyer to represent her. She presented herself to Customs and Border Protection officers in San Ysidro,…

Continue Reading To Help Migrants at the Border, Aid Groups Deploy Tech

Fractal Patterns Offer Clues to the Universe’s Origin

Pour milk in coffee, and the eddies and tendrils of white soon fade to brown. In half an hour, the drink cools to room temperature. Left for days, the liquid evaporates. After centuries, the cup will disintegrate, and billions of years later, the entire planet, sun and solar system will disperse. Throughout the universe, all…

Continue Reading Fractal Patterns Offer Clues to the Universe’s Origin

Hackers Could Decrypt Your GSM Phone Calls

Zoran Milisavljevic/AlamyMost mobile calls around the world are made over the Global System for Mobile Communications standard; in the US, GSM underpins any call made over AT&T or T-Mobile's network. But at the DefCon security conference in Las Vegas on Saturday, researchers from the BlackBerry are presenting an attack that can intercept GSM calls as…

Continue Reading Hackers Could Decrypt Your GSM Phone Calls

Election Systems Are Even More Vulnerable Than We Thought

Hacker summer camp is here again! You know what that means: WIRED is back in Las Vegas for the annual Black Hat and Defcon security conferences, where we’re digging into the latest and greatest hacks on display. First, let’s talk about iPhones. A researcher found it’s possible to break into one just by sending a…

Continue Reading Election Systems Are Even More Vulnerable Than We Thought