Hackers Can Break Into an iPhone Just by Sending a Text

When you think about how hackers could break into your smartphone, you probably imagine it would start with clicking a malicious link in a text, downloading a fraudulent app, or some other way you accidentally let them in. It turns out that's not necessarily so—not even on the iPhone, where simply receiving an iMessage could…

Continue Reading Hackers Can Break Into an iPhone Just by Sending a Text

How AT&T Insiders Were Bribed to ‘Unlock’ Millions of Phones

An extensive scheme to illegally unlock AT&T phones centered on the help of call center employees, according to a recently unsealed indictment.Kuni Takahashi/Bloomberg/Getty ImagesA dramatic saga that began with a civil lawsuit between AT&T and former employees has resulted in a high-profile arrest. Muhammad Fahd, 34, and his co-conspirators allegedly paid AT&T employees more than…

Continue Reading How AT&T Insiders Were Bribed to ‘Unlock’ Millions of Phones

Samsung Galaxy Note10 and Note10+: Price, Specs, Release Date

When Samsung first introduced the Galaxy Note smartphone back in 2011, it stood out because of two key features: a stylus pen and a screen so large that the phone was dubbed a “phablet.” Somewhere between a phone and a tablet, the Note was derided at the time for being comically huge.Smash cut to present…

Continue Reading Samsung Galaxy Note10 and Note10+: Price, Specs, Release Date

A Boeing Code Leak Exposes Security Flaws Deep in a 787’s Guts

Late one night last September, security researcher Ruben Santamarta sat in his home office in Madrid and partook in some creative googling, searching for technical documents related to his years-long obsession: the cybersecurity of airplanes. He was surprised to discover a fully unprotected server on Boeing's network, seemingly full of code designed to run on…

Continue Reading A Boeing Code Leak Exposes Security Flaws Deep in a 787’s Guts

13-Year-Old Encryption Bugs Still Haunt Apps and IoT

Hackers try to find novel ways to circumvent or under­mine data encryption schemes all the time. But at the Black Hat security conference in Las Vegas on Wednesday, Purdue University researcher Sze Yiu Chau has a warning for the security community about a different threat to encryption: Vulnerabilities that were discovered more than a decade…

Continue Reading 13-Year-Old Encryption Bugs Still Haunt Apps and IoT

The CDC Could Totally Study Gun Violence—It Just Needs Money

In the wake of more mass shootings, many Americans are calling for more gun control—and more research into gun violence.Win McNamee/Getty ImagesThe nation’s epidemic of gun violence is back in the spotlight once again, after a weekend that saw mass shootings in El Paso, Dayton, and Chicago. Dozens of people were killed, even more wounded,…

Continue Reading The CDC Could Totally Study Gun Violence—It Just Needs Money

Fact-Check the Physics of Captain America Hammering Thanos

I've waited, and now it is time. With the official digital release of Avengers: Endgame, I can now analyze some scenes. I like to wait to give everyone a chance to see it first.In this epic scene, Captain America picks up Mjölnir (Thor's hammer) and uses it to smack Thanos. Honestly, it's one of the…

Continue Reading Fact-Check the Physics of Captain America Hammering Thanos