FreshRSS

🔒
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayWIRED

Perplexity Plagiarized Our Story About How Perplexity Is a Bullshit Machine

By Tim Marchman
Experts aren’t unanimous about whether the AI-powered search startup’s practices could expose it to legal claims ranging from infringement to defamation—but some say plaintiffs would have strong cases.

US Leaders Dodge Questions About Israel’s Influence Campaign

By Dell Cameron
Democratic leader Hakeem Jeffries has joined US intelligence officials in ignoring repeated inquiries about Israel’s “malign” efforts to covertly influence US voters.

Android Update: Theft Detection Lock Knows When Your Phone Is Stolen

By Matt Burgess
Google is introducing new AI-powered safety tools in Android 15 that can lock down your phone if thieves nab it.

Change Healthcare Finally Admits It Paid Ransomware Hackers—and Still Faces a Patient Data Leak

By Andy Greenberg
The company belatedly conceded both that it had paid the cybercriminals extorting it and that patient data nonetheless ended up on the dark web.

Hackers Linked to Russia’s Military Claim Credit for Sabotaging US Water Utilities

By Andy Greenberg
Cyber Army of Russia Reborn, a group with ties to the Kremlin’s Sandworm unit, is crossing lines even that notorious cyberwarfare unit wouldn’t dare to.

A Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask

By Andy Greenberg
As “P4x,” Alejandro Caceres single-handedly disrupted the internet of an entire country. Then he tried to show the US military how it can—and should—adopt his methods.

There Are Dark Corners of the Internet. Then There's 764

By Ali Winston
A global network of violent predators is hiding in plain sight, targeting children on major platforms, grooming them, and extorting them to commit horrific acts of abuse.

Anduril’s New Drone Killer Is Locked on to AI-Powered Warfare

By Will Knight
Autonomous drones are rapidly changing combat. Anduril’s new one aims to gain an edge with jet power and AI.

Here’s How Violent Extremists Are Exploiting Generative AI Tools

By David Gilbert
Experts are finding thousands of examples of AI-created content every week that could allow terrorist groups and other violent extremists to bypass automated detection systems.

Activist Hackers Are Racing Into the Israel-Hamas War—for Both Sides

By Lily Hay Newman, Matt Burgess
Since the conflict escalated, hackers have targeted dozens of government websites and media outlets with defacements and DDoS attacks, and attempted to overload targets with junk traffic to bring them down.

Predictive Policing Software Terrible at Predicting Crimes

By Aaron Sankin, Surya Mattu
A software company sold a New Jersey police department an algorithm that was right less than 1 percent of the time.

SoundThinking, Maker of ShotSpotter, Is Buying Parts of PredPol Creator Geolitica

By Dhruv Mehrotra, Dell Cameron
SoundThinking is purchasing parts of Geolitica, the company that created PredPol. Experts say the acquisition marks a new era of companies dictating how police operate.

SafeGraph Lands US Air Force Contract After Targeting Abortion Clinics

By Bennett Cyphers
Documents obtained by WIRED show SafeGraph, which sold location data related to Planned Parenthood visits, is now pursuing contracts with the US Air Force.

The Sketchy Plan to Build a Russian Android Phone

By Masha Borak
Amid isolating sanctions, a Russian tech giant plans to launch new Android phones and tablets. But experts are skeptical the company can pull it off.

The Small but Mighty Danger of Echo Chamber Extremism

By Thor Benson
Research shows that relatively few people exist in perfectly sealed-off media bubbles—but they’re still having an outsize impact on US politics.

Shadowy Russian Cell Phone Companies Are Cropping Up in Ukraine

By Matt Burgess
But as Ukrainians retake ground, some of the firms are erasing their online presence.

Inside the Shadow Evacuation of Kabul

By Michael Venutolo-Mantovani
In the last two weeks of the war, an ad hoc team armed with group chats, QR codes, and satellite maps launched a mad dash to save imperiled Afghan allies.

The 2022 US Midterm Elections' Top Security Issue: Death Threats

By Lily Hay Newman
While cybersecurity and foreign meddling remain priorities, domestic threats against election workers have risen to the top of the list.

Hackers Can Steal Your Tesla by Creating Their Own Personal Keys

By Dan Goodin, Ars Technica
A researcher found that a recent update lets anyone enroll their own key during the 130-second interval after the car is unlocked with an NFC card.
❌