The FBI

Not so IDLE hands: FBI program offers companies data protection via deception

Enlarge / The FBI’s IDLE program uses “obfuscated” data to hide real data from hackers and insider threats, making data theft harder and giving security teams a tool to spot illicit access. Getty Images The Federal Bureau of Investigations is in many ways on the front lines of the fight against both cybercrime and cyber-espionage […]

Continue Reading
earth rotating around the sun to represent a year

The Year Humanity Declared War on Microplastics

Amid increasingly dire reports on climate change and political upheaval, this year a new menace came to dominate the news cycle: microplastic pollution. Scientists revealed that it’s blowing in the air and swirling in the seas and tainting our food and water, with as yet unknown effects on human health. Microplastic pollution isn’t particularly new […]

Continue Reading
Deep Learning breakthrough made by Rice University scientists

Deep Learning breakthrough made by Rice University scientists

In an earlier deep learning article, we talked about how inference workloads—the use of already-trained neural networks to analyze data—can run on fairly cheap hardware, but running the training workload that the neural network “learns” on is orders of magnitude more expensive. In particular, the more potential inputs you have to an algorithm, the more […]

Continue Reading
Fox News Is Now a Threat to National Security

Fox News Is Now a Threat to National Security

Fox’s clear willingness to parry the wingnuttiest ideas in service of the president, long-term implications to the United States be damned, should worry all concerned about the state of the United States. The Ukraine myth is hardly the only example; for years, it has repeated false conspiracies about the murder of Democratic staffer Seth Rich, […]

Continue Reading
Newly discovered Mac malware uses “fileless” technique to remain stealthy

Newly discovered Mac malware uses “fileless” technique to remain stealthy

Hackers believed to be working for the North Korean government have upped their game with a recently discovered Mac trojan that uses in-memory execution to remain stealthy. In-memory execution, also known as fileless infection, never writes anything to a computer hard drive. Instead, it loads malicious code directly into memory and executes it from there. […]

Continue Reading
illustration of a head

What Happens When Computers Learn to Read Our Emotions?

Computers are slowly but surely learning to read our emotions. Will this mean a future without privacy, or perhaps a golden age of more compassionate and helpful machines? This edition of the Sleepwalkers podcast looks at AI’s growing power to “read” us—and investigates the sinister and the positive uses of the technology. Poppy Crum, chief […]

Continue Reading
Half an operating system: The triumph and tragedy of OS/2

Half an operating system: The triumph and tragedy of OS/2

Update: It’s the day after Thanksgiving in the US, meaning most Ars staffers are on the lookout for deals rather than potential stories. With folks off for the holiday, we’re resurfacing this consumer tech classic from the archives—a look at why we’re not all trying to buy an IBM PS/10 today and updating to OS/12, […]

Continue Reading
Black Friday 2019: The Best Outdoor and Fitness Deals

Black Friday 2019: The Best Outdoor and Fitness Deals

If you don’t see something to suit your needs below, check out our best camping gear guide for more. Black Diamond Solution Harness for $52 ($18 off) Backcountry [Men’s], Moosejaw Backcountry [Women’s], Moosejaw Wide, contoured leg loops make the Solution one of the most comfortable harnesses for long afternoons at the climbing gym. Four gear […]

Continue Reading
Suspect can’t be compelled to reveal “64-character” password, court rules

Suspect can’t be compelled to reveal “64-character” password, court rules

Getty Images The Fifth Amendment to the US Constitution bars people from being forced to turn over personal passwords to police, the Pennsylvania Supreme Court ruled this week. In a 4-3 ruling, justices from Pennsylvania’s highest court overturned a lower-court order that required the suspect in a child-pornography case to turn over a 64-character password […]

Continue Reading