Enlarge (credit: HUM Images | Getty) Farmers around the world have turned to tractor hacking so they can bypass the digital locks that manufacturers impose on their vehicles. Like insulin pump “looping” and iPhone jailbreaking, this allows farmers to modify and repair the expensive equipment that’s vital to their work, the way they could with...
The Summer of NIMBY in Silicon Valley’s Poshest Town
Moguls and investors from the tech industry, which endorses housing relief, banded together to object to a plan for multifamily homes near their estates in Atherton, Calif.
For Electric Vehicle Makers, Winners and Losers in Climate Bill
Carmakers may need several years to revamp their supply chains to meet new rules, but the legislation is still seen as a win for electric vehicles.
Samsung heir pardoned due to South Korean economic needs
Enlarge / Jay Y. Lee, vice chairman of Samsung Electronics Co., leaves the Seoul Central District Court in Seoul, South Korea, on Friday. After a presidential pardon, Lee is poised to retake control of South Korea’s largest commercial entity. (credit: Getty Images) Samsung Electronics Vice-Chair Jay Y. Lee received a presidential pardon Friday for his...
Why Issey Miyake Was Steve Jobs’s Favorite Designer
The real beginning of the fashion-technology love affair and its legacy lies with Issey Miyake, who died last week.
I’m a security reporter and got fooled by a blatant phish
Enlarge / This is definitely not a Razer mouse—but you get the idea. (credit: calvio via Getty Images) There has been a recent flurry of phishing attacks so surgically precise and well-executed that they’ve managed to fool some of the most aware people working in the cybersecurity industry. On Monday, Tuesday, and Wednesday, two-factor authentication...
Amid backlash from privacy advocates, Meta expands end-to-end encryption trial
Enlarge (credit: Getty Images) Meta is ever so slowly expanding its trial of end-to-end encryption in a bid to protect users from snoops and law enforcement. End-to-end encryption, often abbreviated as E2EE, uses strong cryptography to encrypt messages with a key that is unique to each user. Because the key is in the sole possession...
One of 5G’s biggest features is a security minefield
Enlarge (credit: Anton Petrus | Getty) True 5G wireless data, with its ultrafast speeds and enhanced security protections, has been slow to roll out around the world. As the mobile technology proliferates—combining expanded speed and bandwidth with low-latency connections—one of its most touted features is starting to come in to focus. But the upgrade comes...
The Boy Bosses of Silicon Valley Are on Their Way Out
They rode their unicorns to fame and fortune. In a rocky market, it got a little less fun.
How to Change These Default Settings and Be Happier With Your Tech
Simple steps can make your smartphone, computer and TV work better for you.





