Enlarge (credit: Getty Images | Kalief Browder) Google Fiber says it plans to expand its fiber-to-the-home Internet service to several new states for the first time since it announced a pause in construction in October 2016. The plans are pending local approvals. The Alphabet division said in a press release today that it is “talking...
Man who built ISP instead of paying Comcast $50K expands to hundreds of homes
Enlarge / A truck delivery of fiber conduit and other materials for Jared Mauch’s broadband network. (credit: Jared Mauch) Jared Mauch, the Michigan man who built a fiber-to-the-home Internet provider because he couldn’t get good broadband service from AT&T or Comcast, is expanding with the help of $2.6 million in government money. When we wrote...
Former Twitter Employee Convicted of Charges Related to Spying for Saudis
A federal jury in San Francisco deliberated for nearly three days before convicting him on six charges while acquitting him on five others in the two-week trial.
How Russia Propaganda Is Reaching Beyond English Speakers
Social media companies have taken steps to restrict Russian state media accounts. But posts from those accounts still spread in Spanish, Arabic and other languages and in places outside the West.
Justice Dept. Said to Conduct New Interviews in Inquiry Into Google’s Ad Tech
The Justice Department for more than a year has investigated whether Google abuses its dominance over the interlocking technologies that deliver ads online.
Coinbase Reports 63% Drop in Revenue Amid Crypto Industry Slump
The cryptocurrency exchange lost more than $1 billion in the second quarter.
Phishers who breached Twilio and fooled Cloudflare could easily get you, too
Enlarge (credit: Getty Images) At least two security-sensitive companies—Twilio and Cloudflare—were targeted in a phishing attack by an advanced threat actor who had possession of home phone numbers of not just employees but employees’ family members as well. In the case of Twilio, a San Francisco-based provider of two-factor authentication and communication services, the unknown...
10 malicious Python packages exposed in latest repository attack
Enlarge / Supply-chain attacks, like the latest PyPi discovery, insert malicious code into seemingly functional software packages used by developers. They’re becoming increasingly common. (credit: Getty Images) Researchers have discovered yet another set of malicious packages in PyPi, the official and most popular repository for Python programs and code libraries. Those duped by the seemingly familiar...
Setting our heart-attack-predicting AI loose with “no-code” tools
Enlarge / Ahhh, the easy button! (credit: Aurich Lawson | Getty Images) This is the second episode in our exploration of “no-code” machine learning. In our first article, we laid out our problem set and discussed the data we would use to test whether a highly automated ML tool designed for business analysts could return...


