Mr. Musk said he wanted to confirm Twitter’s findings that spam and fake accounts make up less than 5 percent of its users.
Cryptocurrencies Melt Down in a ‘Perfect Storm’ of Fear and Panic
A steep sell-off that gained momentum this week starkly illustrated the risks of the experimental and unregulated digital currencies.
The tech sector teardown is more catharsis than crisis
Enlarge (credit: Getty Images) Following a series of “super clarifying” meetings with shareholders, Uber’s chief executive, Dara Khosrowshahi, emailed employees on Sunday night with an arresting message: “we need to show them the money.” Mangling his metaphors, Khosrowshahi explained that the market was experiencing a “seismic shift” and the “goalposts have changed.” The ride-hailing and food...
Appeals Court Revives Texas Law Targeting Social Media Companies
The law, prompted by complaints from conservatives, allows people to sue large online platforms that remove posts expressing a particular viewpoint.
The Messy Progress on Data Privacy
America still doesn’t have a federal data privacy law. But look what we have found — hope!
Will Crypto Play a Role in Funding Abortion Access?
Activists and nonprofits are considering digital currencies as a way to raise funds. But can they really do anything other payment methods can’t?
How a French satellite operator helps keep Russia’s TV propaganda online
Enlarge / Russian President Vladimir Putin speaks during the Moscow Urban Forum 2018 on July 18, 2018 in Moscow, Russia. (credit: Getty Images | Mikhail Svetlov ) Not long after Russia steamrolled into South Ossetia in 2008, effectively annexing the territory of its southern neighbor, a group of Georgians banded together to set up a...
Some top 100,000 websites collect everything you type—before you hit submit
Enlarge When you sign up for a newsletter, make a hotel reservation, or check out online, you probably take for granted that if you mistype your email address three times or change your mind and X out of the page, it doesn’t matter. Nothing actually happens until you hit the Submit button, right? Well, maybe...
Zyxel silently patches command-injection vulnerability with 9.8 severity rating
Enlarge (credit: Zyxel) Hardware manufacturer Zyxel quietly released an update fixing a critical vulnerability that gives hackers the ability to control tens of thousands of firewall devices remotely. The vulnerability, which allows remote command injection with no authentication required, carries a severity rating of 9.8 out of a possible 10. It’s easy to exploit by...
Backdoor in public repository used new form of attack to target big firms
Enlarge (credit: Getty Images) A backdoor that researchers found hiding inside open source code targeting four German companies was the work of a professional penetration tester. The tester was checking clients’ resilience against a new class of attacks that exploit public repositories used by millions of software projects worldwide. But it could have been bad....


