Skip to main content

Ars Technica

Physicists Created Bubbles That Can Last for Over a Year

If you've ever blown bubbles, you know how quickly they burst. Now French researchers have concocted a type that stays intact for hundreds of days.

A Bug in iOS 15 Is Leaking User Browsing Activity in Real Time

Apple has known about the vulnerability, which also affects iPadOS 15 and Safari 15, since late November.

Global Ship Traffic Could Imperil the Antarctic’s Biosecurity

Vessels from more than 1,500 ports have visited the region since 2014. Each one is a threat to introduce invasive species.

Apple Booted the Wordle Copycat Apps, but More Will Come

The simple premise of the wildly popular word guessing game is difficult to protect under US law.

A Staple of Sci-Fi Space Travel Will Likely Remain a Fantasy

Physicists say an interstellar engine popularized in the ’60s is technically feasible, but it would take a more advanced civilization to build one.

The End of BlackBerry Phones Is Finally, Truly Here

The company is pulling support for its devices, meaning that at some point they will no longer be able to connect to cellular networks.

Microsoft Seizes Domains Used by a Chinese Hacking Group

The move delivers a blow to the hackers behind sophisticated attacks on government agencies, think tanks, and other organizations.

The FTC Sues Nvidia to Block Its Historic Deal With Arm

Regulators say the merger would create a semiconductor chip conglomerate and stifle innovation across the industry.

A Software Bug Let Hackers Drain $31M From a Crypto Service

An attacker exploited a vulnerability in MonoX Finance's smart contract to inflate the price of its digital token and then cash out.

A Bunch of Malicious Google Play Apps Stole User Banking Info

Using tricks to sidestep the app store’s restrictions, malware operators pillaged passwords, keystrokes, and other data.

Iranian Hackers Are Going After US Critical Infrastructure

A hacking group is targeting a broad range of organizations, taking advantage of vulnerabilities that have been patched but not yet updated.

Another Intel Chip Flaw Puts a Slew of Gadgets at Risk

The vulnerability allows an attacker with physical access to the CPU to bypass the security measures protecting some of its most sensitive data.

Glowing Worms Could Shed Light On the Secrets of Regeneration

Cut a panther worm into thirds and each section will grow a new body. Researchers injected some with a fluorescent protein to study how.

Lidar Uncovers Hundreds of Lost Maya and Olmec Ruins

An aerial survey in southern Mexico discovered a host of ceremonial sites that could date as far back as 1100 BC.

Tree Rings Show Modern Cyclones Are the Rainiest in Centuries

A study of trees, some over 300 years old, indicate that precipitation levels are up as much as 5 inches compared to the early 1700s. 

A Deadly Microbe Mystery Leads to a Spray Sold at Walmart

A series of puzzling infections has been traced to the presence of a dangerous bacterium in an aromatherapy spray.

Biden’s FCC Picks Are a ‘Dream Team’ for Broadband Advocates

The president’s long-awaited nominees are strong proponents of narrowing the digital divide and restoring net neutrality rules.

How the Demise of the Dinosaurs Prompted a Snakesplosion

The Cretaceous–Paleogene extinction killed 75 percent of all species—and allowed primordial snakes to flourish.

Missouri Threatens to Sue a Reporter Over a Security Flaw

The governor warned that he would take legal action against a journalist who identified a vulnerability that exposed teachers’ Social Security numbers.

Cloudflare Isn't Liable for Sites That Hawk Counterfeits

A federal judge ruled that the content-delivery service doesn't "contribute" to copyright infringement.

A Simple Bug Is Leaving AirTag Users Vulnerable to an Attack

Apple has reportedly known about the exploit for months.

A 3D-Printed Chicken Breast Was Cooked With Frickin’ Lasers

Engineers at Columbia University developed a system that can simultaneously produce and heat food with precision.

Anonymous Leaked a Bunch of Data From a Right-Wing Web Host

The hacktivist collective targeted the domain registrar Epik for providing services to clients including the Texas GOP, Parler, and 8chan.

How a Duck Learned to Say ‘You Bloody Fool’

Voice analysis of a 34-year-old recording proves that Ripper the musk duck “independently evolved” to mimic his human caretakers.