T-Mobile is once again being sued over its 2021 data breach
Illustration: Alex Castro / The Verge Washington state is suing T-Mobile for allegedly failing to address cybersecurity vulnerabilities that enabled a hacker to expose the personal data of 79 million people nationwide. The consumer protection lawsuit filed by Washington Attorney General Bob Ferguson on Monday stems from a cyberattack that
Read moreFailing fast at scale: Rapid prototyping at Intuit
Have an idea? Turn it into a prototype first.
Read moreCan AI models reason like a human?
We’re awaiting the release of OpenAI’s o3 model later this month. Its performance is impressive on very hard benchmarks like SWE-bench Verified, Frontier Math and the ARC AGI benchmark (discussed previously in this blog). And yet at the same time some behaviors of the frontier AI models are very concerning.
Read moreThis sun-tracking security camera keeps watch in 4K
Baseus’ new outdoor security camera boosts video quality to 4K. | Image: Baseus Baseus has announced a new version of its solar-powered security camera at CES 2025 that improves video quality from 2K to 4K and extends battery life from 180 to 210 days. But like the previous version, the
Read moreUS Cyber Trust Mark launches as the Energy Star of smart home security
Image: The Verge / Adobe Stock Consumers shopping for new smart home devices will soon be able to look for the official stamp of trust from the US government: the US Cyber Trust Mark. Similar to how an Energy Star label on home appliances denotes a certain level of energy
Read moreQuick change directory
One difficulty when working at a command line is navigating between directories, particularly between locations with long paths. There are several ways to mitigate this. One of the simplest is using cd - to return to the previous directory. Another is to use pushd and popd. Still another is to
Read moreWBIT #2: Memories of persistence and the state of state
Bottom line: let React do the React things.
Read moreChris’ Corner: User Control
Like Miriam Suzanne says: You’re allowed to have preferences. Set your preferences. I like the idea of controlling my own experience when browsing and using the web. Bump up that default font size, you’re worth it. Here’s another version of control. If you publish a truncated RSS feed on your
Read moreConverse of RSA
The security of RSA encryption depends on the difficulty of factoring the product of two large primes. If you can factor large numbers efficiently, you can break RSA. But if can break RSA, can you factor large numbers? Sorta. It’s conceivable that there is a way to break RSA encryption
Read moreInspire Digital Storytelling and Enlighten AI Leaders With These Helpful Books
Isaac Sacolick shares insights on his favorite books from the past year, highlighting essential reads for digital storytellers and tech leaders. Key recommendations include "Storyworthy" by Matthew Dicks, "Building a Second Brain" by Tiago Forte, and Adam Grant's "Hidden Potential." Additional notable mentions cover AI and leadership books.
Read more