PodParley PodParley
Security, Spoken cover art

All Episodes

Security, Spoken — 2084 episodes

#
Title
1

Introducing WIRED Politics Lab!

2

Introducing WIRED's Gadget Lab!

3

A Senate Bill Would Radically Improve Voting Machine Security

4

How Infostealers Pillaged the World’s Passwords

5

New Jersey's $500 Million Bid to Become an AI Epicenter

6

A Hacker ‘Ghost’ Network Is Quietly Spreading Malware on GitHub

7

Don't Fall for CrowdStrike Outage Scams

8

How Russia-Linked Malware Cut Heat to 600 Ukrainian Buildings in Deep Winter

9

The Pentagon Wants to Spend $141 Billion on a Doomsday Machine

10

From the Archives: How to Spot a Business Email Compromise Scam

11

Alleged ‘Maniac Murder Cult’ Leader Indicted Over Plot to Kill Jewish Children

12

The US Supreme Court Kneecapped US Cyber Strategy

13

Hackers Claim to Have Leaked 1.1 TB of Disney Slack Messages

14

The Sweeping Danger of the AT&T Phone Records Breach

15

Pressure Grows in Congress to Treat Crypto Investigator Tigran Gambaryan, Jailed in Nigeria, as a Hostage

16

Notorious Hacker Kingpin ‘Tank’ Is Finally Going to Prison

17

Google Is Adding Passkey Support for Its Most Vulnerable Users

18

Inside a Violent Gang's Ruthless Crypto-Stealing Home Invasion Spree

19

Deepfake Creators Are Revictimizing GirlsDoPorn Sex Trafficking Survivors

20

How Apple Intelligence’s Privacy Stacks Up Against Android’s ‘Hybrid AI’

21

Proton Is Launching Encrypted Documents to Take On Google Docs

22

Polestar Is Bracing for the EV Tariff Wars. It May Not Emerge Unscathed

23

The Problem the US TikTok Crackdown and Kaspersky Ban Have in Common

24

Amazon Is Investigating Perplexity Over Claims of Scraping Abuse

25

Surprise! The Latest ‘Comprehensive’ US Privacy Bill Is Doomed

26

War Crime Prosecutions Enter a New Digital Age

27

The Mystery of AI Gunshot-Detection Accuracy Is Finally Unraveling

28

Red Tape Is Making Hospital Ransomware Attacks Worse

29

US Bans Kaspersky Software

30

How to Spot a Business Email Compromise Scam

31

Hackers Detail How They Allegedly Stole Ticketmaster Data From Snowflake

32

OpenAI-Backed Nonprofits Have Gone Back on Their Transparency Pledges

33

Amazon-Powered AI Cameras Used to Detect Emotions of Unwitting UK Train Passengers

34

A Guide to RCS, Why Apple’s Adopting It, and How It Makes Texting Better

35

From the Archives: Oh Good, Hurricanes Are Now Made of Microplastics

36

The Fight Against AI Comes to a Foundational Data Set

37

Medical-Targeted Ransomware Is Breaking Records After Change Healthcare’s $22M Payout

38

From the Archives: How NASA Is Protecting Its Precious Asteroid Bennu Sample

39

US Leaders Dodge Questions About Israel’s Influence Campaign

40

Ransomware Is ‘More Brutal’ Than Ever in 2024

41

Microsoft's Recall Feature Is Even More Hackable Than You Thought

42

From the Archives: Cicadas Are So Loud, Fiber Optic Cables Can ‘Hear’ Them

43

From the Archives: The Weirdest Reason the Poles Are Warming So Fast? Invisible Clouds

44

From the Archives: DNA Drives Help Identify Missing People. It’s a Privacy Nightmare

45

Russians Love YouTube. That’s a Problem for the Kremlin

46

From the Archives: The Vampire Bat Is Moving Closer to the US. That’s a Problem

47

OpenAI Employees Warn of a Culture of Risk and Retaliation

48

This Hacker Tool Extracts All the Data Collected by Windows’ New Recall AI

49

How Donald Trump Could Weaponize US Surveillance in a Second Term

50

How Researchers Cracked an 11-Year-Old Password to a $3 Million Crypto Wallet

51

From What's New: A Billion-Dollar Plan to Fix Farm Emissions Might Make Things Worse

52

From Business, Spoken: How AI Could Transform Email

53

The Unusual Espionage Act Case Against a Drone Photographer

54

Maven Is a New Social Network That Eliminates Followers—and Hopefully Stress

55

From Science, Spoken: High Blood Pressure Is the World’s Biggest Killer. Now There’s a Plan to Tackle It.

56

Cops Are Just Trolling Cybercriminals Now

57

He Trained Crypto Cops to Fight Crypto Crime—and Allegedly Ran a $100M Dark Web Drug Market

58

A Leak of Biometric Police Data Is a Sign of Things to Come

59

Teslas Can Still Be Stolen With a Cheap Radio Hack—Despite New Keyless Tech

60

Eventbrite Promoted Illegal Opioid Sales to People Searching for Addiction Recovery Help

61

WikiLeaks' Julian Assange Can Appeal His Extradition to the US, British Court Says

62

Russian Disinfo Campaign Blames Ukraine for Shooting of Slovakia’s Prime Minister

63

These Dangerous Scammers Don’t Even Bother to Hide Their Crimes

64

Android 15 Theft Detection Lock Knows When Your Phone Is Stolen

65

Secrecy Concerns Mount Over Spy Powers Targeting US Data Centers

66

Internal Emails Show How a Controversial Gun-Detection System Found Its Way to NYC

67

A Russian Influence Campaign Is Exploiting College Campus Protests

68

The Breach of a Face Recognition Firm Reveals a Hidden Danger of Biometrics

69

Top FBI Official Urges Agents to Use Warrantless Wiretaps on US Soil

70

The Alleged LockBit Ransomware Mastermind Has Been Identified

71

Apple’s iPhone Spyware Problem Is Getting Worse. Here’s What You Should Know

72

A Vast New Dataset Could Supercharge the AI Hunt for Crypto Money Laundering

73

The Dangerous Rise of GPS Attacks

74

Recruiters Are Going Analog to Fight the AI Application Overload

75

The Biggest Deepfake Porn Website Is Now Blocked in the UK

76

‘ArcaneDoor’ Cyberspies Hacked Cisco Firewalls to Access Government Networks

77

North Koreans Secretly Animated Amazon and Max Shows, Researchers Say

78

Change Healthcare Finally Admits It Paid Ransomware Hackers—and Still Faces a Patient Data Leak

79

The Next US President Will Have Troubling New Surveillance Powers

80

The Trump Jury Has a Doxing Problem

81

Big Tech Squares Off Against US Spies

82

Change Healthcare Faces Another Ransomware Threat—and It Looks Credible

83

US Senate to Vote on a Wiretap Bill That Critics Call ‘Stasi-Like’

84

House Votes to Extend—and Expand—a Major US Spy Program

85

How to Stop Your Data From Being Used to Train AI

86

DuckDuckGo Is Taking Its Privacy Fight to Data Brokers

87

It’s Time to Switch to a Privacy Browser

88

A Breakthrough Online Privacy Proposal Hits Congress

89

How to Protect Yourself (and Your Loved Ones) From AI Scam Calls

90

A Ghost Ship’s Doomed Journey Through the Gate of Tears

91

A Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask

92

The Mystery of ‘Jia Tan,’ the XZ Backdoor Mastermind

93

The Incognito Mode Myth Has Fully Unraveled

94

The White House Puts New Guardrails on Government Use of AI

95

Jeffrey Epstein's Island Visitors Exposed by Data Broker

96

Hackers Found a Way to Open Any of 3 Million Hotel Keycard Locks in Seconds

97

‘Malicious Activity’ Hits the University of Cambridge's Medical School

98

Julian Assange Won’t Be Extradited to the US Yet

99

Chinese Hackers Charged in Decade-Long Global Spying Rampage

100

Apple's iMessage Encryption Puts Its Security Practices in the DOJ's Crosshairs

101

Some of the Most Popular Websites Share Your Data With Over 1,500 Companies

102

Glassdoor Wants to Know Your Real Name

103

Reddit’s Sale of User Data for AI Training Draws FTC Investigation

104

Sinking US Wiretap Program Offered One Last Lifeboat

105

The 4 Big Questions the Pentagon's New UFO Report Fails to Answer

106

The ‘Emergency Powers’ Risk of a Second Trump Presidency

107

How to Turn Off Facebook’s Two-Factor Authentication Change

108

Binance’s Top Crypto Crime Investigator Is Being Detained in Nigeria

109

Google Is Getting Thousands of Deepfake Porn Complaints

110

Hackers Behind the Change Healthcare Ransomware Attack Just Received a $22 Million Payment

111

Meta Abandons Hacking Victims, Draining Law Enforcement Resources, Officials Say

112

Dictators Used Sandvine Tech to Censor the Internet. The US Finally Did Something About It

113

The UK’s GPS Tagging of Migrants Has Been Ruled Illegal

114

Biden Bans Rival Nations From Buying Sensitive US Data—Good Luck

115

Russia Attacked Ukraine's Power Grid at Least 66 Times to ‘Freeze It Into Submission’

116

The White House Warns Cars Made in China Could Unleash Chaos on US Highways

117

Ransomware Groups Are Bouncing Back Faster From Law Enforcement Busts

118

How a Small Iowa Newspaper’s Website Became an AI-Generated Clickbait Factory

119

Apple’s iMessage Is Getting Post-Quantum Encryption

120

Leak Shows Alarm in Congress Over a Russian ‘Threat’ Is a Real Anomaly

121

100 Million People Pay Google for Extra Storage. Can It Get Them to Pay More for Smarter AI?

122

Google’s AI Boss Says Scale Only Gets You So Far

123

A Global Police Operation Just Took Down the Notorious LockBit Ransomware Gang

124

Leak of Russian Threat Part of a Bid to Kill US Surveillance Reform, Sources Say

125

The Hidden Injustice of Cyberattacks

126

Surveillance Fight Pits the White House Opposite Reproductive Rights

127

‘AI Girlfriends’ Are a Privacy Nightmare

128

A Backroom Deal Looms Over a High-Stakes US Surveillance Fight

129

Satellite Images Point to Indiscriminate Israeli Attacks on Gaza’s Health Care Facilities

130

London Underground Is Testing Real-Time AI Surveillance Tools to Spot Crime

131

I Stopped Using Passwords. It’s Great—and a Total Mess

132

Ransomware Payments Hit a Record $1.1 Billion in 2023

133

WhatsApp Chats Will Soon Work With Other Encrypted Messaging Apps

134

The Trial Over Bitcoin’s True Creator Is in Session

135

The Mystery of the $400 Million FTX Heist May Have Been Solved

136

YouTube, Discord, and Lord of the Rings Led Police to a Teen Accused of a US Swatting Spree

137

The Pentagon Tried to Hide That It Bought Americans' Data Without a Warrant

138

Robots Are Fighting Robots in Russia's War in Ukraine

139

Police have Arrested a Teen Said to Be Linked to Hundreds of Swatting Attacks

140

Notorious Spyware Maker NSO Group Is Quietly Plotting a Comeback

141

Ring Will Stop Giving Cops a Free Pass on Warrantless Video Requests

142

Most Top News Sites Block AI Bots. Right-Wing Media Welcomes Them

143

You Need to Turn on Apple’s New Stolen iPhone Tool

144

The Sad Truth of the FTC’s ‘Historic’ Privacy Win

145

A Flaw in Millions of Apple, AMD, and Qualcomm GPUs Could Expose AI Data

146

‘Stablecoins’ Enabled $40 Billion in Crypto Crime Since 2022

147

How to Stop Your X Account From Getting Hacked Like the SEC's

148

The Boeing 737 Max Crisis Reignites Arguments Over Infant Safety on Planes

149

Bitcoin ETFs Have Arrived. Here’s Who Stands to Get Rich

150

Child Abusers Are Getting Better at Using Crypto to Cover Their Tracks

151

US School Shooter Emergency Plans Exposed in a Highly Sensitive Database Leak

152

Lawmakers Are Out for Blood After a Hack of the SEC’s X Account Causes Bitcoin Chaos

153

The Fight to Unite iPhone and Android Users Is Far From Over

154

The Worst Hacks of 2023

155

How to Be More Anonymous Online

156

Scammers Are Ruining Facebook Marketplace

157

What It’s Like to Use Apple’s Lockdown Mode

158

This Clever New Idea Could Fix AirTag Stalking While Maximizing Privacy

159

America’s Big AI Safety Plan Faces a Budget Crunch

160

The Best Password Managers to Secure Your Digital Life

161

The Race to Fill Crypto’s FTX-Shaped Hole

162

A Major Ransomware Takedown Suffers a Strange Setback

163

Tesla Is Recalling Nearly All Vehicles Sold in US to Fix an Autopilot Fault

164

Scammers Are Tricking Anti-Vaxxers Into Buying Bogus Medical Documents

165

McDonald’s Ice Cream Machine Hackers Say They Found the ‘Smoking Gun’ That Killed Their Startup

166

Microsoft’s Digital Crime Unit Goes Deep on How It Disrupts Cybercrime

167

Hacker Group Linked to Russian Military Claims Credit for Cyberattack on Ukrainian Telecom

168

Congress Clashes Over the Future of America’s Global Spy Program

169

Ukraine Is Crowdfunding Its Reconstruction

170

A New Trick Uses AI to Jailbreak AI Models—Including GPT-4

171

Police Can Spy on Your iOS and Android Push Notifications

172

The 23andMe Data Breach Keeps Spiraling

173

How to Not Get Hacked by a QR Code

174

When It Comes to January 6 Lawsuits, a Court Splits Donald Trump in Two

175

Elon Musk Is Giving QAnon Believers Hope Just in Time for the 2024 Elections

176

A Civil Rights Firestorm Erupts Around a Looming Surveillance Power Grab

177

A Controversial US Surveillance Program May Get Slipped Into a ‘Must-Pass’ Defense Bill

178

Running Signal Will Soon Cost $50 Million a Year

179

No, You Don’t Need to Turn Off Apple’s NameDrop Feature in iOS 17

180

How to Make Your Web Searches More Secure and Private

181

The Bin Laden Letter Is Being Weaponized by the Far-Right

182

Inside the Race to Secure Formula 1’s Las Vegas Grand Prix

183

US Congress Report Calls for Privacy Reforms After FBI Surveillance ‘Abuses’

184

A Spy Agency Leaked People's Data Online—Then the Data Was Stolen

185

Norway’s Privacy Battle With Meta Is Just Getting Started

186

US Privacy Groups Urge Senate Not to Ram Through NSA Spying Powers

187

This New Tool Aims to Keep Terrorism Content Off the Internet

188

Here’s How Violent Extremists Are Exploiting Generative AI Tools

189

How to Get Facebook Without Ads—if It’s Available for You

190

The US and 30 Other Nations Agree to Set Guardrails for Military AI

191

YouTube’s Ad Blocker Detection Believed to Break EU Privacy Law

192

Where the Hell Is X CEO Linda Yaccarino?

193

Microsoft Does Damage Control With Its New ‘Secure Future Initiative’

194

The New Era of Social Media Looks as Bad for Privacy as the Last One

195

A Jury Will Decide If Google's App Store Is an Unjust Monopoly

196

X Banned the Account of a Major Critic. Now He’s Taking It to Court

197

Joe Biden’s Sweeping New Executive Order Aims to Drag the US Government into the Age of ChatGPT

198

TikTok Streamers Are Staging ‘Israel vs. Palestine’ Live Matches to Cash In on Virtual Gifts

199

Maine Mass Shooting Disinformation Floods Social Media as Suspect Remains at Large

200

Okta's Latest Security Breach Is Haunted by the Ghost of Incidents Past

201

A Controversial Plan to Scan Private Messages for Child Abuse Meets Fresh Scandal

202

Google Steps Up Its Push to Kill the Password

203

Citing Hamas, the US Wants to Officially Treat Crypto Anonymity Services as Suspected Money Launderers

204

Insiders Say X’s Crowdsourced Anti-Disinformation Tool Is Making the Problem Worse

205

Rumors of a ‘Global Day of Jihad’ Have Unleashed a Dangerous Wave of Disinformation

206

They Supported Air Strike Victims. Then They Were Doxed and Arrested

207

Deepfake Porn Is Out of Control

208

A New Protocol Vulnerability Will Haunt the Web for Years

209

How the FTX Thieves Have Tried to Launder Their $400 Million Haul

210

The UN Risks Normalizing Internet Censorship

211

Elon Musk Is Personally Undermining X’s Efforts to Curb Disinformation on the Israel-Hamas War

212

23andMe User Data Stolen in Targeted Attack on Ashkenazi Jews

213

Slovakia’s Election Deepfakes Show AI Is a Danger to Democracy

214

Your Cheap Android TV Streaming Box May Have a Dangerous Backdoor

215

How to Stop Google Bard From Storing Your Data and Location

216

The Biggest Hack of 2023 Keeps Getting Bigger

217

How to Tell When Your Phone Will Stop Getting Security Updates

218

The Maker of ShotSpotter Is Buying the World’s Most Infamous Predictive Policing Tech

219

US Justice Department Urged to Investigate Gunshot Detector Purchases

220

Extremely Online Republicans Are Provoking a US Government Shutdown

221

A Tricky New Way to Sneak Past Repressive Internet Censorship

222

Your Boss’s Spyware Could Train AI to Replace You

223

US and UK Mount Aggressive Crackdown on Trickbot and Conti Ransomware Gangs

224

Chinese Spies Infected Dozens of Networks With Thumb Drive Malware

225

Massive MGM and Caesars Hacks Epitomize a Vicious Ransomware Cycle

226

The US Congress Has Trust Issues. Generative AI Is Making It Worse

227

Top US Spies Meet With Privacy Experts Over Surveillance 'Crown Jewel'

228

The International Criminal Court Will Now Prosecute Cyberwar Crimes

229

China-Linked Hackers Breached a Power Grid—Again

230

The Comedy of Errors That Let China-Backed Hackers Steal Microsoft’s Signing Key

231

How China Demands Tech Firms Reveal Hackable Flaws in Their Products

232

Generative AI’s Biggest Security Flaw Is Not Easy to Fix

233

The Strange Afterlife of Wagner’s Yevgeny Prigozhin

234

How to Use Proton Sentinel to Keep Your Accounts Safe

235

Apple's Decision to Kill Its CSAM Photo-Scanning Tool Sparks Fresh Controversy

236

Nvidia Chip Shortages Leave AI Startups Scrambling for Computing Power

237

The Low-Stakes Race to Crack an Encrypted German U-Boat Message

238

The Weird, Big-Money World of Cybercrime Writing Contests

239

The Cheap Radio Hack That Disrupted Poland's Railway System

240

The Last Hour of Prigozhin’s Plane

241

Chatbots Got Big—and Their Ethical Red Flags Got Bigger

242

The Internet Is Turning Into a Data Black Box. An ‘Inspectability API’ Could Crack It Open

243

A New Supply Chain Attack Hit Close to 100 Victims—and Clues Point to China

244

Google's New Feature Ensures Your Pixel Phone Hasn't Been Hacked. Here’s How It Works

245

A Huge Scam Targeting Kids With Roblox and Fortnite ‘Offers’ Has Been Hiding in Plain Sight

246

The Plan to Better Protect US Hospitals From Ransomware

247

A Clever Honeypot Tricked Hackers Into Revealing Their Secrets

248

An Apple Malware-Flagging Tool Is ‘Trivially’ Easy to Bypass

249

Teens Hacked Boston Subway Cards to Get Infinite Free Rides—and This Time, Nobody Got Sued

250

Panasonic Warns That Internet-of-Things Malware Attack Cycles Are Accelerating

251

New ‘Downfall’ Flaw Exposes Valuable Data in Generations of Intel Chips

252

Criminals Have Created Their Own ChatGPT Clones

253

How to Automatically Delete Passcode Texts on Android and iOS

254

Hackers Could Have Scored Unlimited Airline Miles by Targeting One Platform

255

Norway Took On Meta’s Surveillance Ads and Won

256

It’s Getting Harder for the Government to Secretly Flag Your Social Posts

257

A New Attack Impacts Major AI Chatbots—and No One Knows How to Stop It

258

It's Hot Zero-Day Summer for Apple, Google, and Microsoft Security Fixes

259

US Spies Are Lobbying Congress to Save a Phone Surveillance 'Loophole'

260

Twitter Scammers Stole $1,000 From My Friend—So I Hunted Them Down

261

Code Kept Secret for Years Reveals Its Flaw—a Backdoor

262

Satellites Are Rife With Basic Security Flaws

263

New Police Body Cam Data Exposes the True Scale of NYPD Violence Against Protesters

264

Rival US Lawmakers Mobilize to Stop Police From Buying Phone Data

265

FBI Surveillance Fears Are Uniting a Badly Broken Congress

266

Silk Road’s Second-in-Command Gets 20 Years in Prison

267

Ransomware Attacks Are on the Rise, Again

268

How to Use Discord’s ‘Family Center’ Safety Settings for Your Kids

269

The Quiet Rise of Real-Time Crime Centers

270

Don't Join Threads—Make Threads Join You

271

US Spies Are Buying Americans' Private Data. Congress Has a New Chance to Stop It

272

The US Senate Wants to Reign In AI. Good Luck With That

273

Apple, Google, and MOVEit Just Patched Serious Security Flaws

274

Pornhub Is Being Accused of Illegal Data Collection

275

How Your Real Flight Reservation Can Be Used to Scam You

276

5 Ways to Make Your Instant Messaging More Secure

277

Inside the Illicit Market for Abortion Pills on Telegram

278

Docs Show FBI Pressures Cops to Keep Phone Surveillance Secrets

279

How Your New Car Tracks You

280

Humans Aren’t Mentally Ready for an AI-Saturated ‘Post-Truth World’

281

How a Shady Chinese Firm’s Encryption Chips Got Inside the US Navy, NATO, and NASA

282

The US Is Openly Stockpiling Dirt on All Its Citizens

283

A Massive Vaccine Database Leak Exposes IDs of Millions of Indians

284

Inside 4chan’s Top-Secret Moderation Machine

285

The Bizarre Reality of Getting Online in North Korea

286

The Bold Plan to Create Cyber 311 Hotlines

287

The Messy US Influence That's Helping Iranians Stay Online

288

Hacks Against Ukraine's Emergency Response Services Rise During Bombings

289

Kaspersky Says New Zero-Day Malware Hit iPhones—Including Its Own

290

Millions of PC Motherboards Were Sold With a Firmware Backdoor

291

China Hacks US Critical Networks in Guam, Raising Cyberwar Fears

292

The Security Hole at the Heart of ChatGPT and Bing

293

A Popular Password Hashing Algorithm Starts Its Long Goodbye

294

Chinese Labs Are Selling Fentanyl Ingredients for Millions in Crypto

295

There’s Finally a Way to Secure a Crucial Piece of the Cloud

296

The Real Risks in Google’s New .Zip and .Mov Domains

297

A Mysterious Group Has Ties to 15 Years of Ukraine-Russia Hacks

298

Google May Delete Your Old Accounts. Here’s How to Stop It

299

ChatGPT Scams Are Infiltrating the App Store and Google Play

300

A New Lawsuit Puts the Online White Supremacy Pipeline on Trial

301

The UK’s Secretive Web Surveillance Program Is Ramping Up

302

A Republican-Led Lawsuit Threatens Critical US Cyber Protections

303

Twitter’s Encrypted DMs Are Deeply Inferior to Signal and WhatsApp

304

A Mysterious New Hacker Group Is Lurking in Ukraine’s Cyberspace

305

How To Delete Your Data From ChatGPT

306

The Data Broker That Targeted Abortion Clinics Landed a US Military Contract

307

The DOJ Detected the SolarWinds Hack 6 Months Earlier Than First Disclosed

308

Google Is Rolling Out Password-Killing Tech to All Accounts

309

Meta Is Trying to Push Attackers to the Brink

310

With 288 Arrests, Feds Reveal a Widening Dragnet of Dark Web Busts

311

The High-Stakes Scramble to Stop Classified Leaks

312

A US Bill Would Ban Kids Under 13 From Joining Social Media

313

Brace Yourself for the 2024 Deepfake Election

314

A Security Team Is Turning This Malware Gang’s Tricks Against It

315

Google’s Authenticator App Just Got a Handy New 2FA Tool

316

Intel Let Google Cloud Hack Its New Secure Chips and Found 10 Bugs

317

The Huge 3CX Breach Was Actually 2 Linked Supply Chain Attacks

318

Chinese Cops Ran Troll Farm and Secret NY Police Station, US Says

319

How ChatGPT, and Bots Like It, Can Spread Malware

320

Used Routers Often Come Loaded With Corporate Secrets

321

Newly Discovered LockBit Mac Ransomware Doesn't Work—Yet

322

Leaked Pentagon Documents May Herald a New Era of Revelations

323

The Hacking of ChatGPT Is Just Getting Started

324

LinkedIn Will Finally Offer Ways to Verify Your Job

325

How to Use Apple’s New All-In-One Password Manager

326

The Open Source VPN Out-Maneuvering Russian Censorship

327

The Dangerous Weak Link in the US Food Chain

328

ChatGPT Has a Big Privacy Problem

329

The Massive 3CX Supply Chain Hack Targeted Cryptocurrency Firms

330

Tor Project’s New Privacy-Focused Browser Lets You Layer a VPN

331

You’ll Soon Need to Show ID to Watch Porn Online

332

The US Is Sending Money to Countries Devastated by Cyberattacks

333

They Posted Porn on Twitter. German Authorities Called the Cops

334

North Korea Is Now Mining Crypto to Launder Its Stolen Loot

335

The Uniquely American Future of US Authoritarianism

336

The TikTok Hearing Revealed That Congress Is the Problem

337

Some Photo-Cropping Apps Are Exposing Your Secrets

338

The Scorched-Earth Tactics of Iran’s Cyber Army

339

Online Sleuths Untangle the Mystery of the Nord Stream Sabotage

340

I Got Investigated by the Secret Service. Here's How to Not Be Me

341

A Spy Wants to Connect With You on LinkedIn

342

This Is the New Leader of Russia's Infamous Sandworm Hacking Unit

343

AI-Generated Voice Deepfakes Aren’t Scary Good—Yet

344

Ransomware Attacks Have Entered a ‘Heinous’ New Phase

345

‘Pig Butchering’ Scams Are Now a $3 Billion Threat

346

A US Congressman Says the FBI Unlawfully Targeted Him

347

The US Air Force Is Moving Fast on AI-Piloted Fighter Jets

348

The FBI Just Admitted It Bought U.S. Location Data

349

The High-Stakes Blame Game in the White House Cybersecurity Plan

350

The Sketchy Plan to Build a Russian Android Phone

351

This Hacker Tool Can Pinpoint a DJI Drone Operator’s Exact Location

352

Twitter's Two-Factor Authentication Change 'Doesn't Make Sense'

353

Apple Users Need to Update iOS Now to Patch Serious Flaws

354

China Is Relentlessly Hacking Its Neighbors

355

Ukraine Suffered More Data-Wiping Malware Last Year Than Anywhere, Ever

356

You Can’t Trust App Developers’ Privacy Claims on Google Play

357

Crypto Buyers Beware: 1 in 4 New Tokens of Any Value Is a Scam

358

US Border Patrol Is Finally Able to Check E-Passport Data

359

A New Kind of Bug Spells Trouble for iOS and macOS Security

360

How to Protect Yourself from Twitter’s 2FA Crackdown

361

The Political Theater Behind the Bipartisan Data Privacy Push

362

Russia’s Ransomware Gangs Are Being Named and Shamed

363

How the US Can Stop Data Brokers' Worst Practices—Right Now

364

Meet the Creator of North Korean Hackers’ New Favorite Crypto Privacy Service

365

Want to Delete Your Twitter DMs? Good Luck With That

366

Spotted a UFO? There’s an App for That

367

Inside Safe City, Moscow’s AI Surveillance Dystopia

368

Netflix’s US Password-Sharing Crackdown Isn’t Happening—Yet

369

Congress Has a Lo-Fi Plan to Fix the Classified Documents Mess

370

Fact-Checkers Are Scrambling to Fight Disinformation With AI

371

Ex-Twitter Workers Puzzle Over Elon Musk’s Abandoned Laptops

372

Enter the Hunter Satellites Preparing for Space War

373

The Untold Story of a Crippling Ransomware Attack

374

Most Criminal Cryptocurrency Funnels Through Just 5 Exchanges

375

The Flight Tracker That Powered @ElonJet Just Took a Left Turn

376

You Might Survive a Nuclear Blast—if You Have the Right Shelter

377

The Unrelenting Menace of the LockBit Ransomware Gang

378

India’s Public Education App Exposed Millions of Students’ Data

379

T-Mobile’s $150 Million Security Plan Isn’t Cutting It

380

Welcome to the Era of Internet Blackouts

381

The Small but Mighty Danger of Echo Chamber Extremism

382

A Sneaky Ad Scam Tore Through 11 Million Phones

383

Spy Cams Reveal the Grim Reality of Slaughterhouse Gas Chambers

384

A Widespread Logic Controller Flaw Raises the Specter of Stuxnet

385

All the Data Apple Collects About You—and How to Limit It

386

In the Fight Against Scams, ‘Cyber Ambassadors’ Enter the Chat

387

What Twitter’s 200 Million-User Email Leak Actually Means

388

Notorious Russian Spies Piggybacked on Other Hackers’ USB Infections

389

WhatsApp Launches Tool to Fight Internet Censorship

390

The Password Isn’t Dead Yet. You Need a Hardware Key

391

Cops Hacked Thousands of Phones. Was It Legal?

392

Hacker Lexicon: What Is a Pig Butchering Scam?

393

Hands On With Flipper Zero, the Hacker Tool Blowing Up on TikTok

394

Russia’s Cyberwar Foreshadowed Deadly Attacks on Civilians

395

Hacktivism Is Back and Messier Than Ever

396

The Most Dangerous People on the Internet in 2022

397

The Dangers of Censoring Real-Time Flight Trackers

398

Ransomware Gang Abused Microsoft Certificates to Sign Malware

399

Meta’s Tricky Quest to Protect Your Account

400

Hackers Planted Files to Frame an Indian Priest Who Died in Custody

401

A New Lawsuit Accuses Meta of Inflaming Civil War in Ethiopia

402

Popular HR and Payroll Company Sequoia Discloses a Data Breach

403

What You Should Know Before Using the Lensa AI App

404

A Year Later, That Brutal Log4j Vulnerability Is Still Lurking

405

Elon Musk’s Twitter Files Are a Feast for Conspiracy Theorists

406

Apple Kills Its Plan to Scan Your Photos for CSAM. Here’s What’s Next

407

Scammers Are Scamming Other Scammers Out of Millions of Dollars

408

Apple Expands End-to-End Encryption to iCloud Backups

409

The Invasive Reach of ‘Digital-by-Default’ Immigration

410

Android Phone Makers' Encryption Keys Stolen and Used in Malware

411

Google Moves to Block Invasive Spanish Spyware Framework

412

Redacted Documents Are Not as Secure as You Think

413

Autonomous Vehicles Join the List of US National Security Threats

414

The US Has a Bomb-Sniffing Dog Shortage

415

Here’s How Bad a Twitter Mega-Breach Would Be

416

Telehealth Sites Put Addiction Patient Data at Risk

417

Twitter’s SMS Two-Factor Authentication Is Melting Down

418

China’s Digital Yuan Works Just Like Cash—With Added Surveillance

419

Clearview Stole My Face and the EU Can’t Do Anything About It

420

Russia's Sway Over Criminal Ransomware Gangs Is Coming Into Focus

421

Russia’s New Cyberwarfare in Ukraine Is Fast, Dirty, and Relentless

422

Elon Musk’s Twitter Is a Scammer’s Paradise

423

Inside the ‘Election Integrity’ App Built to Purge US Voter Rolls

424

How to Prepare for the End of Card Payments

425

IRS Seizes Another Silk Road Hacker's $3.36 Bitcoin Stash

426

Soccer Fans, You’re Being Watched

427

The 'Viral' Secure Programming Language That's Taking Over Tech

428

The Most Vulnerable Place on the Internet

429

When Your Neighbor Turns You In

430

If Musk Starts Firing Twitter's Security Team, Run

431

The Election That Saved the Internet From Russia and China

432

A Bug in Apple MacOS Ventura Breaks Third-Party Security Tools

433

A Pro-China Disinfo Campaign Is Targeting US Elections—Badly

434

Hot on the Trail of a Mass-School-Shooting Hoaxer

435

Ukraine Enters a Dark New Era of Drone Warfare

436

Your Microsoft Exchange Server Is a Security Liability

437

This Ransomware Gang Thrives in a Crucial Blind Spot

438

How the World Will Know If Russia Is Preparing to Launch a Nuke

439

How to Use Passkeys in Google Chrome and Android

440

The Hunt for Wikipedia's Disinformation Moles

441

Google’s Pixel 7 Packs a Beefed-Up Security Chip

442

Meta Says It Has Busted More Than 400 Login-Stealing Apps This Year

443

Biden’s Privacy Order Slaps a Band-Aid on the EU-US Data Crisis

444

The Uber Data Breach Conviction Shows Security Execs What Not to Do

445

The High Cost of Living Your Life Online

446

The Challenge of Cracking Iran’s Internet Blockade

447

Cloudflare Takes a Stab at a Captcha That Doesn’t Suck

448

Mystery Hackers Are ‘Hyperjacking’ Targets for Insidious Spying

449

The Race to Find the Nord Stream Saboteurs

450

How to Advocate for Data Privacy and Users' Rights

451

The Dire Warnings in the Lapsus$ Hacker Joyride

452

This Chatbot Aims to Steer People Away From Child Abuse Material

453

VPN Providers Flee India as a New Data Law Takes Hold

454

This Vote Could Change the Course of Internet History

455

Iran’s Internet Shutdown Sparks Fear of a Deadly Cover-Up

456

Slack and Teams’ Lax App Security Raises Alarms

457

A New Linux Tool Aims to Guard Against Supply Chain Attacks

458

Shadowy Russian Cell Phone Companies Are Cropping Up in Ukraine

459

Telegram Has a Serious Doxing Problem

460

The Deep Roots of Nigeria’s Cybersecurity Problem

461

The Uber Hack’s Devastation Is Just Starting to Reveal Itself

462

The Shaky Future of a Post-Roe Federal Privacy Law

463

Ukraine’s Cyberwar Chief Sounds Like He’s Winning

464

How Whistleblowers Navigate a Security Minefield

465

iOS 16 Has Two New Security Features for Worst-Case Scenarios

466

This Clever Anti-Censorship Tool Lets Russians Read Blocked News

467

A Windows 11 Automation Tool Can Easily Be Hijacked

468

Apple’s Killing the Password. Here’s Everything You Need to Know

469

It’s Time to Get Real About TikTok’s Risks

470

The US May Soon Learn What a ‘Kid-Friendly’ Internet Looks Like

471

Careless Errors in Hundreds of Apps Could Expose Troves of Data

472

You’re Not Stringer Bell, but You May Still Need a Burner Phone

473

Why the Twilio Breach Cuts So Deep

474

The Privacy Flaw Threatening US Democracy

475

The Low Threshold for Face Recognition in New Delhi

476

Spyware Hunters Are Expanding Their Toolset

477

Inside the World’s Biggest Hacker Rickroll

478

A Flaw in the VA's Medical Records Platform May Put Patients at Risk

479

A New Jailbreak for John Deere Tractors Rides the Right-to-Repair Wave

480

Zoom’s Auto-Update Feature Came With Hidden Risks on Mac

481

Sloppy Software Patches Are a ‘Disturbing Trend’

482

A Long-Awaited IoT Reverse Engineering Tool Is Finally Here

483

A Phone Carrier That Doesn't Track Your Browsing or Location

484

This Anti-Tracking Tool Checks If You’re Being Followed

485

The Hacking of Starlink Terminals Has Begun

486

Big Takeaways From the FBI's Mar-a-Lago Raid

487

All the Data Amazon’s Ring Cameras Collect About You

488

An Attack on Albanian Government Suggests New Iranian Aggression

489

The Microsoft Team Racing to Catch Bugs Before They Happen

490

Bitcoin Fog Case Could Put Cryptocurrency Tracing on Trial

491

How Tor Is Fighting—and Beating—Russian Censorship

492

How to Safely Lend Someone Else Your Phone

493

Interstate Travel Post Roe Isn’t as Secure as You May Think

494

Russia Is Quietly Ramping Up Its Internet Censorship Machine

495

The 2022 US Midterm Elections' Top Security Issue: Death Threats

496

The Unsolved Mystery Attack on Internet Cables in Paris

497

Don’t Look Now, but Congress Might Pass an Actually Good Privacy Bill

498

Instagram Slow to Tackle Bots Targeting Iranian Women’s Groups

499

The Most Popular Period-Tracking Apps, Ranked by Data Privacy

500

A New Attack Can Unmask Anonymous Users on Any Major Browser

501

A Privacy Panic Flares Up in India After Police Pull Payment Data

502

Will These Algorithms Save You From Quantum Threats?

503

Russian ‘Hacktivists’ Are Causing Trouble Far Beyond Ukraine

504

How to Avoid the Worst Instagram Scams

505

Apple’s Lockdown Mode Aims to Counter Spyware Threats

506

The Worst Hacks and Breaches of 2022 So Far

507

End-to-End Encryption’s Central Role in Modern Self-Defense

508

How to Use Microsoft Defender on All Your Devices

509

Google Warns of New Spyware Targeting iOS and Android Users

510

Here’s Why You’re Still Stuck in Robocall Hell

511

Brave Now Lets You Customize Search Results—for Better or Worse

512

The January 6 Hearing Was a Warning

513

Shanghai’s Censors Can’t Hide Stories of the Dead

514

Russia Is Taking Over Ukraine’s Internet

515

Police Linked to Hacking Campaign to Frame Indian Activists

516

How a Saxophonist Tricked the KBG by Encrypting Secrets in Music

517

Conti's Attack Against Costa Rica Sparks a New Ransomware Era

518

A Long-Awaited Defense Against Data Leaks May Have Just Arrived

519

Fertility and Period Apps Can Be Weaponized in a Post-Roe World

520

Disinfo and Hate Speech Flood TikTok Ahead of Kenya’s Elections

521

AlphaBay Is Taking Over the Dark Web—Again

522

Actively Exploited Microsoft Zero-Day Flaw Still Doesn't Have a Patch

523

The Fight Against Robocall Spam and Scams Heats Up in India

524

The Hacker Gold Rush That’s Poised to Eclipse Ransomware

525

The Race to Hide Your Voice

526

Good Luck Not Accidentally Hiring a North Korean Scammer

527

Open Source Intelligence May Be Changing Old-School War

528

Proton Is Trying to Become Google—Without Your Data

529

The Surveillance State Is Primed for Criminalized Abortion

530

US Courts Are Coming After Crypto Exchanges That Skirt Sanctions

531

The Hidden Race to Protect the US Bioeconomy From Hacker Threats

532

The EU Wants Big Tech to Scan Your Private Chats for Child Abuse

533

The Case for War Crimes Charges Against Russia’s Sandworm Hackers

534

AMD Gave Google Cloud Rare Access to Its Tech to Hunt Chip Flaws

535

Apple Mail Now Blocks Email Tracking. Here’s What It Means for You

536

India’s New Super App Has a Privacy Problem

537

How to Remove Your Personal Info From Google's Search Results

538

Ukraine’s Digital Battle With Russia Isn’t Going as Expected

539

Hollywood’s Fight Against VPNs Turns Ugly

540

North Koreans Are Jailbreaking Phones to Access Forbidden Media

541

Russia Is Being Hacked at an Unprecedented Scale

542

The US Saw a Spike in Child Sexual Abuse URLs in 2021

543

A $3 Billion Silk Road Seizure Will Erase Ross Ulbricht’s Debt

544

Netflix Can Cut Off Moochers Without a Password-Sharing Crackdown

545

Hackers Are Getting Caught Exploiting New Bugs More Than Ever

546

It Was a Good Month for Fighting Cybercrime. Don't Get Comfortable

547

WhatsApp Doubles Down With End-to-End Encrypted ‘Communities’

548

Russia's Sandworm Hackers Attempted a Third Blackout in Ukraine

549

Feds Uncover a ‘Swiss Army Knife’ for Hacking Industrial Control Systems

550

How to Limit Who Can Contact You on Instagram

551

Europe Is Building a Huge International Facial Recognition System

552

The Senate Bill That Has Big Tech Scared

553

How Russia's Invasion Triggered a US Crackdown on Its Hackers

554

NFTs Are a Privacy and Security Nightmare

555

Blockchains Have a ‘Bridge’ Problem, and Hackers Know It

556

How Explosions Actually Kill

557

Researchers Used a Decommissioned Satellite to Broadcast Hacker TV

558

Leaked Details of the Lapsus$ Hack Make Okta’s Slow Response Look More Bizarre

559

A Sinister Way to Beat Multifactor Authentication Is on the Rise

560

Forcing WhatsApp and iMessage to Work Together Is Doomed to Fail

561

Stop Tracking Your Loved Ones

562

The Future of Digital Cash Is Not on the Blockchain

563

Feds Allege Destructive Russian Hackers Targeted US Refineries

564

The Fragile Open Source Ecosystem Isn’t Ready for ‘Protestware’

565

The Third-Party Okta Hack Leaves Customers Scrambling

566

A Mysterious Satellite Hack Has Victims Far Beyond Ukraine

567

The Big, Baffling Crypto Dreams of a $180 Million Ransomware Gang

568

How to Limit Who Can Contact You on Twitter

569

The Enduring Danger of Cluster Bombs

570

Leaked Ransomware Docs Show Conti Helping Putin From the Shadows

571

The Workaday Life of the World’s Most Dangerous Ransomware Gang

572

A Big Bet to Kill the Password for Good

573

Chinese Spies Hacked a Livestock App to Breach US State Networks

574

Critical Bugs Expose Hundreds of Thousands of Medical Devices and ATMs

575

How Police Abuse Phone Data to Persecute LGBTQ People

576

How Ukraine's Internet Can Fend Off Russian Attacks

577

Hacktivists Stoke Pandemonium Amid Russia’s War in Ukraine

578

Ice Cream Machine Hackers Sue McDonald's for $900 Million

579

Russia's Sandworm Hackers Have Built a Botnet of Firewalls

580

The Quiet Way Advertisers Are Tracking Your Browsing

581

Meanie in a Bottle: An Internet Troll Gives Nonalcoholic Spirits Startups the Spins

582

Ukraine’s Volunteer ‘IT Army’ Is Hacking in Uncharted Territory

583

An ‘Unhinged’ Putin Threatens Dangerous Escalation in Ukraine War

584

Inside the Lab Where Intel Tries to Hack Its Own Chips

585

How to Use Google Chrome's Enhanced Safety Mode2/28

586

An Optical Spy Trick Can Turn Any Shiny Object Into a Bug

587

US Agencies Say Russian Hackers Compromised Defense Contractors

588

Twitter Has Started Blocking Porn in Germany

589

Is Firefox Okay?

590

Hackers Rigged Hundreds of Ecommerce Sites to Steal Payment Info

591

Are You Being Tracked by an AirTag? Here’s How to Check

592

Microsoft's Small Step to Disable Macros Is a Huge Win for Security

593

Playing With Crypto? You’ll Need a Wallet (or Several)

594

The DOJ's $3.6B Bitcoin Seizure Shows How Hard It Is to Launder Crypto

595

Cryptocurrency Is Funding Ukraine's Defense—and Its Hacktivists

596

The Alt-Right on Facebook Are Hijacking Canada’s Trucker Blockade

597

An Insidious Mac Malware Is Growing More Sophisticated

598

Health Sites Let Ads Track Visitors Without Telling Them

599

Out-of-Control Cybercrime Will Cause More Real-World Harm

600

North Korea Hacked Him. So He Took Down Its Internet

601

Inside Trickbot, Russia’s Notorious Ransomware Gang

602

Welcome to the Burner Phone Olympics

603

Google Has a New Plan to Kill Cookies. People Are Still Mad

604

Safari Flaws Exposed Webcams, Online Accounts, and More

605

Why the Belarus Railways Hack Marks a First for Ransomware

606

Now Is a Good Time to Update Your Recovery Email Addresses

607

Europe’s Move Against Google Analytics Is Just the Beginning

608

A Bug in iOS 15 Is Leaking User Browsing Activity in Real Time

609

Destructive Hacks Against Ukraine Echo Its Last Cyberwar

610

'Zero-Click’ Zoom Vulnerabilities Could Have Exposed Calls

611

Russia Takes Down REvil Hackers—as Ukraine Tensions Mount

612

How Apple's iCloud Private Relay Can Keep You Safe

613

NSO Group Spyware Targeted Dozens of Reporters in El Salvador

614

North Korean Hackers Stole Nearly $400 Million in Crypto Last Year

615

Apple’s Private Relay Roils Telecoms Around the World

616

How to Read Your iOS 15 App Privacy Report

617

The FTC Wants Companies to Find Log4j Fast. It Won't Be So Easy

618

Signal's Cryptocurrency Feature Has Gone Worldwide

619

Hackers Are Exploiting a Flaw Microsoft Fixed 9 Years Ago

620

The Next Wave of Log4J Attacks Will Be Brutal

621

6 Ways to Delete Yourself From the Internet

622

The Worst Hacks of 2021

623

Meta Removes 7 Surveillance-for-Hire Operations From Its Platforms

624

How to Guard Against Smishing Attacks on Your Phone

625

Google Warns That NSO Hacking Is on Par Elite Nation State Spies

626

The Log4J Vulnerability Will Haunt the Internet for Years

627

The Biggest Deepfake Abuse Site Is Growing in Disturbing Ways

628

‘The Internet Is on Fire’

629

Microsoft Seizes Domains Used by a Chinese Hacking Group

630

A Year After the SolarWinds Hack, Supply Chain Threats Still Loom

631

Russia’s Internet Censorship Machine Is Going After Tor

632

Researchers Have a Method to Spot Reddit’s State-Backed Trolls

633

NSO Group Spyware Hits at Least 9 US State Department Phones

634

Facebook Will Force More At-Risk Accounts to Use Two-Factor

635

A Bunch of Malicious Google Play Apps Stole User Banking Info

636

A Software Bug Let Hackers Drain $31M From a Crypto Service

637

The McDonald's Ice Cream Machine Hacking Saga Has a New Twist

638

Hacker Lexicon: What Is a Watering Hole Attack?

639

A Hacking Spree Against Iran Spills Out Into the Physical World

640

Iranian Hackers Are Going After US Critical Infrastructure

641

Locked Out of ‘God Mode,’ Runners Are Hacking Their Treadmills

642

How Iran Tried to Undermine the 2020 US Presidential Election

643

DuckDuckGo Wants to Stop Apps From Tracking You on Android

644

‘Ghostwriter’ Looked Like a Purely Russian Op—Except It's Not

645

Another Intel Chip Flaw Puts a Slew of Gadgets at Risk

646

Hackers Targeted Apple Devices in Hong Kong for Widespread Attack

647

The Sneaky Way TikTok Is Connecting You to Real-Life Friends

648

The Biggest Ransomware Bust Yet Might Actually Make an Impact

649

A Drone Tried to Disrupt the Power Grid. It Won't Be the Last

650

Ignore China’s New Data Privacy Law at Your Peril

651

1.8TB of Police Helicopter Surveillance Footage Leaks Online

652

How to Use iCloud+'s New Security Features

653

How a Squid Game Crypto Scam Got Away With Millions

654

An Apparent Ransomware Hack Puts the NRA in a Bind

655

Blind People Won the Right to Break Ebook DRM. In 3 Years, They'll Have to Do It Again

656

Dark Web Drug Busts Lead to 150 Arrests

657

This AI Predicts How Old Children Are. Can It Keep Them Safe?

658

11 Security Settings You Should Know About in Windows 11

659

New Sex Toy Standards Let Some Sensitive Details Slide

660

How Hackers Hijacked Thousands of High-Profile YouTube Accounts

661

Missouri Threatens to Sue a Reporter Who Flagged a Security Flaw

662

A Telegram Bot Told Iranian Hackers When They Got a Hit

663

Telegram Is Becoming a Cesspool of Anti-Semitic Content

664

Cloudflare Isn't Liable for Sites That Hawk Counterfeits

665

How to Permanently Delete Your Facebook Account

666

How to Get Your Family to Actually Use a Password Manager

667

A Devastating Twitch Hack Sends Streamers Reeling

668

Hundreds of Scam Apps Hit Over 10 Million Android Devices

669

A Simple Bug Is Leaving AirTag Users Vulnerable to an Attack

670

Why James Bond Doesn’t Use an iPhone

671

How a Secret Google Geofence Warrant Helped Catch the Capitol Riot Mob

672

He Escaped the Dark Web's Biggest Bust. Now He's Back

673

The iOS 15 Privacy Settings You Should Change Right Now

674

Apple and Google Go Further Than Ever to Appease Russia

675

How to Set Up a NAS to Securely Share Files

676

A New App Helps Iranians Hide Messages in Plain Sight

677

Anonymous Leaked a Bunch of Data From a Right-Wing Web Host

678

You Can Now Ditch the Password on Your Microsoft Account

679

LA Police Are Collecting Detainees' Social Media Information

680

What Is Zero Trust? It Depends What You Want to Hear

681

How to Find the Hidden Files on Your Phone or Computer

682

WhatsApp Fixes Its Biggest Encryption Loophole

683

The Texas Abortion ‘Whistleblower’ Site Still Can't Find a Host

684

ProtonMail Amends Its Policy After Giving Up an Activist’s Data

685

What Apple Can Do Next to Fight Child Sexual Abuse

686

38M Records Were Exposed Online—Including Contact-Tracing Info

687

What It'll Take to Get Power Back in New Orleans After Hurricane Ida

688

6 Things You Need to Do to Prevent Getting Hacked

689

A Bad Solar Storm Could Cause an 'Internet Apocalypse'

690

The Stealthy iPhone Hacks That Apple Still Can't Stop

691

Hackers Could Increase Medication Doses Through Infusion Pump Flaws

692

Google Docs Scams Still Pose a Threat

693

China Aims Its Propaganda Firehose at the BBC

694

How to Send Messages That Automatically Disappear

695

A Simple Software Fix Could Limit Location Data Sharing

696

How the Far Right Exploded on Steam and Discord

697

AI Wrote Better Phishing Emails Than Humans in a Recent Test

698

The NYPD Had a Secret Fund for Surveillance Tools

699

A 5G Shortcut Leaves Phones Exposed to Stingray Surveillance

700

What You Should Know About the Google Play Store Changes

701

All the Ways Spotify Tracks You—and How to Stop It

702

Citizen's New Service Helps Paying Users Summon the Cops

703

Messaging Apps Have an Eavesdropping Problem

704

France Cracked Down on Google’s Ad Tech. What’s Next?

705

Hospitals Still Use Pneumatic Tubes—and They Can Be Hacked

706

A Guide to RCS, and Why It Makes Texting So Much Better

707

The Privacy Battle That Apple Isn’t Fighting

708

Phantom Warships Are Courting Chaos in Conflict Zones

709

A Controversial Tool Calls Out Thousands of Hackable Websites

710

The Shapeshifting Cam Girl Rewriting the Rules of Digital Porn

711

The Kaseya Ransomware Nightmare Is Almost Over

712

An Explosive Spyware Report Shows the Limits of iOS Security

713

Venmo Gets More Private—but It's Still Not Fully Safe

714

How China's Hacking Entered a Reckless New Phase

715

Hackers Got Past Windows Hello by Tricking a Webcam

716

Cuba’s Social Media Blackout Reflects an Alarming New Normal

717

Facebook Catches Iranian Spies Catfishing US Military Targets

718

Germany Is About to Block One of the Biggest Porn Sites

719

WhatsApp Has a Secure Fix for One of Its Biggest Drawbacks

720

Beyond Kaseya: Everyday IT Tools Can Offer ‘God Mode’ for Hackers

721

An Office Phone Flaw Can’t Be Fixed By Cisco Alone

722

A New System Is Helping Crack Down on Child Sex Abuse Images

723

How to Make Your Web Searches More Secure and Private

724

Europe Makes the Case to Ban Biometric Surveillance

725

Echo Dots Store a Wealth of Data—Even After You Reset Them

726

The Unfixed Flaw at the Heart of REvil’s Ransomware Spree

727

How REvil Ransomware Took Out Thousands of Business at Once

728

A New Kind of Ransomware Tsunami Hits Hundreds of Companies

729

Why the Password Isn't Dead Quite Yet

730

Russian Hackers Are Trying to Brute-Force Hundreds of Networks

731

Windows 11’s Security Push Puts Microsoft on a Collision Course

732

SolarWinds Hackers Continue Assault With a New Microsoft Breach

733

What the Pentagon’s New UFO Report Reveals About Humankind

734

The US Takedown of Iranian Media Sites Extends a Thorny Precedent

735

A Well-Meaning Feature Leaves Millions of Dell PCs Vulnerable

736

NFC Flaws Let Researchers Hack ATMs by Waving a Phone

737

All the Ways Amazon Tracks You—and How to Stop It

738

A New Tool Wants to Save Open Source From Supply Chain Attacks

739

As Ransomware Demands Boom, Insurance Companies Keep Paying Out

740

The FBI's Anom Stunt Rattles the Encryption Debate

741

Apple Says It's Time to Digitize Your ID, Ready or Not

742

What You Should Know About Voilá, the Latest Viral Selfie App

743

The Safest Way to Store and Share Your Nudes

744

Ransomware Struck Another Pipeline Firm—and 70GB of Data Leaked

745

How an Obscure Company Took Down Big Chunks of the Internet

746

How to Protect Your Files From Ransomware

747

Microsoft’s Vote Tracking Software Clears a Major Hurdle

748

Ransomware Hits a Food Supply Giant—and Underscores a Dire Threat

749

The SolarWinds Hackers Aren't 'Back.' They Never Went Away

750

Hacker Lexicon: What Is a Supply Chain Attack?

751

Apple's M1 Chip Has a Fascinating Flaw

752

The Bizarro Streaming Site That Hackers Built From Scratch

753

Blurry Satellite Images of Palestine and Israel Make Rebuilding Harder

754

Goodbye Internet Explorer—and Good Riddance

755

How to Avoid Those Infuriating Cookie Pop-Ups

756

How to Avoid App Store Scams

757

Ransomware's Dangerous New Trick Is Double-Encrypting Your Data

758

The Colonial Pipeline Hack Is a New Extreme for Ransomware

759

DarkSide Ransomware Hit Colonial Pipeline—and Created an Unholy Mess

760

How a Former Netflix Exec Built a Brazen Bribery Scheme

761

WhatsApp’s New Privacy Policy Just Kicked In. Here’s What You Need to Know

762

What's Google FLoC? And How Does It Affect Your Privacy?

763

I’m Not a Robot! So Why Won’t Captchas Believe Me?

764

Twitter's Tip Jar Privacy Fiasco Was Entirely Avoidable

765

Google's Grand Plan to Eradicate Cookies Is Crumbling

766

An Ambitious Plan to Tackle Ransomware Faces Long Odds

767

Feds Arrest an Alleged $336M Bitcoin-Laundering Kingpin

768

The New iOS Update Lets You Stop Ads From Tracking You—So Do It

769

AirDrop Is Leaking Email Addresses and Phone Numbers

770

Hackers Used ‘Mind-Blowing’ Bug to Sneak Past macOS Safeguards

771

VPN Hacks Are a Slow-Motion Disaster

772

Apple’s Ransomware Mess Is the Future of Online Extortion

773

A Clubhouse Bug Let People Lurk in Rooms Invisibly

774

Palestinian Hackers Tricked Victims Into Installing iOS Spyware

775

A New Facebook Bug Exposes Millions of Email Addresses

776

The Biggest Security Threats to the US Are the Hardest to Define

777

100 Million More IoT Devices Are Exposed—and They Won't Be the Last

778

US Sanctions on Russia Rewrite Cyberespionage's Rules

779

The FBI Takes a Drastic Step to Fight China’s Hacking Spree

780

Facebook Had Years to Fix the Flaw That Leaked 500M Users' Data

781

Internet Shutdown Is an Act of ‘Vast Self-Harm’

782

A Far-Right Extremist Allegedly Plotted to Blow Up Amazon Data Centers

783

Russia May Have Found a New Way to Censor the Internet

784

Twitch Will Act on ‘Serious’ Offenses That Happen Off-Platform

785

Hackers Are Exploiting Discord and Slack Links to Serve Up Malware

786

Signal Adds a Payments Feature—With a Privacy-Focused Cryptocurrency

787

The UK Is Trying to Stop Facebook's End-to-End Encryption

788

The Opportunities—and Obstacles—for Women at NSA and Cyber Command

789

The Threat to the Water Supply Is Real—and Only Getting Worse

790

How to Keep Nearby Strangers from Sending You Files

791

The Dark Web Is Teeming With Vaccine Listings Right Now

792

Facebook Moves Against ‘Evil Eye’ Hackers Targeting Uyghurs

793

‘Browser Isolation’ Takes On Entrenched Web Threats

794

The Peculiar Ransomware Piggybacking Off of China’s Big Hack

795

A SpaceX Engineer's Dark Web Insider Trading Sparks an SEC First

796

With Spectre Still Lurking, Google Looks to Protect the Web

797

Facebook's ‘Red Team X’ Hunts Bugs Beyond the Social Network's Walls

798

Foreign Meddling Flooded the 2020 Election—but Not by Hackers

799

Apple Bent the Rules for Russia—and Other Countries Will Take Note

800

The UK Is Secretly Testing a Controversial Web Snooping Tool

801

Netflix's Password-Sharing Crackdown Has a Silver Lining

802

How to Export Your Passwords From LastPass

803

It’s Open Season for Microsoft Exchange Hacks

804

Gab's CTO Introduced a Critical Vulnerability to the Site

805

‘Retaliation’ for Russia's SolarWinds Spying Isn't the Answer

806

Chinese Hacking Spree Hit an ‘Astronomical’ Number of Victims

807

The Accellion Breach Keeps Getting Worse—and More Expensive

808

Privacy-First Browser Brave Is Launching a Search Engine

809

Thousands of Android and iOS Apps Leak Data From the Cloud

810

China and Russia's Spying Sprees Will Take Years to Unpack

811

Microsoft's Dream of Decentralized IDs Enters the Real World

812

Twitch's First Transparency Report Is Here—and Long Overdue

813

Clubhouse's Security and Privacy Lag Behind Its Explosive Growth

814

Hackers Tied to Russia's GRU Targeted the US Grid for Years, Researchers Warn

815

China Hijacked an NSA Hacking Tool in 2014—and Used It for Years

816

Apple Offers Its Closest Look Yet at iOS and MacOS Security

817

Malware Is Now Targeting Apple’s New M1 Processor

818

Cyberpunk 2077 Maker Was Hit With a Ransomware Attack—and Won't Pay Up

819

Feds Indict North Korean Hackers for Years of Heists and Scams

820

A Windows Defender Vulnerability Lurked Undetected for 12 Years

821

France Ties Russia's Sandworm to a Multiyear Hacking Spree

822

Parler Says It's Back

823

A Barcode Scanner App With Millions of Downloads Goes Rogue

824

Covid-19 Vaccine Scams Spread Under Facebook and Telegram's Watch

825

A Coordinated Takedown Targets 'OGUser' Account Thieves

826

Gaming Sites Are Still Letting Streamers Profit From Hate

827

Why ‘Inside Job’ Zoombombs Are So Hard to Stop

828

A Second SolarWinds Hack Deepens Third-Party Software Fears

829

Facebook Ad Services Let Anyone Target US Military Personnel

830

Apple Fixes One of the iPhone's Most Pressing Security Risks

831

Cops Disrupt Emotet, the Internet's ‘Most Dangerous Malware’

832

This Encrypted Gun Registry Might Bridge a Partisan Divide

833

Flash Is Dead—but Not Gone

834

Fleeing WhatsApp for Better Privacy? Don't Turn to Telegram

835

North Korea Targets—and Dupes—a Slew of Cybersecurity Pros

836

Parler Finds a Reprieve in Russia—but Not a Solution

837

Chrome and Edge Want to Help Solve Your Password Problems

838

The Truth About North Korea's Ultra-Lockdown Against Covid-19

839

The SolarWinds Hackers Used Tactics Other Groups Will Copy

840

Big Tech Can’t Ban Its Way Out of This

841

This Site Published Every Face from Parler's Capitol Riot Videos

842

Anti-Secrecy Activists Publish a Trove of Ransomware Victims' Data

843

How Law Enforcement Gets Around Your Smartphone's Encryption

844

The SolarWinds Hackers Shared Tricks With a Notorious Russian Spy Group

845

WhatsApp Has Shared Your Data With Facebook for Years, Actually

846

Ticketmaster Pays Up for Hacking a Rival Company

847

How Amazon Sidewalk Works—and Why You May Want to Turn It Off

848

Post-Riot, the Capitol Hill IT Staff Faces a Security Mess

849

The UK Denies Julian Assange's Extradition, Citing Suicide Risk

850

Ransomware Is Headed Down a Dire Path

851

The Worst Hacks of 2020, a Surreal Pandemic Year

852

How Your Digital Trails Wind Up in the Police’s Hands

853

6 Privacy-Focused Alternatives to the Apps You Use Every Day

854

Apple's App 'Privacy Labels' Are Here—and a Big Step Forward

855

No One Knows How Deep Russia's Hacking Rampage Goes

856

The Biden Administration Will Have Its Hands Full With Russia

857

A Massive Fraud Operation Stole Millions From Online Bank Accounts

858

2020 Shows the Danger of a Decapitated Cyber Regime

859

How to Understand the Russia Hack Fallout

860

The Christchurch Shooter and YouTube's Radicalization Trap

861

Hold Everything: Stormtroopers Have Discovered Tactics

862

Russia's FireEye Hack Is a Statement—but Not a Catastrophe

863

Critical Flaws in Millions of IoT Devices May Never Get Fixed

864

The NSA Warns That Russia Is Attacking Remote Work Platforms

865

This ‘Magical Bug’ Exposed Any iPhone in a Hacker's Wi-Fi Range

866

The Internet’s Most Notorious Botnet Has an Alarming New Trick

867

Hackers Are Targeting the Covid-19 Vaccine ‘Cold Chain’

868

A Broken Piece of Internet Backbone Might Finally Get Fixed

869

7 Simple Ways to Make Your Android Phone More Secure

870

Hacker Lexicon: What Is the Signal Encryption Protocol?

871

It’s Time to Stop Sharing Your Passwords With Your Partner

872

Trump’s Election Attack Ends December 14—Whether He Knows It or Not

873

Google Is Testing End-to-End Encryption in Android Messages

874

Ghostery’s New Search Engine Will Be Entirely Ad-Free

875

By the Way, Donald Trump Could Still Launch Nuclear Weapons at Any Time

876

Telegram Still Hasn’t Removed an AI Bot That’s Abusing Women

877

Forget Imposters. Among Us Is a Playground for Hackers

878

Microsoft Is Making a Secure PC Chip—With Intel and AMD's Help

879

The iOS Covid App Ecosystem Has Become a Privacy Minefield

880

7 Simple Tech Tips to Keep Your Family Safe This Holiday

881

The OS Big Sur Launch Might Have Slowed Down Macs Everywhere

882

How to Use Parental Controls in Your Google, Apple, and Microsoft Account

883

The FBI Says ‘Boogaloo’ Extremists Bought 3D-Printed Machine Gun Parts

884

WhatsApp Using Up Your Phone Storage? Here’s How to Fix It

885

An Engineer Gets 9 Years for Stealing $10M From Microsoft

886

The GOP Keeps Proving There's No Election Fraud

887

Feds Seize $1 Billion in Stolen Silk Road Bitcoins

888

WhatsApp Is Adding Disappearing Messages—With Some Limits

889

Beware a New Google Drive Scam Landing in Inboxes

890

Zoom Finally Has End-to-End Encryption. Here's How to Use It

891

The US Sanctions Russians For Potentially ‘Fatal’ Triton Malware

892

11/6 All the Ways Slack Tracks You—and How to Stop It

893

How 30 Lines of Code Blew Up a 27-Ton Generator

894

New Research Reveals the Hidden Downsides of Link Previews

895

The Russian Hackers Playing 'Chekov's Gun' With US Infrastructure

896

A Hacker Is Threatening to Leak Patients' Therapy Notes

897

How to Clean Up Your Digital History

898

Facebook Promises Privacy Reform. Critics Aren't Convinced

899

A Deepfake Porn Bot Is Being Used to Abuse Thousands of Women

900

US Indicts Sandworm, Russia's Most Destructive Cyberwar Unit

901

Twitter's 'Hacked Materials' Rule Tries to Thread an Impossible Needle

902

Internet Freedom Has Taken a Hit During the Covid-19 Pandemic

903

A Trickbot Assault Shows US Military Hackers' Growing Reach

904

Researchers Found 55 Flaws in Apple's Corporate Network

905

Amazon's Latest Gimmicks Are Pushing the Limits of Privacy

906

Split-Second ‘Phantom’ Images Can Fool Tesla’s Autopilot

907

How Google's Android Keyboard Keeps ‘Smart Replies’ Private

908

A Poker Pro Accused of Cheating Wants $330M in Damages

909

A China-Linked Group Repurposed Hacking Team’s Stealthy Spyware

910

Facebook Shut Down Malware That Hijacked Accounts to Run Ads

911

The Strangest Election Scenario Runs Through Georgia

912

Facebook Busts Russian Disinfo Networks as US Election Looms

913

A Ransomware Attack Has Struck a Major US Hospital Chain

914

The Best Chrome Extensions to Prevent Creepy Web Tracking

915

A Tip From a Kid Helped Uncover a Slew of Scam Apps

916

CryptoHarlem’s Founder Warns Against ‘Digital Stop and Frisk'

917

The iOS 14 Privacy and Security Features You Should Know

918

179 Arrested in Massive Global Dark Web Takedown

919

Think Twice Before Using Facebook, Google, or Apple to Sign In Everywhere

920

Gen Z Has a Plan to Save the Election—Starting With the Polls

921

A Patient Dies After a Ransomware Attack Hits a Hospital

922

CBP Seized OnePlus Buds as ‘Counterfeit’ AirPods. Now It's Doubling Down

923

The Safest Ways to Log In to Your Computer

924

The Best Privacy-Friendly Alternatives to Google Maps

925

Russia's Fancy Bear Hackers Are Hitting US Campaign Targets Again

926

A Critical Flaw Is Affecting Thousands of WordPress Sites

927

How to Boost WhatsApp’s Privacy and Better Protect Your Data

928

Julian Assange Lays Out His Case Against US Extradition

929

The Trump Administration Continues to Erode Election Security

930

A DHS Official Says He Was Punished for Not Pushing Trump's Agenda

931

Kids' Smartwatches Are a Security Nightmare Despite Years of Warnings

932

The FBI Botched Its DNC Hack Warning in 2016—but Says It Won’t Next Time

933

Apple Accidentally Approved Malware to Run on MacOS

934

A Former Uber Exec's Indictment Is a Warning Shot

935

Porn Sites Still Won’t Take Down Nonconsensual Deepfakes

936

How to Protect the Data on Your Laptop

937

A New Botnet Is Covertly Targeting Millions of Servers

938

Ransomware Has Gone Corporate. Where Will It End?

939

Firefox Launched a New Android App to Lure Users From Chrome

940

A Tesla Employee Thwarted an Alleged Ransomware Plot

941

How WeChat Censored the Coronavirus Pandemic

942

How Four Brothers Allegedly Fleeced $19 Million From Amazon

943

‘DiceKeys’ Creates a Master Password for Life With One Roll

944

Tired of Gmail? Try a Privacy-First Email Provider

945

How Financial Apps Get You to Spend More and Question Less

946

Steve Bannon, a $25M Border Wall Campaign, and a GoFundMe Gone Bad

947

ATM Hackers Have Picked Up Some Clever New Tricks

948

An Alexa Bug Could Have Exposed Your Voice History to Hackers

949

How Facebook and Other Sites Manipulate Your Privacy Choices

950

Flaws Could Have Exposed Cryptocurrency Exchanges to Hackers

951

Over a Billion Android Devices Are at Risk of Data Theft

952

The Subtle Tricks Shopping Sites Use to Make You Spend More

953

An '80s File Format Enabled Stealthy Mac Hacking

954

Hackers Could Use IoT Botnets to Manipulate Energy Markets

955

The Quest to Liberate $300K of Bitcoin From an Old ZIP File

956

Decades-Old Email Flaws Could Let Attackers Mask Their Identities

957

How the Alleged Twitter Hackers Got Caught

958

How to Spot—and Avoid—Dark Patterns on the Web

959

Hackers Broke Into Real News Sites to Plant Fake Stories

960

AI Helped Uncover Chinese Boats Hiding in North Korean Waters

961

Children Stream on Twitch—Where Potential Predators Find Them

962

A Cyberattack on Garmin Disrupted More Than Workouts

963

Russia's GRU Hackers Hit US Government and Energy Targets

964

Apple's Hackable iPhones Are Finally Here

965

Thieves Are Emptying ATMs Using a New Form of Jackpotting

966

Twitter Cracks Down on QAnon. Your Move, Facebook

967

Russia's Latest Hacking Target: Covid-19 Vaccine Projects

968

A New Map Shows the Inescapable Creep of Surveillance

969

‘DDoS-For-Hire’ Is Fueling a New Wave of Attacks

970

Hack Brief: Microsoft Warns of a 17-Year-Old ‘Wormable’ Bug

971

Google Moves to Secures the Cloud From Itself

972

Microsoft Halts a Global Fraud Campaign That Targeted CEOs

973

The Super Smash Bros. Community Reckons With Sexual Misconduct Allegations

974

Amazon Bans Employees From Using TikTok on Their Phones

975

The Worst Hacks and Breaches of 2020 So Far

976

DoNotPay Unsubscribes You From Spam—and Tries to Get You Paid

977

Hong Kong's Security Law Puts Big Tech at a Crossroads

978

Looks Like Russian Hackers Are on an Email Scam Spree

979

Hack Brief: Hackers Are Exploiting a 5-Alarm Bug in Networking Equipment

980

Schools Already Struggled With Cybersecurity. Then Came Covid-19

981

New Mac Ransomware Is Even More Sinister Than It Appears

982

Google Will Delete Your Data by Default—in 18 Months

983

Security News This Week: Julian Assange Faces New Conspiracy Allegations

984

Hacker Lexicon: What Is a Side Channel Attack?

985

How Thousands of Misplaced Emails Took Over This Engineer's Inbox

986

A Report Blames ‘CIA Failures’ for the Agency's Worst Hack

987

Zoom Reverses Course and Promises End-to-End Encryption for All Users

988

The Russian Disinfo Operation You Never Heard About

989

Bot Mafias Have Wreaked Havoc in World of Warcraft Classic

990

Body Cameras Haven't Stopped Police Brutality. Here's Why

991

A Legion of Bugs Puts Hundreds of Millions of IoT Devices at Risk

992

Ex-Ebay Execs Allegedly Made Life Hell for Critics

993

Coder-Turned-Kingpin Paul Le Roux Gets His Comeuppance

994

How To Stop Instagram From Tracking Everything You Do

995

Spies Can Eavesdrop by Watching a Light Bulb's Vibrations

996

Android 11 Will Help You Rein In Zombie App Permissions

997

Georgia’s Failure Shows How Not to Run an Election in the Pandemic

998

IoT Security Is a Mess. Privacy 'Nutrition' Labels Could Help

999

Security News This Week: China and Iran Tried to Hack the Biden and Trump Campaigns

1000

The Police's Military Tactics Turn Peaceful Protests Violent

1001

Zoom's End-to-End Encryption Will Be for Paying Customers Only

1002

The Pentagon's Hand-Me-Downs Helped Militarize Police. Here's How

1003

How to Protest Safely in the Age of Surveillance

1004

Shadowserver, an Internet Guardian, Finds a Lifeline

1005

Security News This Week: This $350 "Anti-5G" Device Is Apparently Just a USB Stick

1006

State-Based Contact-Tracing Apps Could Be a Mess

1007

There's a Jailbreak Out for the Current Version of iOS

1008

Don't Be Fooled by Covid-19 Contact-Tracing Scams

1009

Now’s The Perfect Time to Start Using a Password Manager

1010

ShinyHunters Is a Hacking Group on a Data Breach Spree

1011

The Hypocrisy of Mike Pompeo

1012

The FBI Backs Down Against Apple—Again

1013

The Nigerian Fraudsters Ripping Off the Unemployment System

1014

Cryptocurrency Hardware Wallets Can Get Hacked, Too

1015

Security News This Week: Hackers Claim to Have ‘Dirty Laundry’ About Donald Trump

1016

The US Says Chinese Hackers Went Too Far During the Covid-19 Crisis

1017

Defcon Is Canceled

1018

Online Voting Has Worked So Far. That Doesn’t Mean It's Safe

1019

The 5G Coronavirus Conspiracy Theory Has Taken a Dark Turn

1020

Security News This Week: Zoom Security Gets a Boost With Keybase Acquisition

1021

How a Facebook Bug Took Down Your Favorite iOS Apps

1022

GitHub Takes Aim at Open Source Software Vulnerabilities

1023

LockBit Is the New Ransomware for Hire

1024

Hacker Lexicon: What Is Fleeceware and How Can You Protect Yourself?

1025

The Weird Partisan Math of Vote-By-Mail

1026

The ADL Calls Out Steam for Giving Extremists a Pass

1027

How Spies Snuck Malware Into the Google Play Store—Again and Again

1028

The Covid-19 Pandemic Reveals Ransomware's Long Game

1029

Sneaky Zero-Click Attacks Are a Hidden Menace

1030

Amid Its Covid-19 Crisis, China Was Still Hacking Uighurs’ iPhones

1031

Google Sees State-Sponsored Hackers Ramping Up Coronavirus Attacks

1032

A Vital Hack Could Turn Medical Devices Into Ventilators

1033

Security News This Week: Russian Hackers Went After San Francisco International Airport

1034

How Apple and Google's Social Distancing Maps Work

1035

You Can Now Check If Your ISP Uses Basic Security Measures

1036

Does Covid-19 Contact Tracing Pose a Privacy Risk? Your Questions, Answered

1037

The Pentagon Hasn't Fixed Basic Cybersecurity Blind Spots

1038

How to Cover Your Tracks Every Time You Go Online

1039

How Apple and Google Are Enabling Covid-19 Contact-Tracing

1040

Security News This Week: Signal Threatens to Leave the US If EARN IT Act Passes

1041

Vote by Mail Isn't Perfect. But It's Essential in a Pandemic

1042

Clever Cryptography Could Protect Privacy in Covid-19 Contact-Tracing Apps

1043

Thousands of Android Apps Are Silently Accessing Your Data

1044

A Hacker Found a Way to Take Over Any Apple Webcam

1045

How to Keep Your Zoom Chats Private and Secure

1046

Online Credit Card Skimmers Are Thriving During the Pandemic

1047

Hack Brief: Marriott Got Hacked. Yes, Again

1048

An Elite Spy Group Used 5 Zero-Days to Hack North Koreans

1049

The Postal Service's Surprising Role in Surviving Doomsday

1050

Security News This Week: Chinese Hacking Surges Amid Coronavirus Crisis

1051

Google Bans Infowars Android App Over Coronavirus Claims

1052

The US Army Corps of Engineers Deploys Against Coronavirus

1053

Google Removes Adware-Laced Kids' Apps From Play Store

1054

How Microsoft Dismantled the Infamous Necurs Botnet

1055

WhatsApp Is at the Center of Coronavirus Response

1056

Coronavirus Sets the Stage for Hacking Mayhem

1057

A Critical Internet Safeguard Is Running Out of Time

1058

Kill Chain: HBO's Election Security Doc Stresses Urgency

1059

High-Stakes Security Set-Ups Are Making Remote Work Impossible

1060

Most Medical Imaging Devices Run Outdated Operating Systems

1061

Russia Is Learning How to Bypass Facebook's Disinfo Defenses

1062

Hackers Can Clone Millions of Toyota, Hyundai, and Kia Keys

1063

A Simple New Tool Lets You Open Email Attachments Without Fear

1064

Last Week's Internet Calamity That Wasn't

1065

Security News This Week: An Unfixable Flaw Threatens 5 Years of Intel Chips

1066

The EARN IT Act Is a Sneak Attack on Encryption

1067

The Long Path out of the Vulnerability Disclosure Dark Ages

1068

North Korea Is Recycling Mac Malware. That's Not the Worst Part

1069

Security News This Week: Clearview AI's Massive Client List Got Hacked

1070

How a Hacker's Mom Broke Into a Prison—and the Warden's Computer

1071

How Trump Hollowed Out US National Security

1072

Gmail Is Catching More Malicious Attachments With Deep Learning

1073

Nintendo Cracks Down After High-Profile Leaks

1074

Security News This Week: A Tiny Piece of Tape Tricked Teslas Into Speeding Up 50 MPH

1075

Russia Doesn't Want Bernie Sanders. It Wants Chaos

1076

Bluetooth-Related Flaws Threaten Dozens of Medical Devices

1077

YouTube Gaming's Most-Watched Videos Are Dominated by Scams and Cheats

1078

Hundreds of Millions of PC Components Still Have Hackable Firmware

1079

Voting App Flaws Could Have Let Hackers Manipulate Results

1080

Conservative News Sites Track You Lots More Than Left-Leaning Ones

1081

Signal Is Finally Bringing Its Secure Messaging to the Masses

1082

Google's Giving Out Security Keys to Help Protect Campaigns

1083

How to Get Your Yahoo Breach Settlement Money

1084

Facebook's Bug Bounty Caught a Data-Stealing Spree

1085

Security News This Week: Pro-Trump Trolls Flooded the Iowa Caucus Phone Lines

1086

Trump Now Has the Senate GOP's Blessing to Undermine Democracy

1087

An Artist Used 99 Phones to Fake a Google Maps Traffic Jam

1088

This Identity Activist Wants to Make Facebook Obsolete

1089

Security News This Week: Windows 7 Gets One Last Update for the Road

1090

Dashlane's Super Bowl Ad Proves Password Managers Have Arrived

1091

Warren Pledges to Fight Disinformation, but Her Arsenal Is Limited

1092

Scraping the Web Is a Powerful Tool. Clearview AI Abused It

1093

One Small Fix Would Curb Stingray Surveillance

1094

The Sneaky Simple Malware That Hits Millions of Macs

1095

Free Press Advocates Decry Cybercrime Charges Against Glenn Greenwald

1096

Inside the World's Highest-Stakes Industrial Hacking Contest

1097

Everything We Know About the Jeff Bezos Phone Hack

1098

A Handy Chrome Feature, a Sonos Update Warning, and More News

1099

An Open Source Bid to Encrypt the Internet of Things

1100

Twitch Has Become a Haven for Live Sports Piracy

1101

Facebook Says Encrypting Messenger by Default Will Take Years

1102

A Facebook Bug Exposed Anonymous Admins of Pages

1103

The Mandalorian Is the Only Smart Soldier in the Star Wars Galaxy

1104

Security News This Week: The FBI Wants Apple to Unlock iPhones Again

1105

All the Ways Facebook Tracks You—and How to Limit It

1106

Amazon Takes a Swipe at PayPal's $4 Billion Acquisition

1107

An Alleged Spy App Puts Apple in a Bind

1108

Russia Takes a Big Step Toward Internet Isolation

1109

How Iran's Hackers Might Strike Back After Soleimani's Assassination

1110

How the US Prepares Its Embassies for Potential Attacks

1111

TikTok's First Transparency Report Doesn't Tell the Full Story

1112

The Most Dangerous People on the Internet This Decade

1113

The Decade Big-Money Email Scams Took Over

1114

Star Wars: The Rise of Skywalker Is a Lesson in Military Opposites

1115

The Debate Over How to Encrypt the Internet of Things

1116

Meet The Mad Scientist Who Wrote the Book on How to Hunt Hackers

1117

WhatsApp Fixes Yet Another Group Chat Security Gap

1118

Chrome Will Automatically Scan Your Passwords Against Data Breaches

1119

Why Ring Doorbells Perfectly Exemplify the IoT Security Crisis

1120

So Much For the Deep State Plot Against Donald Trump

1121

Toys “R” Us Is Back—Now With More Surveillance!

1122

The FCC's Push to Purge Huawei From US Networks

1123

Hackers Find Ways Around a Years-Old Microsoft Outlook Fix

1124

Security News This Week: Why the iPhone 11 Tracks Your Location Even When You Tell It Not To

1125

Blockchain Developer Gets Busted After Talk in North Korea

1126

Ewoks Are the Most Tactically Advanced Fighting Force in Star Wars

1127

I Ditched Google for DuckDuckGo. Here's Why You Should Too

1128

Think Twice Before Giving Gifts With a Microphone or Camera

1129

Hacker Lexicon: What Is a Dead Drop?

1130

The GOP Is Mired in Conspiracies—and It's About to Get Worse

1131

Even Privacy-Focused Cryptocurrencies Can Spill Your Secrets

1132

How to Avoid Black Friday Scams Online

1133

1.2 Billion Records Found Exposed Online in a Single Server

1134

Opinion: Websites Ask for Permissions And Attack Forgiveness

1135

A Notorious Iranian Hacking Crew Is Targeting Industrial Control Systems

1136

The Likely Reason Disney+ Accounts Are Getting 'Hacked'

1137

What Happens When You Remove a Police-Installed GPS Tracker

1138

DuckDuckGo Will Automatically Encrypt More Sites You Visit

1139

146 New Android Bugs, an Audio Porn Streaming Site, and More News

1140

146 New Vulnerabilities All Come Preinstalled on Android Phones

1141

Burglars Really Do Use Bluetooth Scanners to Find Laptops and Phones

1142

The Brave Browser Extends Its Payouts to iOS

1143

Google Enlists Outside Help to Clean Up Android's Malware Mess

1144

As 5G Rolls Out, Troubling New Security Flaws Emerge

1145

Twitter Insiders Allegedly Spied for Saudi Arabia

1146

Why Many People Got Mysterious Valentine’s Day Texts Today

1147

Pixel 1, RIP: Google Ends Support After Just Three Years

1148

Scammers Are Exploiting a Firefox Bug to Freeze Your Browser

1149

Google Is Helping Design an Open Source, Ultra-Secure Chip

1150

Google's Ultra-Secure Chip, a Facebook Face-Lift, and More

1151

Free Tools Boost 2020 Election Security, But Not Enough

1152

The First BlueKeep Mass Hacking Is Finally Here—but Don't Panic

1153

Opinion: Let's Ensure Tech Innovation Gets to the Military

1154

WhatsApp's Case Against NSO Group Hinges on a Tricky Legal Argument

1155

How to Keep Your Smart Assistant Voice Recordings Private

1156

Congress Still Doesn't Have an Answer for Ransomware

1157

Russian Hackers Are Still Targeting the Olympics, Three Years On

1158

TikTok, Under Scrutiny, Distances Itself From China

1159

Why One Secure Platform Passed on Two-Factor Authentication

1160

Flock Safety Says Its License Plate Readers Reduce Crime. It’s Not That Simple

1161

A Republican Raid, NASA's Venus Plans, and More News

1162

Total SCIF Show: The GOP's Raid Puts National Security at Risk

1163

A Controversial Plan to Encrypt More of the Internet

1164

Security News This Week: The Air Force Finally Ditches Its Nuclear Command Floppy Disks

1165

How to Control the Privacy of Your Social Media Posts

1166

A Brief History of Russian Hackers' Evolving False Flags

1167

Microsoft's New Plan to Defend the Code Deep Within PCs

1168

The Ukraine Whistle-Blower Did Everything Right

1169

Trump Takes Aim at a Critical Cold War Treaty with Russia

1170

DNC Hackers Resurface, Zuckerberg Talks Free Speech, and More News

1171

A Password-Exposing Bug Was Purged From LastPass

1172

Hacker Lexicon: What Are Zero-Knowledge Proofs?

1173

Red Flag Laws Are Red Herrings of Gun Control

1174

Security News This Week: An Unprecedented Cyberattack Hit US Power Utilities

1175

Alleged 'Snake Oil' Crypto Firm Sues Over Boos at Black Hat

1176

The Consumer Bureau's Reckless Plan for Debt Collection

1177

Firefox and Chrome Fight Back Against Kazakhstan's Spying

1178

Security News This Week: Facebook's Voice Transcripts Were More Invasive Than Amazon's

1179

8/19 PM - A Brief History of Vanity License Plates Gone Wrong

1180

8/15/19 AM - DejaBlue: New BlueKeep-Style Bugs Mean You Need to Update Windows Now

1181

8/14 PM - Hackers Could Decrypt Your GSM Phone Calls

1182

8/12/19 Hidden Algorithm Flaws Expose Websites to DoS Attacks

1183

8/13 pm - Big Tech Needs to Use Hazardous Materials Warnings

1184

8/13 am - Hackers Can Turn Everyday Speakers Into Acoustic Cyberweapons

1185

8/12 am - How Apple Pay Buttons Can Make Websites Less Safe

1186

8/9/19 PM Hackers Can Break Into an iPhone Just by Sending a Text

1187

5G Is Here—and Still Vulnerable to Stingray Surveillance

1188

8/6 AM The Wrong Way to Talk About a Shooter's Manifesto

1189

8/5 noon - Hey, Apple! 'Opt Out' Is Useless. Let People Opt In

1190

8/2 AM An iPhone App That Protects Your Privacy—For Real This Time

1191

7/31 AM The Alleged Capital One Hacker Didn't Cover Her Tracks

1192

An Operating System Bug Exposes 200 Million Critical Device

1193

7/30 AM Equifax Might Owe You $125. Here's How to Get It

1194

7/26 PM Facebook's Ex-Security Chief Details His 'Observatory' for Internet Abuse

1195

7/26 AM The Marines’ New Drone-Killer Aces Its First Test

1196

The App Creeping on Your IG Location, Jakarta’s Insurance Crisis, and More News

1197

Security News This Week: Browser Extensions Scraped Data From Millions of People

1198

Why Microsoft’s BlueKeep Bug Hasn’t Wreaked Havoc—Yet

1199

7/19 Security News this Week: Palantir Manual Shows How Law Enforcement Tracks Families

1200

7/18 How To Clear Out Your Zombie Apps and Online Accounts

1201

On TikTok, Teens Meme the Safety App Ruining Their Summer

1202

The Window to Rein In Facial Recognition Is Closing

1203

Hack Brief: A Card-Skimming Hacker Group Hit 17K Domains—and Counting

1204

An Amazon Phishing Scam Hits Just in Time For Prime Day

1205

I Opted Out of Facial Recognition at the Airport—It Wasn't Easy

1206

How to Protect Our Kids' Data and Privacy

1207

The Biggest Cybersecurity Crises of 2019 So Far

1208

Airport Facial Recognition, How Abusers Exploit Basic Apps, and More News

1209

The Simple Way Apple and Google Let Domestic Abusers Stalk Victims

1210

Ransomware Hits Georgia Courts As Municipal Attacks Spread

1211

Security News This Week: Myspace Employees Used to Spy on Users

1212

The Infrastructure Mess Causing Countless Internet Outages

1213

Hackers Are Poking at a MacOS Flaw Apple Left Unfixed

1214

How Hackers Turn Microsoft Excel's Own Features Against It

1215

I Scraped Millions of Venmo Payments. Your Data Is at Risk

1216

A Likely Chinese Hacker Crew Targeted 10 Phone Carriers to Steal Metadata

1217

Under Trump, the Fight Against Cybercrime Has Waned

1218

Iranian Hackers Launch a New US-Targeted Campaign as Tensions Mount

1219

Security News This Week: Hackers Used Two Firefox Zero Days to Hit a Crypto Exchange

1220

Minnesota Cop Awarded $585K After Colleagues Snooped on Her DMV Data

1221

Google Turns to Retro Cryptography to Keep Datasets Private

1222

Cellebrite Now Says It Can Unlock Any iPhone for Cops

1223

Tricky Scam Plants Phishing Links in Your Google Calendar

1224

A Plan to Stop Breaches With Dead Simple Database Encryption

1225

Your Google Calendar Isn't Safe, an Eye-Controlled TV, and More News

1226

It's Time to Switch to a Privacy Browser

1227

Security News This Week: Telegram Says China Is Behind DDoS

1228

Hackers Target US Power, Amazon Clones a Neighborhood, and More News

1229

Cloudflare’s Five-Year Project to Protect Nonprofits Online

1230

Google's Push to Close a Major Encrypted Web Loophole

1231

The Next Big Privacy Hurdle? Teaching AI to Forget

1232

Google Says It Isn't Killing Ad Blockers. Ad Blockers Disagree

1233

Radiohead Gets ‘Hacked,’ a T-Mobile/Sprint Hiccup, and More News

1234

Radiohead Dropped 18 Hours of Unreleased Music to Screw Pirates

1235

Russia and Iran Plan to Fundamentally Isolate the Internet

1236

Security News This Week: Cryptocurrency Company Hacks Itself Before Hackers Can Hack It

1237

The Catch-22 That Broke the Internet

1238

Election Security Is Still Hurting at Every Level

1239

A Push to Protect Political Campaigns from Hackers Hits a Snag

1240

'Sign In With Apple' Protects You in Ways Google and Facebook Don't

1241

The Clever Cryptography Behind Apple's 'Find My' Feature

1242

Apple and New York Are Changing the Privacy Game, and More News

1243

Another Mac Bug Lets Hackers Invisibly Click Security Prompts

1244

Apple Just Patched a Modem Bug That's Been in Macs Since 1999

1245

Security News This Week: A Teen Waltzed Into Mar-a-Lago

1246

To Fight Deepfakes, Researchers Built a Smarter Camera

1247

With a Worm Looming, the BlueKeep Bug Isn’t Getting Patched Fast Enough

1248

Google Is Finally Making Chrome Extensions More Secure

1249

Facebook Removes a Fresh Batch of Innovative, Iran-Linked Fake Accounts

1250

Hack Brief: 885 Million Sensitive Financial Records Exposed Online

1251

Security News This Week: Snapchat Employees Reportedly Spied on Private Snaps

1252

The Latest Charges Against Julian Assange Are an Assault on Press Freedom

1253

The Danger in Assange’s Charges, a Memory Experiment, and More News

1254

Facial Recognition Has Already Reached Its Breaking Point

1255

Google Has Stored Some Passwords in Plaintext Since 2005

1256

Bluetooth's Complexity Has Become a Security Risk

1257

Political Parties Still Have Cybersecurity Hygiene Problems

1258

We Are Tenants on Our Own Devices

1259

Security News This Week: Oh Great, Google Tracks What You Buy Online With Gmail

1260

Global Takedown Shows the Anatomy of a Modern Cybercriminal Supply Chain

1261

Google Recalls Titan Security Key Over a Bluetooth Flaw

1262

How Tech Helped Unknown Staffers Change the US Way of War

1263

The FCC's Plan to Stop Robocalls Sounds Awfully Familiar

1264

Microsoft’s First Windows XP Patch in Years Is a Very Bad Sign

1265

WhatsApp Was Hacked, Your Computer Was Exposed, and More News

1266

How Hackers Broke WhatsApp With Just a Phone Call

1267

Millions of Hacked Routers, Apple's Court Troubles, and More News

1268

Indictment Alleges Who Hacked Anthem, but Not Why

1269

Security News This Week: Robert Mueller Won't Testify Wednesday After All

1270

Artificial Intelligence May Not 'Hallucinate' After All

1271

Feds Dismantled the Dark Web Drug Trade—but It's Already Rebuilding

1272

Hack Brief: Hackers Stole $40 Million from Binance Cryptocurrency Exchange

1273

The Law Being Used to Prosecute Julian Assange Is Broken

1274

The CIA Sets Up Shop on Tor, the Anonymous Internet

1275

What Israel's Strike on Hamas Hackers Means For Cyberwar

1276

Security News This Week: Putin Will Put Russia Behind an Internet Curtain

1277

A Hacking Spree, a Fight for Open Internet, and More News

1278

A Mysterious Hacker Group Is On a Supply Chain Hijacking Spree

1279

Hacktivists Are on the Rise—but Less Effective Than Ever

1280

Trump’s World Still Faces 16 Known Criminal Probes

1281

Security Experts Unite Over the Right to Repair

1282

The Battle of Winterfell: A Tactical Analysis

1283

Security News This Week: Hackers Found a Freaky New Way to Kill Your Car

1284

The SIM Swap Fix That the US Isn't Using

1285

GoDaddy Takes Down 15,000 Spammy 'Snake Oil' Subdomains

1286

Mueller Makes It Clear: Trump Was Worse Than a 'Useful Idiot'

1287

Mueller Report Fallout Pressures Democrats to Impeach Trump

1288

Don't Praise the Sri Lankan Government for Blocking Facebook

1289

Hackers Can Tell What Netflix Bandersnatch Choices You Make

1290

14 Mueller Report Takeaways You Might Have Missed

1291

Security Roundup: Facebook 'Unintentionally' Collected Email Contacts of 1.5 Million Users

1292

Trump’s Homeland Security Purge Worries Cybersecurity Experts

1293

Today’s News: Read the Mueller Report; Change Your Instagram Password

1294

The Mueller Report Is Out. Here's Where You Can Read It

1295

Cyberspies Hijacked the Internet Domains of Entire Countries

1296

A Top Dark Web Drug Ring Goes Down—Thanks to ATM Withdrawals

1297

Google's Making It Easier to Safeguard Sensitive Data Troves

1298

Mysterious Hackers Hid Their Swiss Army Spyware for 5 Years

1299

Microsoft Email Hack Shows the Lurking Danger of Customer Support

1300

William Barr Sends Troubling Signals Ahead of Mueller Report Release

1301

Security News This Week: Julian Assange Faces Extradition to the US

1302

Julian Assange Arrested, Mastering Jeopardy!, and More News

1303

How To Make Your Amazon Echo and Google Home as Private as Possible

1304

Breaking Down the Hacking Case Against Julian Assange

1305

A New Breed of ATM Hackers Gets in Through a Bank’s Network

1306

'Exodus' Spyware Posed as a Legit iOS App

1307

A Peek Into the Toolkit of the Dangerous 'Triton' Hackers

1308

How Android Fought an Epic Botnet—and Won

1309

An IOS App That Secretly Spies on You, And More News

1310

Security News This Week: Facebook Won't Stop Being Sketchy

1311

The Robocall Crisis Will Never Be Totally Fixed

1312

Facebook Let Dozens of Cybercrime Groups Operate in Plain Sight

1313

It’s Time to End the NSA’s Metadata Collection Program

1314

Mar-a-Lago's Security Problems Go Way Beyond a Thumb Drive

1315

Facebook Exposed Data Again, but This Viral Cat Can Save Lives

1316

In Latest Facebook Data Exposure, History Repeats Itself

1317

Mastercard Wades Into Murky Waters With Its New Digital ID

1318

The Huawei Threat Isn't Backdoors. It's Bugs

1319

Right to Repair Is Now a National Issue

1320

Utah Just Became a Leader in Digital Privacy

1321

A Guide to LockerGoga, the Ransomware Crippling Industrial Firms

1322

HTTPS Isn't Always As Secure As It Seems

1323

Security News This Week: Jared Kushner Used WhatsApp for White House Business

1324

Hack Brief: How to Check Your Computer for Asus Update Malware

1325

Want Apple Card’s Security Benefits? Just Use Apple Pay

1326

Machines Shouldn’t Have to Spy On Us to Learn

1327

Breaking Down Apple’s New Services, From News to Gaming

1328

The Mueller Report Is Done. Now Comes the Hard Part

1329

The Mueller Report Is Here, Apple's Big Event, and More News

1330

Researchers Built an "Online Lie Detector." Honestly, That Could Be a Problem

1331

Your Facebook Password Isn’t Safe. Neither Is Your Android Phone

1332

Change Your Facebook Password Right Now

1333

In the Face of Danger, We’re Turning to Surveillance

1334

An Android Vulnerability Went Unfixed For Over Five Years

1335

Here's What It's Like to Accidentally Expose the Data of 230M People

1336

The Evidence That Could Impeach Donald Trump

1337

Most Android Antivirus Apps Are Garbage

1338

Security News This Week: Beto O'Rourke Was Part of an Infamous '90s Hacker Group

1339

How Hackers Pulled Off a $20 Million Mexican Bank Heist

1340

When Facebook Goes Down, Don't Blame Hackers

1341

Internal Docs Show How ICE Gets Surveillance Help From Local Cops

1342

Firefox Send Is an Easy Way to Share Large Files Securely

1343

Why It's So Hard to Restart Venezuela's Power Grid

1344

Security News This Week: The US Tracked Journalists Reporting on the Migrant Caravan

1345

New Film Shows How Bellingcat Cracks the Web's Toughest Cases

1346

Machine Learning Can Use Tweets To Spot Critical Security Flaws

1347

An Email Marketing Company Left 809 Million Records Exposed Online

1348

9 Questions for Facebook After Zuckerberg’s Privacy Manifesto

1349

An Alphabet Moonshot Wants to Store the Security Industry's Data

1350

The Overlooked Security Threat of Sign-In Kiosks

1351

The NSA Makes Ghidra, a Powerful Cybersecurity Tool, Open Source

1352

Hack Brief: Google Reveals "BuggyCow," a Rare MacOS Zero-Day Vulnerability

1353

States Need Way More Money to Fix Crumbling Voting Machines

1354

The Air Force Wants to Give You Its Credit Card

1355

FTC Hits TikTok With Record $5.7 Million Fine Over Children’s Privacy

1356

5 Key Takeaways From Michael Cohen's Testimony to Congress

1357

Trump Can’t Make a North Korea Deal on His Own

1358

Michael Cohen's Credibility Has Never Been More Certain

1359

Holes in 4G and 5G Networks Could Let Hackers Track Your Location

1360

Hackers Can Slip Invisible Malware into 'Bare Metal' Cloud Computers

1361

7 Scenarios for How the Mueller Probe Might 'Wrap Up'

1362

NATO Group Catfished Soldiers to Prove a Point About Privacy

1363

Security News This Week: Google Forgot To Mention the Nest Secure's Hidden Mic

1364

The (Non-Trump) Surprise Inside Andrew McCabe's Memoir

1365

A 'Smart Wall' Could Spark a New Kind of Border Crisis

1366

The Russian Sleuth Who Outs Moscow's Elite Hackers and Assassins

1367

Android Users: Check This Facebook Location Privacy Setting ASAP

1368

Hacker Lexicon: What Is Credential Stuffing?

1369

Security News This Week: Database Leak Details China's Oppressive Tracking of Muslims

1370

Russian Hackers Go From Foothold to Full-On Breach in 19 Minutes

1371

Hacks, Nudes, and Breaches: It's Been a Rough Month for Dating Apps

1372

The Imperfect Truth About Finding Facts in a World of Fakes

1373

Trump Declared an Emergency Based on Data That Doesn’t Exist

1374

Instead of a Wall, Congress Puts Border Money Where It Counts

1375

Don’t Get Your Valentine an Internet-Connected Sex Toy

1376

Cybersecurity Workers Scramble to Fix a Post-Shutdown Mess

1377

1 in 3 Americans Suffered Severe Online Harassment in 2018

1378

What Happens If Russia Cuts Itself Off From the Internet

1379

A Popular Electric Scooter Can Be Hacked to Speed Up or Stop

1380

Senators Grill Facebook, Google, and Apple Over Invasive Apps

1381

Security News This Week: A Teen Won't Tell Apple How He Hacked MacOS

1382

Google's Making It Easier to Encrypt Even Cheap Android Phones

1383

Twitter Still Can't Keep Up With Its Flood of Junk Accounts, Study Finds

1384

What It Takes to Pull Off the Country's First Online Census

1385

A New Google Chrome Extension Will Detect Your Unsafe Passwords

1386

Security News This Week: Facebook Takes Down Hundreds of Fake Pages From Iran

1387

Hackers Are Passing Around a Megaleak of 2.2 Billion Records

1388

Why Facebook's Banned 'Research' App Was So Invasive

1389

Facebook Hires Up Three of Its Biggest Privacy Critics

1390

The Threat That the US Can't Ignore: Itself

1391

Google Takes Its First Steps Toward Killing the URL

1392

Apple Takes Drastic Measures to Stop a Nasty FaceTime Bug

1393

Security Isn't Enough. Silicon Valley Needs 'Abusability' Testing

1394

The Pitfalls of Facebook Merging Messenger, Instagram, and WhatsApp Chats

1395

Security News This Week: Privacy Wins in Six Flags Fingerprints Ruling

1396

The Roger Stone Indictment: 4 Key Takeaways

1397

One Man’s Obsessive Fight to Reclaim His Cambridge Analytica Data

1398

It’s Not Quite Doomsday o’Clock—But It Should Be

1399

Nest Cams Hijacked in the Name of PewDiePie and North Korea Pranks

1400

Trump's Missile Defense Plan Creates More Problems Than It Solves

1401

As the Government Shutdown Drags on, Security Risks Intensify

1402

Jargon Watch: The Rising Danger of Stochastic Terrorism

1403

Security News This Week: Did Russia Take Another Shot at Hacking the DNC?

1404

How to Find Your Netflix Freeloaders—and Kick Them Out

1405

If Trump Told Cohen to Lie, Impeachment Is Coming

1406

Be Careful Using Bots on Telegram

1407

How the Feds Failed to Track Thousands of Separated Children

1408

Hack Brief: An Astonishing 773 Million Records Exposed in Monster Breach

1409

A 'Fortnite' Vulnerability Exposed Accounts to Takeover

1410

Facebook's '10 Year Challenge' Is Just a Harmless Meme—Right?

1411

How GPS Tracking Technology Can Curb Domestic Violence

1412

Security News This Week: Employees May Have Snooped on Ring Security Camera Feeds

1413

A Worldwide Hacking Spree Uses DNS Trickery to Nab Data

1414

A Growing Frontier for Terrorist Groups: Unsuspecting Chat Apps

1415

Your Old Tweets Give Away More Location Data Than You Think

1416

Carriers Swore They'd Stop Selling Location Data. Will They Ever?

1417

Paul Manafort Is Terrible With Technology

1418

A YubiKey for iOS Will Soon Free Your iPhone From Passwords

1419

Robert Mueller’s 2019 To-Do List

1420

Security News This Week: The 'Twinning' Site Leaked Selfies

1421

A Major Hacking Spree Gets Personal for German Politicians

1422

The Elite Intel Team Still Fighting Meltdown and Spectre

1423

Tor Is Easier Than Ever. Time to Give It a Try

1424

The Worst Hacks of 2018

1425

The Most Dangerous People on the Internet in 2018

1426

Get Ready for a Privacy Law Showdown in 2019

1427

The Internet Became Less Free in 2018. Can We Fight Back?

1428

The Year Cryptojacking Ate the Web

1429

Security News This Week: Hackers Hit NASA Before the Holidays

1430

Inside the Pentagon’s Plan to Win Over Silicon Valley's AI Experts

1431

How China’s Elite Spies Stole the World’s Most Valuable Secrets

1432

Hacking Diplomatic Cables Is Expected. Exposing Them Is Not

1433

A Devious Phishing Scam Targets Apple Customers

1434

The US Needs to Engage China on Tech—Or Risk Isolating Itself

1435

Amnesty Report Finds, Yes, Twitter Is Toxic for Women

1436

The Iran Hacks Cybersecurity Experts Feared May Be Here

1437

Russia's IRA Targeted Black Americans, Exploiting Racial Tensions

1438

Security News This Week: Taylor Swift's Facial Recognition Scans Crowds for Stalkers

1439

At a New York Privacy Pop-Up, Facebook Sells Itself

1440

Nationwide Bomb Threats Look Like a New Spin on an Old Bitcoin Scam

1441

Facebook, Under Scrutiny, Pays Out Largest Bug Bounty Yet

1442

If China Hacked Marriott, 2014 Marked a Full-on Assault

1443

The Mueller Investigation Nears the Worst Case Scenario

1444

A New Google+ Blunder Exposed Data From 52.5 Million Users

1445

Security News This Week: Did Quora Get Hacked? Top Answer: Yes

1446

Australia's Encryption-Busting Law Could Impact the World

1447

Foreign Trolls Are Targeting Veterans on Facebook

1448

Facebook Exposes Nonprofits to Donors—and Hackers

1449

GOP Email Hack Shows How Bad Midterm Election Meddling Got

1450

How Would NYC's Anti-AirDrop Dick Pic Law Even Work?

1451

iTunes Doesn't Encrypt Downloads—on Purpose

1452

Hack Brief: Printers Were Exploited for PewDiePie Propaganda

1453

How to Protect Yourself From the Giant Marriott Hack

1454

Deputy AG Rod Rosenstein Is Still Calling for an Encryption Backdoor

1455

Mueller: Cohen Lied About Trump Organization's Moscow Project

1456

DOJ Indicts Hackers for Ransomware That Crippled Atlanta

1457

Russian Hackers Haven't Stopped Probing the US Power Grid

1458

Robert Mueller's Endgame May Be in Sight

1459

Hey, Turn Off Siri on Your Lock Screen

1460

An Ingenious Data Hack Is More Dangerous Than Anyone Feared

1461

Russia's Elite Hackers May Have New Phishing Tricks

1462

The Ingredients Powering the DOD's New Nonlethal Weapons

1463

Beware Black Friday Scams Lurking Among the Holiday Deals

1464

Hack Brief: Criminals With No Shame Hit Make-A-Wish Website

1465

You Know What? Go Ahead and Use the Hotel Wi-Fi

1466

Machine Learning Can Create Fake ‘Master Key’ Fingerprints

1467

Surveillance Kills Freedom By Killing Experimentation

1468

What Matt Whitaker and the Midterms Mean For the Mueller Probe

1469

Mozilla Makes a Naughty List of Gifts That Aren't Secure

1470

The Hail Mary Plan to Restart a Hacked US Electric Grid

1471

Google Internet Traffic Wasn't Hijacked, But It Was Out of Control

1472

The US Sits out an International Cybersecurity Agreement

1473

Security News This Week: An Elon Musk Imposter Scored $180K in a Twitter Bitcoin Scam

1474

How to Safely and Securely Dispose of Your Old Gadgets

1475

Top US Intelligence Official Sue Gordon Wants Silicon Valley on Her Side

1476

With No Evidence, Brian Kemp Accuses Georgia Democrats of Hacking

1477

Voting Machine Meltdowns Are Normal—That’s the Problem

1478

The Unprecedented Effort to Secure Election Day

1479

Facebook Walks a Tightrope with Trump's Anti-Immigrant Ad

1480

Hack Brief: Someone Posted Private Facebook Messages From 81,000 Accounts

1481

How to Lock Down What Websites Can Access on Your Computer

1482

Don’t Be Duped by Voting Misinformation Before the Midterms

1483

The Privacy Battle to Save Google From Itself

1484

China's 5 Steps for Recruiting Spies

1485

Pittsburgh Synagogue Shooting Suspect's Gab Posts Are Part of a Pattern

1486

Iran's New Facebook Trolls Are Using Russia's Playbook

1487

Apple's T2 Security Chip Makes It Harder to Tap MacBook Mics

1488

Signal Has a Clever New Way to Shield Your Identity

1489

How Feds Tracked Down Mail Bomb Suspect Cesar Sayoc

1490

Fortnite Scams Are Even Worse Than You Thought

1491

Russia Linked to Disruptive Industrial Control Malware

1492

The Feds Just Hit a Notorious Swatter With 46 New Charges. He Intends to Plead Guilty

1493

Everything That Could Go Wrong With Trump's iPhones

1494

How Mail Bombs Get Intercepted—And What Happens Next

1495

Alert: This Week's Bomb Scares Are a Perfect Misinformation Storm

1496

Alert: Don't Believe Everything You Read About the Migrant Caravan

1497

Forging a Relationship With the Internet’s Most Hated Swatter

1498

Paper and the Case for Going Low-Tech in the Voting Booth

1499

Russian Trolls Are Still Playing Both Sides—Even With the Mueller Probe

1500

The Tiny Chip That Powers Up Pixel 3 Security

1501

What Spammers Could Do With Your Hacked Facebook Data

1502

The Mysterious Return of Years-Old Chinese Malware

1503

This Startup Wants You to Control Your Own Data Again

1504

How Facebook Hackers Compromised 30 Million Accounts

1505

No One Can Get Cybersecurity Disclosure Just Right—Especially Lawmakers

1506

Robert Mueller Has Already Told You Everything You Need To Know

1507

Hack Brief: Fake Adobe Flash Installers Come With a Little Malware Bonus

1508

How to Check If Your Facebook Account Got Hacked—and How Badly

1509

How Russian Spies Infiltrated Hotel Wi-Fi to Hack Victims Up Close

1510

US Weapons Systems Are Easy Cyberattack Targets, New Report Finds

1511

A 'Scarily Simple' Bug Put Millions of Cox Communications Customers Accounts at Risk

1512

There's No Good Fix If the Supply Chain Gets Hacked

1513

Google's Privacy Whiplash Shows Big Tech's Inherent Contradictions

1514

The Long, Strange History of the Presidential Text Alert

1515

Don't Buy the Trump Administration's China Misdirection

1516

A Recent Startup Breach Exposed Billions of Data Points

1517

Why Cops Can Force You to Unlock Your Phone With Your Face

1518

The Facebook Hack Exposes an Internet-Wide Failure

1519

Malware Has a New Way to Hide on Your Mac

1520

How to ‘Turn Off’ the Presidential Text Alert Test

1521

A New App Gives Old Android Versions an Important Safety Upgrade

1522

Hackers Can Stealthily Avoid Traps Set to Defend the Cloud

1523

How the Kavanaugh Information War Mirrors Real Warzones

1524

Everything We Know About Facebook's Massive Security Breach

1525

The Facebook Security Meltdown Exposes Way More Sites Than Facebook

1526

Voting Machines Are Still Absurdly Vulnerable to Attacks

1527

Russia’s Elite Hackers Have a Clever New Trick That's Very Hard to Fix

1528

Mobile Websites Can Tap Into Your Phone's Sensors Without Asking

1529

The 3-D Printed Gun Machine Rolls On, With or Without Cody Wilson

1530

Even If Rosenstein Stays, the Mueller Investigation Status Quo Won't Last

1531

A Seemingly Small Change to Chrome Stirs Big Controversy

1532

The New YubiKey Will Help Kill the Password

1533

Clouldflare and Google Will Help Sync the Internet's Clocks—and Make You Safer

1534

How the HTC Exodus Blockchain Phone Plans to Secure Your Cryptocurrency

1535

John Deere Just Swindled Farmers Out of Their Right to Repair

1536

The Collateral Damage of Trump's Extreme Declassifications

1537

The Mirai Botnet Architects Are Now Fighting Crime With the FBI

1538

Edward Snowden on Protecting Activists Against Surveillance

1539

Facebook Broadens Its Bug Bounty to Help Fix Third-Party Apps

1540

A Decade-Old Attack Can Break the Encryption of Most PCs

1541

Why Big Tech and the Government Need to Work Together

1542

Trump's New Executive Order Slaps a Bandaid on Election Interference Problems

1543

Facebook's Conservative Watchdog Will Take McCain's Senate Seat

1544

How Hackers Slipped by British Airways' Defenses

1545

One of Most Popular Mac Apps Acts Like Spyware

1546

Everything You Should Do Before—And After—You Lose Your Phone

1547

Fake Beto O'Rourke Texts Expose New Playground for Trolls

1548

Twitter Finally Axes Alex Jones—Over a Publicity Stunt

1549

DoJ Charges North Korean Hacker for Sony, WannaCry, and More

1550

Facebook and Twitter's Biggest Problems Follow Them to Congress

1551

How Trump Could Trigger Armageddon With a Tweet

1552

How Google Chrome Spent a Decade Making the Web More Secure

1553

Google Wants to Kill the URL

1554

Congress' Chief Tech Watchdog Is Not Happy With Google

1555

Security News This Week: Hackers Hit The Oatmeal, and It Wasn't Funny

1556

The Fight Over California's Privacy Bill Has Only Just Begun

1557

3-D Printed Gun Blueprints Are Back, and Only New Laws Can Stop Them

1558

Exploiting Decades-Old Telephone Tech to Break Into Android Devices

1559

Six Big Questions After the Cohen and Manafort Bombshells

1560

What We Now Know About Iran's Global Propaganda Campaign

1561

Security News This Week: You Should Delete Facebook's VPN App

1562

Phone Numbers Were Never Meant as ID. Now We’re All At Risk

1563

An Undiscovered Facebook Bug Made Me Think I Was Hacked

1564

A Monitor’s Ultrasonic Sounds Can Reveal What’s on the Screen

1565

Why the DNC Thought a Phishing Test Was a Real Attack

1566

Iran Emerges as Latest Threat to Facebook and Twitter

1567

Tech Giants Are Becoming Defenders of Democracy. Now What?

1568

The Untold Story of NotPetya, the Most Devastating Cyberattack in History

1569

How Microsoft Tackles Russian Hackers—And Why It's Never Enough

1570

Inside the Research Lab Teaching Facebook About Its Trolls

1571

Taking Away John Brennan's Clearance Threatens National Security

1572

How to Protect Yourself Against a SIM Swap Attack

1573

A Bot Panic Hits Amazon's Mechanical Turk

1574

To Identify a Hacker, Treat Them Like a Burglar

1575

At DefCon, the Biggest Election Threat Is Lack of Funding

1576

Imposter Fortnite Android Apps Are Already Spreading Malware

1577

Google Tracks You Even If Location History's Off. Here's How to Stop It

1578

Invisible Mouse Clicks Let Hackers Burrow Deep into MacOS

1579

Fax Machines Are Still Everywhere, and Wildly Insecure

1580

A Clever Android Hack Takes Advantage of Sloppy Storage

1581

Security News This Week: Surprise, the FCC Lied About That DDoS Attack

1582

Millions of Android Devices Are Vulnerable Right Out of the Box

1583

Bugs in Mobile Credit Card Readers Could Expose Buyers

1584

Hacking a Brand New Mac Remotely, Right Out of the Box

1585

The Sensors That Power Smart Cities Are a Hacker's Dream

1586

Online Stock Trading Has Serious Security Holes

1587

The Explosive-Carrying Drones in Venezuela Won’t Be the Last

1588

Ankle Monitors Aren’t Humane. They’re Another Kind of Jail

1589

Security News This Week: Air Marshals Have Been Surveilling Civilians

1590

Simple Steps to Protect Yourself on Public Wi-Fi

1591

A New DHS Cybersecurity Center Will Combat Infrastructure Hacks

1592

Reddit Got Hacked Thanks to a Woefully Insecure Two-Factor Setup

1593

The DNC Enlists Kids in Its Fight Against Hackers

1594

The Wild Inner Workings of a Billion-Dollar Hacking Group

1595

DIY Gun Blueprints Have Been Taken Offline—For Now

1596

The Last-Ditch Legal Fight to Stop 3-D Printed Guns

1597

Facebook Uncovers New Fake Accounts Ahead of Midterm Elections

1598

BurnBox Makes Hidden Files Look Like You've Deleted Them

1599

How A Group of Imprisoned Hackers Introduced JPay to the World

1600

Lawmakers Can't Ignore Facial Recognition's Bias Anymore

1601

Twitter Continues Cleanup and Cracks Down on Malicious Apps

1602

Equifax's Security Overhaul, a Year After Its Epic Breach

1603

Google Chrome Now Labels HTTP Sites as 'Not Secure'

1604

Why Trump Won't Stop Talking About the Carter Page Wiretap

1605

Security News This Week: Maybe Go Ahead and Make Your Venmo Private

1606

How to Secure Your Accounts With Better Two-Factor Authentication

1607

The Midterm Elections Are Already Under Attack

1608

Why It Matters That Trump Denies Russian Interference

1609

Rubio, Warner Stress Election Security After Trump-Putin Summit

1610

Amazon Tests Out Two Tools to Help Keep Its Cloud Secure

1611

The Trump-Putin Press Conference Gave Russia Everything It Wanted

1612

Shadow Politics: Meet the Digital Sleuth Exposing Fake News

1613

Schools Can Now Get Facial Recognition Tech for Free. Should They?

1614

Security Roundup: Ukraine Blocked a Russian Hack of Its Critical Infrastructure

1615

How a ‘Sentiment Meter’ Helps Cops Understand Their Precincts

1616

Indicting 12 Russian Hackers Could Be Mueller's Biggest Move Yet

1617

How the US Government Secretly Sold 'Spy Phones' to Suspects

1618

Senators Fear Meltdown and Spectre Disclosure Gave China an Edge

1619

Facebook Gave a Russian Internet Giant a Special Data Extension

1620

Apple's China-Friendly Censorship Caused an iPhone-Crashing Bug

1621

The Worst Cybersecurity Breaches of 2018 So Far

1622

Security News This Week: A Facebook Bug Unblocked Users for a Week

1623

All the Ways iOS 12 Will Make Your iPhone More Secure

1624

How to See Everything Your Apps Are Allowed to Do

1625

SCOTUS and Congress Leave the Right to Privacy Up for Grabs

1626

The DoD’s App Store Does This One Crucial Thing to Stay Secure

1627

Security News This Week: Mapping the NSA's Secret Spy Hubs

1628

The Pentagon Is Building a Dream Team of Tech-Savvy Soldiers

1629

The ACLU's Biggest Roadblock to Fighting Mass Surveillance

1630

California Unanimously Passes Historic Privacy Bill

1631

Congress Grills Cambridge Analytica Alum on New Firm’s Data Use

1632

Anthony Kennedy’s Retirement May Have Huge Consequences for Privacy

1633

Marketing Firm Exactis Leaked a Personal Info Database With 340 Million Records

1634

Good News! The Privacy Wins Keep Coming

1635

The Next Generation of Wi-Fi Security Will Save You From Yourself

1636

The Supreme Court Just Greatly Strengthened Digital Privacy

1637

Security News This Week: Carriers Stop Selling Location Data in a Rare Privacy Win

1638

Bill Could Give Californians Unprecedented Control Over Data

1639

China Escalates Hacks Against the US as Trade Tensions Rise

1640

The Unexpected Fallout of Iran's Telegram Ban

1641

The Olympic Destroyer Hackers May Have Returned For More

1642

Millions of Streaming Devices Are Vulnerable to a Retro Web Attack

1643

Inspector General Criticizes FBI and Comey, But Some Want More

1644

Senators Demand Answers From Amazon on Echo's Snooping Habits

1645

By Pushing Your Location Straight to 911, iOS 12 Will Save Lives

1646

Trump Says He Gave Kim Jong Un His Direct Number. Never Do That

1647

Security News This Week: A Popular Spanish Soccer App Used Phone Mics to Snoop

1648

The Silk Road's Alleged Right-Hand Man Will Finally Face a US Court

1649

Encrypted Messaging Isn’t Magic

1650

Going To the World Cup? Leave the Laptop at Home

1651

It's Nearly Impossible to Hold North Korea to Nuclear Promises

1652

Feds Bust Dozens of Email Scammers, but Your Inbox Still Isn’t Safe

1653

All the Times North Korea Promised to Denuclearize

1654

The Elite Microsoft Hacker Team That Keeps Windows PCs Safe

1655

How NATO Defends Against the Dark Side of the Web

1656

Security News This Week: Flash Gets in One More Security Fail Before Retirement

1657

WannaCry Hero’s New Legal Woes Spell Trouble for White Hat Hackers

1658

Facebook Bug Made Up to 14 Million Users' Posts Public for Days

1659

Encyclopædia Britannica Wants to Fix False Google Results

1660

Former Cambridge Analytica CEO Faces His Ghosts in Parliament

1661

An Encryption Upgrade Could Upend Online Payments

1662

How Will Microsoft Handle GitHub's Controversial Code?

1663

Apple Just Made Safari the Good Privacy Browser

1664

Crime Fighting Gets High-Tech Advances

1665

Security News This Week: Valve Squashes Decade-Old Steam Security Bug

1666

How a Former US Spy Chief Became Trump’s Fiercest Critic

1667

How San Quentin Inmates Built a Search Engine for Prison

1668

The Bleak State of Federal Government Cybersecurity

1669

Papua New Guinea Wants to Ban Facebook. It Shouldn't

1670

Security News This Week: T-Mobile Web Portal Exposed 74 Million Accounts

1671

Former Trump Campaign Aide: My Russia Ties Are Not Nefarious!

1672

Puppy Brain Scans Could Help Pick the Best Bomb Sniffers

1673

How WIRED Lost $100,000 in Bitcoin

1674

Don’t Freak Out About That Amazon Alexa Eavesdropping Situation

1675

Stealthy, Destructive Malware Infects Half a Million Routers

1676

‘Significant’ FBI Error Reignites Data Encryption Debate

1677

Facebook Is Beefing Up Its Two-Factor Authentication

1678

Security News This Week: California Charges Owners of Mugshots.com With Extortion

1679

A Location-Sharing Disaster Shows How Exposed You Really Are

1680

4 Key Takeaways From Mueller’s First Year—and What’s Next

1681

Senators Grill Whistleblower on Cambridge Analytica's Inner Workings

1682

Gruesome Jihadi Content Still Flourishes on Facebook and Google+

1683

Inside the Takedown of a Notorious Malware Clearinghouse

1684

Jigsaw's Project Shield Will Protect Campaigns From Online Attacks

1685

White House Cuts Critical Cybersecurity Role as Threats Loom

1686

Encrypted Email Has a Major, Divisive Flaw

1687

Russia-Linked Facebook Ads Targeted a Sketchy Chrome Extension at Teen Girls

1688

Security News This Week: The Hidden Commands Only Alexa Can Year

1689

Facial Recognition Tech Is Creepy When It Works—And Creepier When It Doesn’t

1690

The Iran Nuclear Deal's Unraveling Raises Fears of Cyberattacks

1691

Security News This Week: Drone Swarms Are Messing With Hostage Situations Now

1692

How to Keep Hackers Out of Your Facebook and Twitter Accounts

1693

A Georgia Hacking Bill Gets Cybersecurity All Wrong

1694

Change Your Twitter Password Right Now

1695

A Remote Hack Hijacks Android Phones Via Electric Leaks in Their Memory

1696

Nigerian Email Scammers Are More Effective Than Ever

1697

Cambridge Analytica Shuts Down All Offices Amid Ongoing Facebook Crisis

1698

Robert Mueller Likely Knows How This All Ends

1699

The House Intel Committee's Russia Report Doesn't Let Trump Off the Hook

1700

AI Can Help Cybersecurity—If It Can Fight Through the Hype

1701

Security News This Week: The Biggest DDoS For Hire Site Goes Down

1702

A Short History of Blaming 'Hackers' For Pretty Much Everything

1703

Why Police Should Monitor Social Media to Prevent Crime

1704

Security News This Week: A Google Fix Breaks Anti-Censorships Tools

1705

Turning an Echo Into a Spy Device Only Took Some Clever Coding

1706

A One-Minute Attack Let Hackers Spoof Hotel Master Keys

1707

Cracking the Crypto War

1708

Atlanta Spent $2.6M to Recover From $52,000 Ransomware Scare

1709

An Alternative Security Conference Calls Out Lack of Inclusion

1710

DNC Lawsuit Reveals Key Details About Devastating 2016 Hack

1711

Why So Many People Make Their Password 'Dragon'

1712

The Security Risks of Logging in With Facebook

1713

This Ex-NSA Hacker's App Protects Your Mac From 'Evil Maid' Attacks

1714

The White House Warns on Russian Router Hacking, But Muddles the Message

1715

Inside the Unnerving Supply Chain Attack That Corrupted CCleaner

1716

'Trustjacking' Could Expose iPhones to Attack

1717

An Elaborate Hack Shows How Much Damage IoT Bugs Can Do

1718

The World's Biggest Porn Site Now Accepts Cryptocurrency

1719

The White House Loses Its Cybersecurity Brain Trust

1720

How Russian Facebook Ads Divided and Targeted US Voters Before the 2016 Election

1721

Security News This Week: Russia Bans Encrypted Chat App Telegram

1722

Cloudflare's Plan to Protect the Whole Internet Comes Into Focus

1723

Cambridge Analytica Could Also Access Private Facebook Messages

1724

The Questions Zuckerberg Should Have Answered About Russia

1725

How Android Phones Hide Missed Security Updates From You

1726

Hackers Didn't Have to Be Experts to Make 'Despacito' Disappear

1727

Mark Zuckerberg's Privacy Shell Game

1728

A Long-Awaited IoT Crisis Is Here, and Many Devices Aren't Ready

1729

Mozilla Diagnoses the Health of the Global Internet

1730

Most Links to Popular Sites on Twitter Come From Bots

1731

Facebook Messenger's 'Unsend' Feature Is What Happens When You Scramble

1732

DC's Stingray Mess Won't Get Cleaned Up

1733

Cyberinsurance Tackles the Wildly Unpredictable World of Hacks

1734

A 200-Year-Old Idea Offers a New Way to Trace Stolen Bitcoins

1735

The Billion-Dollar Hacking Group Behind a String of Big Breaches

1736

Google Bans All Cryptomining Extensions From the Chrome Store

1737

The Next NSA Chief Is More Used to Cyberwar Than Spy Games

1738

The Under Armour Hack Was Even Worse Than It Had To Be

1739

New Encryption Service Adds Privacy Protection for Web Browsing

1740

Security News This Week: Julian Assange Has Lost His Internet Privileges

1741

The Ransomware That Hobbled Atlanta Will Strike Again

1742

Facebook's Election Safeguards Are Still a Work in Progress

1743

Mysterious 'MuslimCrypt' App Helps Jihadists Send Covert Messages

1744

DOJ Indicts 9 Iranians For Brazen Cyberattacks Against 144 US Universities

1745

The Dark Web’s Favorite Currency Is Less Untraceable Than It Seems

1746

The Facebook Privacy Setting That Doesn’t Do Anything at All

1747

Tumblr Finally Breaks Its Silence on Russian Propaganda

1748

Yes, Even Elite Hackers Make Dumb Mistakes

1749

Security News This Week: Reddit Bans Its Home for Dark Web Discussions

1750

Cambridge Analytica Took 50M Facebook Users' Data—And Both Companies Owe Answers

1751

Don't Ask Wikipedia to Cure the Internet

1752

Meltdown, Spectre, and the Costs of Unchecked Innovation

1753

The Complete Guide to Facebook Privacy

1754

Alphabet's 'Outline' Software Lets Anyone Run a Homebrew VPN

1755

Facebook Owes You More Than This

1756

Security News This Week: A Smartphone Botnet Army Keeps Growing Stronger

1757

Hacker Adrian Lamo Has Died at 37

1758

Voice Chat App Zello Turned a Blind Eye to Jihadis for Years

1759

New White House Sanctions Finally Take Russia's Online Chaos Seriously

1760

Today's Debate Over Online Porn Started Decades Ago

1761

YouTube Will Link Directly to Wikipedia to Fight Conspiracy Theories

1762

Florida Could Start a Criminal-Justice Data Revolution

1763

Researchers Point to an AMD Backdoor—And Face Their Own Backlash

1764

How Creative DDOS Attacks Still Slip Past Defenses

1765

Router-Hacking 'Slingshot' Spy Operation Compromised More Than 100 Targets

1766

Russian Propaganda Remains on Reddit

1767

Ad-Blocker Ghostery Just Went Open Source—And Has a New Business Model

1768

Operation Bayonet: Inside the Sting That Hijacked an Entire Dark Web Drug Market

1769

The Leaked NSA Spy Tool That Hacked the World

1770

Spy v. Spy: An NSA Leak Reveals the Agency's List of Enemy Hackers

1771

In US v. Microsoft, a Decades-Old Law Leaves Few Good Options

1772

Uber 'Surprised' by Totally Unsurprising Pennsylvania Data Breach Lawsuit

1773

Security News This Week: Equifax Found 2.4 Million More People Affected by Its 2017 Breach

1774

Facebook Doesn't Know How Many People Followed Russians on Instagram

1775

Covert 'Replay Sessions' Have Been Harvesting Passwords by Mistake

1776

Chrome Lets Hackers Phish Even 'Unphishable' Yubikey Users

1777

GitHub Survived the Biggest DDoS Attack Ever Recorded

1778

How to Turn Off Facebook's Face Recognition Features

1779

Microsoft's Supreme Court Case Has Big Implications For Data

1780

5 Key Takeaways From the Democratic Rebuttal Memo

1781

Facebook's Mandatory Malware Scan Is an Intrusive Mess

1782

What Rick Gates' Guilty Plea Means For Mueller’s Probe

1783

Security News This Week: Apple Repair Center Barrages Sacramento's 911 Operators

1784

The Problem with Cryptojacking

1785

Beware This Incredibly Silly—But Still Effective—Tax Scam

1786

US Border Patrol Hasn’t Validated E-Passport Data For Years

1787

Inside the Mueller Indictment: A Russian Novel of Intrigue

1788

WhatsApp Co-Founder Puts $50M Into Signal To Supercharge Encrypted Messaging

1789

The White House Blames Russia for NotPetya, the 'Most Costly Cyberattack In History'

1790

For Russia, Unraveling US Democracy Was Just Another Day Job

1791

Inside the Toolset of an Elite North Korean Hacker Group On the Rise

1792

Pro-Gun Russian Bots Flood Twitter After Parkland Shooting

1793

Did Russia Affect the 2016 Election? It’s Now Undeniable

1794

Facebook Notification Spam Has Crossed the Line

1795

North Korea's Olympic Diplomacy Hasn't Stopped Its Hacking

1796

Don't Trust the VPN Facebook Wants You to Use

1797

Artificial Intelligence Is Now Fighting Fake Porn

1798

Now Cryptojacking Threatens Critical Infrastructure, Too

1799

Worldwide Threats Briefing: 5 Takeaways, From Russia to China

1800

'Olympic Destroyer' Malware Hit Pyeongchang Ahead of Opening Ceremony

1801

Amino Apps Makes the Case for Anonymity Online

1802

Security News This Week: An Apple Employee Leaked a Major Chunk of iOS Source Code

1803

Snap Map Will Now Live Outside Snapchat

1804

Time's Just About Up to Secure the 2018 Midterm Elections

1805

This AI Reads Privacy Policies So You Don't Have To

1806

Feds Take Down a Half-Billion Dollar Cybercrime Forum After 7 Years Online

1807

Scammers Are Stealing Bitcoin on Twitter With a Classic Scheme

1808

Bob Mueller’s Investigation Is Larger—and Further Along—Than You Think

1809

Security News This Week: 'AutoSploit' Tool Makes Unskilled Hacking Easier Than Ever

1810

Reading Between the Lines of the Devin Nunes Memo

1811

Here’s What Happens If ‘Magnificent Bastard’ Mueller Gets Fired

1812

Hackers Have Already Targeted the Winter Olympics—And May Not Be Done

1813

A Devastating ATM Hack Swept the World—And Finally Hit the US

1814

Cryptocurrency Scams Are Just Straight-Up Trolling at This Point

1815

The Strava Heat Map and the End of Secrets

1816

Look Out: Chrome Extension Malware Has Evolved

1817

Security News This Week: Dutch Spies Snooped on Russia's Elite Hackers

1818

Mueller's Team Has Interviewed Facebook Staff as Part of Russia Probe

1819

Your Sloppy Bitcoin Drug Deals Will Haunt You For Years

1820

The DNC’s New Chief Security Officer Knows All About Crisis

1821

Closer to Midnight: The Doomsday Clock and the Threat of Nuclear War

1822

The Cynical Misdirection Behind #ReleaseTheMemo

1823

Meltdown and Spectre Patching Has Been a Total Train Wreck

1824

Tinder's Lack of Encryption Lets Strangers Spy on Your Swipes

1825

Pixek App Encrypts Your Photos From Camera to Cloud

1826

Android Users: To Avoid Malware, Ditch Google’s App Store

1827

Security News This Week: Hacking Group's Mobile Malware Spies on Thousands Worldwide

1828

Menacing Malware Shows the Dangers of Industrial System Sabotage

1829

A New Way to Track Down Bugs Could Help Save IoT

1830

Crime-Predicting Algorithms May Not Fare Much Better Than Untrained Humans

1831

Tech Companies Are Complicit in Censoring Iran Protests

1832

Congress Renews Warrantless Surveillance—And Makes It Even Worse

1833

The Astrophysicist Who Wants to Help Solve Baltimore's Urban Blight

1834

Security News This Week: Google Pulls 60 Malicious Apps With Millions of Downloads from Play Store

1835

How Hawaii Could Have Sent a False Nuclear Alarm

1836

The Hidden Toll of Fixing Meltdown and Spectre

1837

A Clever Radio Trick Can Tell If a Drone Is Watching You

1838

Skype's Rolling Out End-to-End Encryption For Hundreds of Millions of People

1839

Hack Brief: Russian Hackers Release Apparent IOC Emails in Wake of Olympics Ban

1840

WhatsApp Security Flaws Could Allow Snoops to Slide Into Group Chats

1841

How the Government Hides Secret Surveillance Programs

1842

Meltdown and Spectre Fixes Arrive—But Don't Solve Everything

1843

Pop-Up Mobile Ads Surge as Sites Scramble to Stop Them

1844

Triple Meltdown: How So Many Researchers Found a 20-Year-Old Chip Flaw At the Same Time

1845

Security Roundup: White House Staffers Can't Use Personal Smartphones Anymore

1846

Pro-Russia Twitter Trolls Take Aim at Special Counsel Robert Mueller

1847

What Would Really Happen If Russia Attacked Undersea Internet Cables

1848

A Dead-Simple Algorithm Reveals the True Toll of Voter ID Laws

1849

Get a Password Manager. No More Excuses

1850

A Critical Intel Flaw Breaks Basic Security for Most Computers

1851

Hacker Lexicon: What Is Sinkholing?

1852

The Worst Hacks of 2017

1853

2017 Was a Terrible Year for Internet Freedom

1854

The Most-read WIRED Security Stories of 2017

1855

Cryptojacking Has Gotten Out of Control

1856

The Most Dangerous People on the Internet in 2017

1857

Hackers Can Rickroll Thousands of Sonos and Bose Speakers Over the Internet

1858

Congress Is Debating Warrantless Surveillance in the Dark

1859

Hold North Korea Accountable for WannaCry—And the NSA, Too

1860

Security News This Week: France Goes After WhatsApp For Sharing Data With Facebook

1861

The Creator of Signal Has a Plan to Fix Cryptocurrency

1862

Snowden's New App Turns Your Phone Into a Home Security System

1863

Tech Alone Can't Solve the Opioid Crisis

1864

Researchers Fooled a Google AI Into Thinking a Rifle Was a Helicopter

1865

Don't Get Your Kid an Internet-Connected Toy

1866

Security News This Week: Facebook Squashes 19-Year-Old Bug That Still Plagues the Web

1867

Why the International Space Station Is the Single Best Thing We Did

1868

In The Last Jedi, the Resistance Keeps Making the Same Tactical Mistake

1869

Making Sense of Apple's Recent Security Stumbles

1870

It's Super Hard to Find Humans in the FCC’s Net Neutrality Comments

1871

The Most Secure Account of All—If You Can Stand It

1872

Smartphone Security 101: The Steps That Matter Most

1873

How to Rip the Mics Out of Your MacBook and iPhone

1874

Extreme Security Measures for the Extra Paranoid

1875

How to Sweep For Bugs and Hidden Cameras

1876

Physical Measures to Amp Up Your Digital Security

1877

What to Do if You’re Being Doxed

1878

Resist Phishing Attacks with Three Golden Rules

1879

The A-B-C’s of Keeping Your Kids Safe Online

1880

Take These 7 Steps Now to Reach Password Perfection

1881

Evidence That Ethiopia Is Spying on Journalists Shows Commercial Spyware Is Out of Control

1882

North Korea's Latest Missile Test Was Even Scarier Than It Seemed

1883

A Tiny New Chip Could Secure the Next Generation of IoT

1884

‘Mailsploit’ Lets Hackers Forge Perfect Email Spoofs

1885

Ghostery Deploys AI in the Fight Against Ad Trackers

1886

Phishing Schemes Are Using Encrypted Sites to Seem Legit

1887

Here's the NSA Agent Who Inexplicably Exposed Critical Secrets

1888

Security News This Week: A New Bill Wants Jail Time for Execs Who Hide Data Breaches

1889

MacOS Update Accidentally Undoes Apple's "Root" Bug Patch

1890

Michael Flynn's Guilty Plea Shows That Robert Mueller Is Closing In

1891

Supreme Court Must Understand: Cell Phones Aren’t Optional

1892

It's Not Always AI That Sifts Through Your Sensitive Info

1893

The Quantum Spy Author David Ignatius on the Future of High-Tech Espionage

1894

Anyone Can Hack MacOS High Sierra Just by Typing "Root"

1895

How Bots Broke the FCC's Public Comment System During the Net Neutrality Debate

1896

Security News This Week: Android Tracks Your Location Even When You Ask It Not To

1897

AI Can Help Hunt Down Missile Sites in China

1898

The State Department's Fumbled Fight Against Russian Propaganda

1899

Intel Chip Flaws Leave Millions of Devices Exposed

1900

The Robocall Nightmare Is Only Getting Worse—But Help Is Here

1901

The ‘Vapor Wake’ Dogs That Protect the Thanksgiving Day Parade

1902

Hack Brief: Uber Paid Off Hackers to Hide a 57-Million User Data Breach

1903

Security News This Week: The Pentagon Left Data Exposed in the Cloud

1904

Feds Indict Iranian for HBO Hack—But Good Luck Arresting Him

1905

Everything Attorney General Jeff Sessions Has Forgotten Under Oath

1906

WikiLeaks Hitting Up Donald Trump Jr. Shouldn't Surprise You

1907

He Perfected a Password-Hacking Tool—Then the Russians Came Calling

1908

The Pentagon Opened Up to Hackers—And Fixed Thousands of Bugs

1909

How One Woman's Digital Life Was Weaponized Against Her

1910

Hackers Say They've Broken Face ID a Week After iPhone X Release

1911

How Journalists Fought Back Against Crippling Email Bombs

1912

Chrome Will Stop Sketchy Sites From Bouncing You to Ads

1913

The Devious Netflix Phish That Just Won't Die

1914

How to Keep Your Bitcoin Safe and Secure

1915

Net States Rule the World; We Need to Recognize Their Power

1916

China Tests the Limits of Its US Hacking Truce

1917

Security News This Week: Equifax Was Warned of Vulnerability Months Before Breach

1918

North Korea's Plenty Scary Without an Overhyped EMP Threat

1919

What the Papadopoulos Plea Says About Mueller's Next Moves

1920

‘I Forgot My PIN’: An Epic Tale of Losing $30,000 in Bitcoin

1921

The Little Black Box That Took Over Piracy

1922

Apple's Machine Learning Engine Could Surface Your iPhone's Secrets

1923

The Reaper IoT Botnet Has Already Infected a Million Networks

1924

Security News This Week: Russian Spies Rush to Exploit the Latest Flash Zero Day

1925

It Takes Just $1000 to Track Someone's Location With Mobile Ads

1926

Your Browser Could Be Mining Cryptocurrency For a Stranger

1927

Google's 'Advanced Protection' Locks Down Accounts Like Never Before

1928

Why the Krack Wi-Fi Mess Will Take Decades to Clean Up

1929

The "Secure" Wi-Fi Standard Has a Huge, Dangerous Flaw

1930

Security News This Week: Be Careful Where You Enter Your Apple ID Password

1931

'Crypto Anchors' Might Stop the Next Equifax-Style Megabreach

1932

The Worst-Case Scenario for John Kelly’s Hacked Phone

1933

Security News This Week: Go Update Your Mac ASAP To Fix Some Serious Vulnerabilities

1934

How To Tell When Someone Else Tweets From @realDonaldTrump

1935

Gun Control Tech Exists. But It Won't Stop Mass Shootings

1936

The Disturbing Rise of Cyberattacks Against Abortion Clinics

1937

6 Fresh Horrors From the Equifax CEO's Congressional Hearing

1938

This "Ghost Gun" Machine Now Makes Untraceable Metal Handguns

1939

Inmates Need Social Media. Take It From a Former Prisoner

1940

Signal Has a Fix for Apps' Contact-Leaking Problem

1941

Jared Kushner Voted As a Woman, According to His Registration

1942

How One Syrian Fought to the Death for a Free Internet

1943

An Ambitious Plan to Stop DDoS for Good Has Its Limits

1944

Security News This Week: Hackers Broke Into the SEC... A Year Ago

1945

How Malware Keeps Sneaking Past Google Play’s Defenses

1946

New Group of Iranian Hackers Linked to Destructive Malware

1947

Donald Trump’s Dangerous North Korea Gambit

1948

Why Many Deaf Prisoners Can’t Phone Home

1949

Security News This Week: Feds Give Kaspersky Security Products the Boot

1950

Hey, Turn Bluetooth Off When You're Not Using It

1951

Hope Hicks' Twitter Account Didn't Get Suspended

1952

How to Stop the Next Unstoppable Mega-Breach—Or Slow It Down

1953

The Equifax Breach Exposes America's Identity Crisis

1954

Why It’s So Easy to Hack Cryptocurrency Startup Fundraisers

1955

Facebook May Have More Russian Troll Farms to Worry About

1956

The DNC’s Technology Chief is Phishing His Staff. Good.

1957

North Korea's Nuke Test Reveals Terrifying Capabilities

1958

One State's Bail Reform Exposes the Promise and Pitfalls of Tech-Driven Justice

1959

Inside Android Oreo's Quest to Protect Your Phone

1960

Hacking Retail Gift Cards Remains Scarily Easy

1961

Here Are a Bunch of Trump Inner Circle Amazon Wish Lists

1962

Even Artificial Neural Networks Can Have Exploitable 'Backdoors'

1963

The Hotel Room Hacker

1964

Security News This Week: When Facebook’s Friend Suggestions Get Creepy

1965

Microsoft's Bid to Save PowerShell From Hackers Starts To Pay Off

1966

All the Ways US Government Cybersecurity Falls Flat

1967

Verizon Takes Fourth Amendment Stand in Carpenter V. United States

1968

A Very Dumb Mistake Costs Cryptocurrency Investors Big Time

1969

Breaking Down HBO’s Brutal Month of Hacks

1970

Tech Has the Tools To Fight Hate. It Just Needs to Use Them

1971

The Daily Stormer’s Last Defender in Tech Just Dropped It

1972

Trump Cribbed His Charlottesville Press Conference Straight From Fox News

1973

North Korea Just Took the Nuclear Step Experts Have Dreaded

1974

Spies Could Outsmart Free Stingray-Detector Apps

1975

The Attack on Global Privacy Leaves Few Places To Turn

1976

You Can't Just Riff About Nukes

1977

HBO Hackers Release Ransom Note and New Trove of Stolen Data

1978

Security News This Week: A Whole New Way to Confuse Self-Driving Cars

1979

Hacker Who Stopped WannaCry Charged With Writing Banking Malware

1980

Apple Caved to China, Just Like Almost Every Other Tech Giant

1981

The $10 Hardware Hack That Wrecks IoT Security

1982

Hack Brief: HBO Shows and a Game of Thrones Script Land Online

1983

The Known Unknowns Swirling Around the Trump-Russia Scandal

1984

Privacy Isn't Dead. It's More Popular Than Ever

1985

We Found Rep. Blake Farenthold’s Early '90s Internet Message Board Posts

1986

Inside Cuba's D.I.Y. Internet Revolution

1987

Global Police Spring a Trap on Thousands of Dark Web Users

1988

Security News This Week: Two Huge Cryptocurrency Heists Cost Investors Millions

1989

Security News This Week: White House Exposes the Info of Privacy-Concerned Voters

1990

The Biggest Dark Web Takedown Yet Sends Black Markets Reeling

1991

Twitter's Never Going to Ban Donald Trump

1992

Hack Brief: A Myspace Security Flaw Let Anyone Take Over Any Account, No Biggie

1993

An Amazon Echo Can't Call the Police—But Maybe It Should

1994

Let’s Talk About Trump, Border Walls, and Flying Heroin

1995

In Donald Trump Jr.'s Emails, Intent Matters More Than Intel

1996

Rob Goldstone's Relationship With the Trumps: A Timeline

1997

The Petya Plague Exposes the Threat of Evil Software Updates

1998

Security News This Week: Russian Security Giant Kaspersky Lets the Feds Review Its Code

1999

Hack Brief: Hackers Targeted a US Nuclear Plant (But Don't Panic Yet)

2000

North Korea's Latest Missile Launch Hastens the Inevitable

2001

AI Will Make Forging Anything Entirely Too Easy

2002

Security News This Week: How Shipping Giant Maersk Dealt With a Malware Meltdown

2003

Trump Wants All Your Voter Data. What Could Go Wrong?

2004

Ukrainians Say Petya Ransomware Hides State-Sponsored Attacks

2005

The Encryption Debate Should End Right Now

2006

WikiLeaks Dump Reveals a Creepy CIA Location-Tracking Trick

2007

Petya Ransomware Outbreak Sweeps Europe

2008

A Diabolical Way of Hacking a Chip With a Wave of Your Hand

2009

How Russia Hacks Elections in the US and Around the World

2010

Robert Mueller Chooses His Investigatory Dream Team

2011

The Next Device in Your House to Get Hacked May Be Your Vibrator

2012

Crash Override Malware Took Down Ukraine's Power Grid Last December

2013

Everything You Need to Know About James Comey’s Senate Hearing

2014

Blaming the Internet For Terrorism Misses The Point

2015

What Christopher Wray Learned From the Last Two FBI Directors

2016

Hack Brief: Dangerous ‘Fireball’ Adware Infects a Quarter Billion PCs

2017

Security News This Week: OneLogin Had One Very Bad Breach

2018

Banned From the US? There’s a Robot for That

2019

Don’t Buy Into Putin’s Latest Misdirection on Election Hacking

2020

Inside Google’s Global Campaign to Shut Down Phishing

2021

Don’t Read Too Much Into That Successful Missile Defense Test

2022

Instead of Banning Cheaters, Pokémon Go Trolls Them Hard

2023

How to Spring Clean Your Digital Clutter to Protect Yourself

2024

A Clever New Way to Protect Your Data at the Border Could Also Add Risk

2025

A WannaCry Flaw Could Help Some Windows XP Victims Get Files Back

2026

Think Before You Tweet In the Wake of an Attack

2027

Hackers Are Trying to Reignite WannaCry With Non-Stop Botnet Attacks

2028

Security News This Week: Hoo-Boy, Mar-a-Lago’s Internet Is Insecure

2029

High-Profile Extortion Hacks Aren’t Paying Off

2030

Chelsea Manning Walks Back Into a World She Helped Transform

2031

Stop Thinking James Comey Keeps All His Files in a Cardboard Box

2032

If You Still Use Windows XP, Prepare For the Worst

2033

Security News This Week: Trump’s Cybersecurity Executive Order Looks … Pretty Good!

2034

A Vicious Microsoft Bug Left a Billion PCs Exposed

2035

Don’t Pin the Macron Email Hack on Russia Just Yet

2036

Security News This Week: Oh Good, Hackers Beat Two-Factor to Rob Bank Accounts

2037

South Korea’s New Missile Defense Tech Isn’t a Cure-All For North Korea

2038

FBI Boss Comey Finally Explains His Infamous Clinton Letter

2039

The One Hire Facebook Really Needs to Make to Curb Violence

2040

Don’t Open That Google Doc Unless You’re Positive It’s Legit

2041

The US Takes On the World in NATO’s Cyber War Games

2042

That Orange Is the New Black Leak Was Never Going to Pay Off

2043

Security News This Week: Yeah, About That Carrier Steaming Toward North Korea

2044

Amazon’s ‘Echo Look’ Could Snoop a Lot More Than Just Your Clothes

2045

Uber Didn’t Track Users Who Deleted the App, But It Still Broke the Rules

2046

Want to Stop Facebook Violence? You Won’t Like the Choices

2047

How to Stop Services Like Unroll.me From Snooping on Your Gmail

2048

Encrypted Chat Took Over. Let’s Encrypt Calls, Too

2049

North Korea’s Failed Rocket Test Eases Experts’ Worst-Case Scenario Fears

2050

Sneaky Exploit Allows Phishing Attacks From Sites That Look Secure

2051

North Korea Probably Can’t Strike the US Yet—But It’s Still Plenty Scary

2052

Security News This Week: Nasty Microsoft Word ‘Booby Trap’ Loaded PCs With Malware

2053

That ‘Mother of All Bombs’ Was Just Waiting For the Right Target

2054

The Carter Page Surveillance Doesn’t Prove Anyone’s Conspiracy Theory

2055

If You’re Somehow Still on Windows Vista, Upgrade Right Now

2056

Tax Scams Are Absurdly Common. Here’s How to Protect Yourself

2057

This Week’s Security News: Taser Bets Big on the Surveillance State

2058

The US Strike on Syria Underscores Trump’s Media-Fueled Worldview

2059

Total-Takeover iPhone Spyware Lurks on Android, Too

2060

American Spies Now Have Their Very Own Smartphone App

2061

How an Anarchist Bitcoin Coder Found Himself Fighting ISIS in Syria

2062

The World’s Biggest Porn Site Goes All-In on Encryption

2063

If You Want a VPN to Protect Your Privacy, Start Here

2064

The Eternal Search for a Gun That Doesn’t Kill

2065

How to Protect Your iCloud Account, Juuust in Case Those Hackers Aren’t Joking

2066

Security News This Week: FedEx Offered Customers Five Bucks to Re-Install Flash

2067

Instagram Has Two-Factor Authentication Now, So Turn It On

2068

Good News: Android’s Huge Security Problem Is Getting Less Huge

2069

Trump Can’t Quit His Wiretap Claims. That Won’t End Well

2070

Security News This Week: A Funny Thing Happens When the US Accuses the UK of Spying

2071

Phishing Scams Even Fool Tech Nerds—Here’s How to Avoid Them

2072

Hack Brief: High-Profile Twitter Accounts Overrun With Swastikas

2073

WIRED Had a Potential Infosecurity Problem. Here’s What We Did About It

2074

Hacker Lexicon: What Is an Attack Surface?

2075

No, Microwave Ovens Cannot Spy on You—for Lots of Reasons

2076

The Easiest Way To Protect Your Devices From Hacks? Keep Them Updated

2077

Don’t Let WikiLeaks Scare You Off of Signal and Other Encrypted Chat Apps

2078

Mass Spying Isn’t Just Intrusive—It’s Ineffective

2079

If the Feds Did Wiretap Trump Tower, It’s Not Obama Who Should Worry

2080

Security News This Week: An IoT Teddy Bear Leaked Millions of Parent and Child Voice Recordings

2081

The Golden Age of Email Hacks Is Only Getting Started

2082

How Trump Should Spend That Extra $54 Billion on Defense

2083

Get Ready for the Next Security Nightmare: Medical Devices

2084

The Curse of the Bahia Emerald, a Giant Green Rock That Ruins Lives