Explore

security / security news × wired.com ×
  • screenshot

    The US Government Has a Microsoft Problem

    Microsoft has stumbled through a series of major cybersecurity failures over the past few years. Experts...

  • screenshot

    Identity Thief Lived as a Different Man for 33 Years

    Plus: Microsoft scolded for a “cascade” of security failures, AI-generated lawyers send fake legal threats, a...

  • screenshot

    A Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask

    As “P4x,” Alejandro Caceres single-handedly disrupted the internet of an entire country. Then he tried to...

  • screenshot

    The Mystery of ‘Jia Tan,’ the XZ Backdoor Mastermind

    The thwarted XZ Utils supply chain attack was years in the making. Now, clues suggest nation-state...

  • screenshot

    The Incognito Mode Myth Has Fully Unraveled

    To settle a years-long lawsuit, Google has agreed to delete “billions of data records” collected from...

  • screenshot

    How a Houthi-Bombed Ghost Ship Likely Cut Off Internet for Millions

    Millions lost internet service after three cables in the Red Sea were damaged. Houthi rebels deny...

  • screenshot

    Yogurt Heist Reveals a Rampant Form of Online Fraud

    Plus: “MFA bombing” attacks target Apple users, Israel deploys face recognition tech on Gazans, AI gets...

  • screenshot

    Jeffrey Epstein's Island Visitors Exposed by Data Broker

    A WIRED investigation uncovered coordinates collected by a controversial data broker that reveal sensitive information about...

  • screenshot

    Apple Chip Flaw Leaks Secret Encryption Keys

    Plus: The Biden administration warns of nationwide attacks on US water systems, a new Russian wiper...

  • screenshot

    The DOJ Puts Apple's iMessage Encryption in the Antitrust Crosshairs

    Privacy and security are an Apple selling point. But the DOJ’s new antitrust lawsuit argues that...

  • screenshot

    Automakers Are Telling Your Insurance Company How You Really Drive

    Plus: The operator of a dark-web cryptocurrency “mixing” service is found guilty, and a US senator...

  • screenshot

    There Are Dark Corners of the Internet. Then There's 764

    A global network of violent predators is hiding in plain sight, targeting children on major platforms,...

  • screenshot

    Binance’s Top Crypto Crime Investigator Is Being Detained in Nigeria

    Tigran Gambaryan, a former crypto-focused US federal agent, and a second Binance executive, Nadeem Anjarwalla, have...

  • screenshot

    Google Is Getting Thousands of Deepfake Porn Complaints

    Content creators are using copyright laws to get nonconsensual deepfakes removed from the web. With the...

  • screenshot

    The Privacy Danger Lurking in Push Notifications

    Plus: Apple warns about sideloading apps, a court orders NSO group to turn over the code...

  • screenshot

    Here Come the AI Worms

    Security researchers created an AI worm in a test environment that can automatically spread between generative...

  • screenshot

    The Mysterious Case of the Missing Trump Trial Ransomware Leak

    The notorious LockBit gang promised a Georgia court leak "that could affect the upcoming US election.”...

  • screenshot

    Russia Attacked Ukraine's Power Grid at Least 66 Times to ‘Freeze It Into Submission’

    Several of the strikes occurred far from the front lines of the conflict, indicating possible war...

  • screenshot

    A Pornhub Chatbot Stopped Millions From Searching for Child Abuse Videos

    Every time someone in the UK searched for child abuse material on Pornhub, a chatbot appeared...

  • screenshot

    Biden Bans Rival Nations From Buying Sensitive US Data—Good Luck

    The White House issued an executive order on Wednesday that aims to prevent the sale of...

  • screenshot

    How a Right-Wing Controversy Could Sabotage US Election Security

    Republicans who run elections are split over whether to keep working with the Cybersecurity and Infrastructure...

  • screenshot

    A Mysterious Leak Exposed Chinese Hacking Secrets

    Plus: Scammers try to dupe Apple with 5,000 fake iPhones, Avast gets fined for selling browsing...

  • screenshot

    Here Are the Secret Locations of ShotSpotter Gunfire Sensors

    The locations of microphones used to detect gunshots have been kept hidden from police and the...

  • screenshot

    Leak Reveals the Unusual Path of ‘Urgent’ Russian Threat Warning

    The US Congress was preparing to vote on a key foreign surveillance program last week. Then...