Explore clear filters

security ×
  • screenshot

    Hide Files on Your Android With a PIN-Protected 'Safe Folder'

    Files by Google is a handy app that helps manage your Android phone’s storage space and...

  • screenshot

    Get One Bonus Year of Updates With These Samsung Phones

    When you buy a Samsung Android, you used to be able to get around two major...

  • screenshot

    A British AI Tool to Predict Violent Crime Is Too Flawed to Use

    A government-funded system known as Most Serious Violence was built to predict first offenses but turned...

  • screenshot

    Intel Is Investigating How Confidential Data Ended Up Online

    The leak contains information that the company makes available to partners and customers under NDA. A...

  • screenshot

    The NSA's Tips to Keep Your Phone From Tracking You

    Plus: A Canon ransomware hack, a nasty Twitter bug, and more of the week's top security...

  • screenshot

    Flaws Could Have Exposed Cryptocurrency Exchanges to Hackers

    Researchers found troubling bugs in open-source libraries used by financial institutions.

  • screenshot

    The Quest to Liberate $300,000 of Bitcoin From an Old Zip File

    The story of a guy who wouldn't let a few quintillion possible decryption keys stand between...

  • screenshot

    Hackers Flood Reddit With Pro-Trump Takeovers

    By apparently compromising moderator accounts, the attackers were able to post MAGA materials all over at...

  • screenshot

    How Do I Get Into My Email If I've Lost My Recovery Codes?

    Whenever you get the chance, you should use two-factor authentication to secure your various accounts. That’s...

  • screenshot

    The Subtle Tricks Shopping Sites Use to Make You Spend More

    Through deceptive designs known as “dark patterns,” online retailers try to nudge you toward purchases you...

  • screenshot

    The Feds Want These Teams to Hack a Satellite—From Home

    Meet the hackers who, this weekend, will try to commandeer an actual orbiter as part of...

  • screenshot

    How the US Can Prevent the Next 'Cyber 9/11'

    In an interview with WIRED, former national intelligence official Sue Gordon discusses Russian election interference and...

  • screenshot

    Chinese Hackers Have Pillaged Taiwan's Semiconductor Industry

    A campaign called Operation Skeleton Key has stolen source code, software development kits, chip designs, and...

  • Firefox Security Newsletter Q2 2020

    (Written for an internal audience. But our work is in the open, so why not share)...

  • screenshot

    An ’80s File Format Enabled Stealthy Mac Hacking

    The now-patched vulnerability would have let hackers target Microsoft Office using Symbolic Link—a file type that...