https://www.wired.com/story/china-usb-sogu-malware/
Security researchers have discovered USB-based Sogu spyware spreading across European and US companies’ African operations. For much of the cybersecurity …
Security researchers have discovered USB-based Sogu spyware spreading across European and US companies’ African operations. For much of the cybersecurity …
Plus: spyware-wrapped ads, TikTok GDPR breach, Elon Musk investigation, and more. China-linked hackers are increasingly moving beyond espionage into the …
Cyberattacks against casinos have garnered attention, but a steady stream of little-known attacks have made it difficult for vulnerable victims …
Senators are meeting with Silicon Valley elites to learn how to deal with artificial intelligence. But can Congress address this …
A scandal unfolding in Argentina shows the dangers of implementing facial recognition—even with laws and limits in place. This story …
There are indications that the culprits are affiliated with a notorious Chinese hacking group that may have also hacked Indian …
State and local governments in the United States are scrambling to leverage tools like ChatGPT to ease the burden on …
Plus: Apple patches newly discovered vulnerabilities in NSO Group spyware, North Korean hackers targeting security researchers, and more. Last week, …
Efforts to get U.S. intelligence agencies to adopt privacy reforms have largely failed, civil rights groups say. Without these changes, …
The CEO’s vision for Taser-equipped drones includes a fictitious scenario in which the technology averts a shooting at a daycare …
Authorities have imposed sanctions on 11 alleged members of the cybercriminal organization, while the U.S. Department of Justice has filed …
The first case is likely to be a Russian cyberattack targeting Ukrainian civilian critical infrastructure. For years, some cybersecurity defenders …
Here’s how to request your personal information no AI model for training Meta. “Request” is the key word here. As …
After leaving many questions unanswered, Microsoft explains in a new post-mortem a series of missteps that allowed attackers to steal …
Some foreign companies may be complying—potentially offering China’s spies hints for hacking their customers. For state-sponsored hacking operations, unpatched vulnerabilities …
Chatbots such as Open AI’s ChatGPT and Google’s Bard are vulnerable to indirect hint injection attacks. Security researchers say the …
Posts praising the Wagner Group boss after he died in a mysterious plane crash last month show he remains in …
If you want the highest level of protection, this is it. There is an ongoing battle between software developers trying …
Plus: A major hit on the FBI botnet, new Sandworm malware, cyberattacks on two major scientific telescopes, and more. A …
The child safety group Heat Initiative plans to launch a campaign urging Apple to scan for child sexual abuse material …
Plus: Mozilla patched more than a dozen bugs in Firefox, and enterprise companies Ivanti, Cisco, and SAP rolled out numerous …
A WIRED investigation into a cache of documents posted by an unknown figure lays bare the Trickbot ransomware gang’s secrets, …
These contests are held on Russian-language cybercrime forums, and prizes of up to $80,000 are awarded to the winners. Cybercriminals …
Apparent Russian backers wrecked more than 20 trains in Poland with a simple “radio stop” order anyone could broadcast with …
A faltering team of American scientists race against the clock to crack a Nazi code before time runs out. Fortunately, …
The US Secret Service’s ties to the Oathkeepers are revealed, the Tornado Cash co-founder is indicted, and a UK court …
For months, Etsy has been flooded with a new type of T-shirt: a photo of Donald Trump. They come in …
Social norms—not laws—are the basic structure of democracy. Georgia’s indictment of Donald Trump is the last tool to repair what …
Russia tightly controls its information space, making it difficult to obtain accurate information from the country. But open source data …
Musician Alex Pall talks to WIRED about his venture capital firm, the importance of cybersecurity awareness in a rapidly digitizing …
Here’s what the science really says about teens and screens—and how to start the conversation with young people of any …
Unlike web browsers, mobile apps increasingly make it difficult or impossible to see what companies are really doing with your …
The hackers, who mostly targeted victims in Hong Kong, also hijacked Microsoft’s trust model to make their malware harder to …
Telehealth companies that provide abortion pills are surging in popularity. Which are as safe as they claim to be? A …
Pixel Binary Transparency is the latest security benefit for Pixel owners. It’s not in Google’s best interests for its smartphones …
Plus: New research reveals the strategies hackers use to hide their malware distribution system, and companies are rushing to release …
An innovation agency within the US Department of Health and Human Services will fund research into better defenses for the …
The social media giant filed a lawsuit against a nonprofit that researches hate speech online. It’s the latest effort to …
The wide-ranging scams, often disguised as game promotions, can all be linked back to one network. Thousands of websites belonging …
The macOS Background Task Manager tool is supposed to spot potentially malicious software on your machine. But a researcher says …
A pair of major data breaches rock the UK, North Korea hacks a Russian missile maker, and Microsoft’s Chinese Outlook …
GitHub has spent two years researching and slowly rolling out its multifactor authentication system. Soon it will be mandatory for …
If you’re worried that one of Apple’s trackers is following you without consent, try these tips. When the AirTag launched …
In 2008, Boston’s transit authority sued to stop MIT hackers from presenting at the Defcon hacker conference on how to …
As the international tech giant moves toward Russian ownership, the leak raises concerns about the volume of data it has …
The legacy electronics manufacturer is creating IoT honeypots with its products to catch real-world threats and patch vulnerabilities in-house. Internet-of-things …
Security researchers accessed an internal camera inside the Deckmate 2 shuffler to learn the exact deck order—and the hand of …
Security researchers set up a remote machine and recorded every move cybercriminals made—including their login details. For the past three …
You can soon set up alerts for whenever your home address, phone number, or email address appears in Search. In …
The vulnerability could allow attackers to take advantage of an information leak to steal sensitive details like private messages, passwords, …
Think US health data is automatically kept private? Think again. Health care systems do their best to safeguard against breaches. …
Soon after Russian troops invaded Ukraine in February 2022, sensors in the Chernobyl Exclusion Zone reported radiation spikes. A researcher …
Since 2018, a dedicated team within Microsoft has attacked machine learning systems to make them safer. But with the public …
Cybercriminals are touting large language models that could help them with phishing or creating malware. But the AI chatbots could …
Here’s one simple way to reduce your security risk while logging in. It’s not always easy juggling digital accounts when …
Plus: A framework for encrypting social media, Russia-backed hacking through Microsoft Teams, and the Bitfinex Crypto Couple pleads guilty. Between …
The US Congress is trying to tame the rapid rise of artificial intelligence. But senators’ failure to tackle privacy reform …
Flaws in the Points.com platform, which is used to manage dozens of major travel rewards programs, exposed user data—and could …
Generative AI won’t just flood the internet with more lies—it may also create convincing disinformation that’s targeted at groups or …
Researchers found a simple way to make ChatGPT, Bard, and other chatbots misbehave, proving that AI is hard to tame. …
Plus: Mozilla fixes two high-severity bugs in Firefox, Citrix fixes a flaw that was used to attack a US-based critical …
Plus: Russia tightens social media censorship, new cyberattack reporting rules for US companies, and Google Street View returns to Germany. …
The National Security Agency has urged top lawmakers to resist demands that it obtain warrants for sensitive data sold by …
After scammers duped a friend with a hacked Twitter account and a “deal” on a MacBook, I enlisted the help …
Third-party plug-ins enhance the functionality of ChatGPT. But security researchers say they add an extra layer of risk. Over the …
Your smartphone or wearable could help you out in a dangerous situation. Here are some options to consider. From a …
A secret encryption cipher baked into radio systems used by critical infrastructure workers, police, and others around the world is …
Plus: Microsoft expands access to advanced security features, AI child sexual abuse material is on the rise, and Netflix’s password …
The landmark $13 million settlement with New York City is the latest in a string of legal victories for protesters …
German researchers gained rare access to three satellites and found they were years behind normal cybersecurity standards. At hundreds of …
A bill to prevent police and spies from buying Americans’ data instead of obtaining search warrants has a chance of …
Plus: A fitness app may have leaked the location of a murdered submarine captain, the privacy risks of filing taxes …
The FBI’s collection of sensitive data on millions of Americans without a warrant has drawn intense scrutiny from Congress and …
Microsoft said hackers somehow stole the key, possibly from its own network, allowing them to forge user identities and bypass …
Ransomware attacks will drop significantly in 2022, raising hopes that the criminal gangs behind ransomware attacks are turning the tables. …
Roger Thomas Clark, also known as ‘Variety Jones’, will spend time in prison for his key role in creating the …
The popular messaging platform has rolled out new parental controls to spy on teens. Here’s what these tools include (and …
Cities across the U.S. have set up RTCCs that police say protect the rights of the innocent, but critics warn …
Plus: A French bill would allow espionage through cellphone cameras, ATM skimmers target welfare families, and Japan’s largest cargo port …
It won’t solve all of your privacy problems, but a virtual private network can make you a less tempting target …
Here’s what personal data is collected by Meta’s Threads, as well as by Twitter, Bluesky, Mastodon, Spill, and Hive Social. …
Meta’s Twitter alternative promises it will work with decentralized platforms to give you more control over your data. If you …
The National Defense Authorization Act now includes a draft prohibiting government entities from buying Americans’ search histories, location data, and …
Loopholes in EV charging stations and a lack of widespread standards threaten drivers and the grid. this story is with …
Plus: Hackers take down Russian military satellite communications, spyware maker compromised, SEC targets victim company’s chief information security officer (CISO). …
Plus: Microsoft fixes 78 vulnerabilities, VMWare fixes flaws already used in attacks, and more critical updates for June. Summer software …
The complaint, filed in the EU, said the porn site failed to follow basic data collection policies under the GDPR. …
Scammers take advantage of booking technology, traveler confusion and the promise of cheap flights to offer deals that are anything …
Fifty years ago, a fire ripped through the National Personnel Records Center. It set off a massive project to save …
With tech regulation’s poor record, do lawmakers still stand a chance? Artificial intelligence is defining the future, even though many …
Make sure your chats stay as private as you want. The actual number of chat messages sent each day is …
Plus: Discord has a child predator problem, concerns about Chinese espionage in Cuba, and hackers trying to blackmail Reddit. A …
As the legal environment changes, so does the gray market for selling abortion pills into the United States. If you …
The newly released document underscores the agency’s continued secrecy around cell tower simulators — spying technology everyone already thought existed. …
Vehicles from Toyota, Honda, Ford, and more can collect huge volumes of data. Here’s what the companies can access. Your …
The age of artificial intelligence heralds a flood of disinformation, deepfakes, and delusional “facts.” Psychologists are only just beginning to …
Plus: The arrest of an alleged Lockbit ransomware hacker, the wild story of a questionable FBI informant, and one of …
The ransomware gang Clop exploited a vulnerability in the file transfer service. The flaw has now been patched, but the …
The U.S. government has warned encryption chip maker Hualan of suspicious ties to the Chinese military. However, the U.S. agency …