Security LatestChannel Descriptionhttps://www.wired.com© Condé Nast 2024en-USFri, 20 Sep 2024 02:25:58 +0000First Israel’s Exploding Pagers Maimed and Killed. Now Comes the Paranoiahttps://www.wired.com/story/hezbollah-israel-exploding-pagers-paranoia/66eb1e62b691e46443e3dc5aThu, 19 Sep 2024 14:16:21 +0000The explosion of thousands of rigged pagers and walkie-talkies will likely make Hezbollah operatives fear any means of electronic communication. It’s having the same effect on the Lebanese population.SecuritySecurity / Cyberattacks and HacksSecurity / National SecuritySecurity / Security Newswar, Israel, Israel-Hamas War, security, national security, terrorism, military techAndy GreenbergCondé NastKnock-On EffectsYour Phone Won’t Be the Next Exploding Pagerhttps://www.wired.com/story/exploding-pagers-hezbollah-phones/66ead0d1a4283f2cdc2cc0a4Thu, 19 Sep 2024 13:57:47 +0000Thousands of beepers and two-way radios exploded in attacks against Hezbollah, but mainstream consumer devices like smartphones aren’t likely to be weaponized the same way.SecuritySecurity / Cyberattacks and HacksSecurity / National SecuritySecurity / Security Newswar, terrorism, Israel, Israel-Hamas War, hacks, cybersecurity, military tech, national securityLily Hay Newman, Matt BurgessCondé NastLoaded DevicesWalkie-Talkies Explode in New Attack on Hezbollahhttps://www.wired.com/story/walkie-talkie-explosions-hezbollah/66eae89e1abdc194ab8a5eedWed, 18 Sep 2024 16:02:41 +0000In a second attack on Hezbollah members, two-way radios detonated around Lebanon on Wednesday, causing injuries and multiple deaths.SecuritySecurity / National SecuritySecurity / Security Newswar, terrorism, Iran, Israel, cyberwar, explosionsMatt Burgess, Lily Hay NewmanCondé NastSecond WaveDid a Chinese University Hacking Competition Target a Real Victim?https://www.wired.com/story/china-hacking-competition-real-victim/66e98eee57f60cd03d3d4f2dWed, 18 Sep 2024 08:00:00 +0000Participants in a hacking competition with ties to China’s military were, unusually, required to keep their activities secret, but security researchers say the mystery only gets stranger from there.SecuritySecurity / Cyberattacks and HacksSecurity / Security Newshacking, cybersecurity, China, hacks, securityKim ZetterCondé NastCapture the FlagThe Mystery of Hezbollah’s Deadly Exploding Pagershttps://www.wired.com/story/pager-explosion-hezbollah/66e99592ca863bb4c1028b57Tue, 17 Sep 2024 18:31:41 +0000At least eight people have been killed and more than 2,700 people have been injured in Lebanon by exploding pagers. Experts say the blasts point toward a supply chain compromise, not a cyberattack.SecuritySecurity / National SecuritySecurity / Cyberattacks and HacksSecurity / Security Newswar, terrorism, Israel, Iran, cybersecurity, cyberwar, supply chainLily Hay Newman, Matt BurgessCondé NastDeadly ConnectionElon Musk Is a National Security Riskhttps://www.wired.com/story/elon-musk-biden-harris-assassination-post-x/66e83fbe9f4d2000f9eb9e0cMon, 16 Sep 2024 20:55:30 +0000Musk’s now-deleted post questioning why no one has attempted to assassinate Joe Biden and Kamala Harris renews concerns over his work for the US government—and potential to inspire extremist violence.SecuritySecurity / National SecuritySecurity / Security NewsPolitics / Politics NewsElon Musk, national security, Donald Trump, Joe Biden, Kamala Harris, 2024 election, politics, extremism, Crime, FBI, X, Social MediaAndrew CoutsCondé NastDamage DoneApple’s New Passwords App May Solve Your Login Nightmareshttps://www.wired.com/story/apple-password-app-ios-18/66e2b50c0cc83ff37cef44aaMon, 16 Sep 2024 15:52:52 +0000Apple is launching its first stand-alone password manager app in iOS 18. Here’s what you need to know.SecuritySecurity / Cyberattacks and HacksSecurity / PrivacySecurity / Security NewsSecurity / Security Adviceapple, Passwords, iPhone, Mac, ios, security, cybersecurity, phonesMatt BurgessCondé NastPa55word!A Creative Trick Makes ChatGPT Spit Out Bomb-Making Instructionshttps://www.wired.com/story/chatgpt-jailbreak-homemade-bomb-instructions/66e20913106f22bf4b3e8e89Sat, 14 Sep 2024 09:30:00 +0000Plus: New evidence emerges about who may have helped 9/11 hijackers, UK police arrest a teen in connection with an attack on London’s transit system, and Poland’s spyware scandal enters a new phase.SecuritySecurity / Cyberattacks and HacksSecurity / National SecuritySecurity / PrivacySecurity / Security Newssecurity roundup, privacy, security, cybersecurity, ChatGPTLily Hay NewmanCondé NastSecurity Roundup‘Terrorgram’ Charges Show US Has Had Tools to Crack Down on Far-Right Terrorism All Alonghttps://www.wired.com/story/terrorgram-collective-indictments/66e0a638f31b48b10871c39cFri, 13 Sep 2024 15:48:46 +0000The federal indictment of two alleged members of the Terrorgram Collective, a far-right cell accused of inspiring “lone wolf” attacks, reveals the US is now using a “forgotten” legal strategy.SecuritySecurity / National SecuritySecurity / Security Newsterrorism, far-right, Telegram, FBI, department of justice, Crime, national securityAli WinstonCondé NastNeo-FascismApple Vision Pro’s Eye Tracking Exposed What People Typehttps://www.wired.com/story/apple-vision-pro-persona-eye-tracking-spy-typing/66db35c7549e2be2db9b66c4Thu, 12 Sep 2024 10:00:00 +0000The Vision Pro uses 3D avatars on calls and for streaming. These researchers used eye tracking to work out the passwords and PINs people typed with their avatars.SecuritySecurity / Cyberattacks and HacksSecurity / PrivacySecurity / Security Newsapple, security, privacy, surveillance, vulnerabilities, Vision ProMatt BurgessCondé NastLook OutApple Intelligence Promises Better AI Privacy. Here’s How It Actually Workshttps://www.wired.com/story/apple-private-cloud-compute-ai/66e0aee4c5e30c7d71d8ae6aWed, 11 Sep 2024 20:38:43 +0000Private Cloud Compute is an entirely new kind of infrastructure that, Apple’s Craig Federighi tells WIRED, allows your personal data to be “hermetically sealed inside of a privacy bubble.”SecuritySecurity / PrivacySecurity / Security Newsapple, ios, iPhone, Mac, artificial intelligence, security, cybersecurity, privacy, OpenAI, ChatGPT, phonesLily Hay NewmanCondé NastBottled UpWhat You Need to Know About Grok AI and Your Privacyhttps://www.wired.com/story/grok-ai-privacy-opt-out/66d9e19575865e7cf455dbceMon, 09 Sep 2024 10:30:00 +0000xAI’s generative AI tool, Grok AI, is unhinged compared to its competitors. It’s also scooping up a ton of data that people post on X. Here’s how to keep your posts out of Grok—and why you should.SecuritySecurity / PrivacyBusiness / Artificial IntelligenceX, artificial intelligence, OpenAI, Elon Musk, privacy, machine learning, algorithmsKate O'FlahertyCondé NastTweet CreepHackers Threaten to Leak Planned Parenthood Datahttps://www.wired.com/story/hackers-threaten-to-leak-planned-parenthood-data/66dae96b340c671b3c3938d1Sat, 07 Sep 2024 11:30:00 +0000Plus: Kaspersky’s US business sold, Nigerian sextortion scammers jailed, and Europe’s controversial encryption plans return.SecuritySecurity / Cyberattacks and HacksSecurity / National SecuritySecurity / PrivacySecurity / Security Newssecurity roundup, hacking, security, cybersecurity, Russia, encryptionMatt Burgess, Andrew CoutsCondé NastSecurity RoundupThe NSA Has a Podcast—Here's How to Decode Ithttps://www.wired.com/story/the-nsa-has-a-podcast-heres-how-to-decode-it-no-such-podcast/66da1771340c671b3c3938caFri, 06 Sep 2024 13:00:00 +0000The spy agency that dared not speak its name is now the Joe Rogan of the SIGINT set. And the pod's actually worth a listen.BusinessBusiness / Tech CultureSecuritySecurity / National SecurityPlaintext, NSA, encryption, podcasts, MediaSteven LevyCondé NastPlaintextTherapy Sessions Exposed by Mental Health Care Firm’s Unsecured Databasehttps://www.wired.com/story/confidant-health-therapy-records-database-exposure/66d7286525a29dc3f1275f6eFri, 06 Sep 2024 10:45:00 +0000Video and audio of therapy sessions, transcripts, and other patient records were accidentally exposed in a publicly accessible database operated by the virtual medical company Confidant Health.SecuritySecurity / PrivacySecurity / Security Newshealthcare, cybersecurity, privacy, securityMatt BurgessCondé NastFreudian SlipYubiKeys Are a Security Gold Standard—but They Can Be Clonedhttps://www.wired.com/story/yubikey-vulnerability-cloning/66d9fb2e380da952206eebe6Thu, 05 Sep 2024 21:01:38 +0000Security researchers have discovered a cryptographic flaw that leaves the YubiKey 5 vulnerable to attack.SecuritySecurity / Cyberattacks and HacksArs Technica, security, hacking, two-factor authentication, vulnerabilitiesDan Goodin, Ars TechnicaCondé Nastachievement unlockedRussia’s Most Notorious Special Forces Unit Now Has Its Own Cyber Warfare Teamhttps://www.wired.com/story/russia-gru-unit-29155-hacker-team/66cf575fe04d39bc4fae6773Thu, 05 Sep 2024 17:00:35 +0000Unit 29155 of Russia’s GRU military intelligence agency—a team responsible for coup attempts, assassinations, and bombings—has branched out into brazen hacking operations with targets across the world.SecuritySecurity / Cyberattacks and HacksSecurity / National SecuritySecurity / Security NewsRussia, cyberwar, cyberattacks, cybersecurity, hacking, malwareAndy GreenbergCondé NastBad to WorseWhy It's So Hard to Fully Block X in Brazilhttps://www.wired.com/story/brazil-x-ban-isp-blocking/66d71a4ff91eb4e9913a1a32Thu, 05 Sep 2024 15:41:52 +0000With 20,000 internet providers across the country, the technical challenges of blocking X in Brazil mean some connections are slipping through the cracks.SecuritySecurity / Security NewsBusiness / Social MediaX, Elon Musk, content moderation, censorship, isps, websites, Social Media, InternetLily Hay NewmanCondé NastWhac-a-moleWe Hunted Hidden Police Signals at the DNChttps://www.wired.com/story/dnc-hidden-signal-hunt/66d719dafd8d9729ac70581aThu, 05 Sep 2024 10:30:00 +0000Using special software, WIRED investigated police surveillance at the DNC. We collected signals from nearly 300,000 devices, revealing vulnerabilities for both law enforcement and everyday citizens alike.SecuritySecurity / PrivacySecurity / Security NewsSecurity / National Securitysurveillance, privacy, security, drones, Crime, politics, elections, 2024 electionDhruv MehrotraCondé NastDigital TrailThe Japanese Robot Controversy Lurking in Israel’s Military Supply Chainhttps://www.wired.com/story/japan-fanuc-robots-israel-gaza-war/66ccc23adaf478ea072f0095Wed, 04 Sep 2024 05:00:00 +0000Activists claim Japanese industrial robots are being used to build military equipment for Israel. The robot maker denies the claims, but the episode reveals the complex ethics of global manufacturing.SecuritySecurity / National SecuritySecurity / Security NewsIsrael-Hamas War, robots, Japan, robotics, military tech, weaponsJustin LingCondé NastOrigin Story