Security LatestChannel Descriptionhttps://www.wired.com© Condé Nast 2024en-USFri, 20 Sep 2024 02:25:58 +0000- First Israel’s Exploding Pagers Maimed and Killed. Now Comes the Paranoiahttps://www.wired.com/story/hezbollah-israel-exploding-pagers-paranoia/66eb1e62b691e46443e3dc5aThu, 19 Sep 2024 14:16:21 +0000The explosion of thousands of rigged pagers and walkie-talkies will likely make Hezbollah operatives fear any means of electronic communication. It’s having the same effect on the Lebanese population.SecuritySecurity / Cyberattacks and HacksSecurity / National SecuritySecurity / Security Newswar, Israel, Israel-Hamas War, security, national security, terrorism, military techAndy GreenbergCondé NastKnock-On Effects
- Your Phone Won’t Be the Next Exploding Pagerhttps://www.wired.com/story/exploding-pagers-hezbollah-phones/66ead0d1a4283f2cdc2cc0a4Thu, 19 Sep 2024 13:57:47 +0000Thousands of beepers and two-way radios exploded in attacks against Hezbollah, but mainstream consumer devices like smartphones aren’t likely to be weaponized the same way.SecuritySecurity / Cyberattacks and HacksSecurity / National SecuritySecurity / Security Newswar, terrorism, Israel, Israel-Hamas War, hacks, cybersecurity, military tech, national securityLily Hay Newman, Matt BurgessCondé NastLoaded Devices
- Walkie-Talkies Explode in New Attack on Hezbollahhttps://www.wired.com/story/walkie-talkie-explosions-hezbollah/66eae89e1abdc194ab8a5eedWed, 18 Sep 2024 16:02:41 +0000In a second attack on Hezbollah members, two-way radios detonated around Lebanon on Wednesday, causing injuries and multiple deaths.SecuritySecurity / National SecuritySecurity / Security Newswar, terrorism, Iran, Israel, cyberwar, explosionsMatt Burgess, Lily Hay NewmanCondé NastSecond Wave
- Did a Chinese University Hacking Competition Target a Real Victim?https://www.wired.com/story/china-hacking-competition-real-victim/66e98eee57f60cd03d3d4f2dWed, 18 Sep 2024 08:00:00 +0000Participants in a hacking competition with ties to China’s military were, unusually, required to keep their activities secret, but security researchers say the mystery only gets stranger from there.SecuritySecurity / Cyberattacks and HacksSecurity / Security Newshacking, cybersecurity, China, hacks, securityKim ZetterCondé NastCapture the Flag
- The Mystery of Hezbollah’s Deadly Exploding Pagershttps://www.wired.com/story/pager-explosion-hezbollah/66e99592ca863bb4c1028b57Tue, 17 Sep 2024 18:31:41 +0000At least eight people have been killed and more than 2,700 people have been injured in Lebanon by exploding pagers. Experts say the blasts point toward a supply chain compromise, not a cyberattack.SecuritySecurity / National SecuritySecurity / Cyberattacks and HacksSecurity / Security Newswar, terrorism, Israel, Iran, cybersecurity, cyberwar, supply chainLily Hay Newman, Matt BurgessCondé NastDeadly Connection
- Elon Musk Is a National Security Riskhttps://www.wired.com/story/elon-musk-biden-harris-assassination-post-x/66e83fbe9f4d2000f9eb9e0cMon, 16 Sep 2024 20:55:30 +0000Musk’s now-deleted post questioning why no one has attempted to assassinate Joe Biden and Kamala Harris renews concerns over his work for the US government—and potential to inspire extremist violence.SecuritySecurity / National SecuritySecurity / Security NewsPolitics / Politics NewsElon Musk, national security, Donald Trump, Joe Biden, Kamala Harris, 2024 election, politics, extremism, Crime, FBI, X, Social MediaAndrew CoutsCondé NastDamage Done
- Apple’s New Passwords App May Solve Your Login Nightmareshttps://www.wired.com/story/apple-password-app-ios-18/66e2b50c0cc83ff37cef44aaMon, 16 Sep 2024 15:52:52 +0000Apple is launching its first stand-alone password manager app in iOS 18. Here’s what you need to know.SecuritySecurity / Cyberattacks and HacksSecurity / PrivacySecurity / Security NewsSecurity / Security Adviceapple, Passwords, iPhone, Mac, ios, security, cybersecurity, phonesMatt BurgessCondé NastPa55word!
- A Creative Trick Makes ChatGPT Spit Out Bomb-Making Instructionshttps://www.wired.com/story/chatgpt-jailbreak-homemade-bomb-instructions/66e20913106f22bf4b3e8e89Sat, 14 Sep 2024 09:30:00 +0000Plus: New evidence emerges about who may have helped 9/11 hijackers, UK police arrest a teen in connection with an attack on London’s transit system, and Poland’s spyware scandal enters a new phase.SecuritySecurity / Cyberattacks and HacksSecurity / National SecuritySecurity / PrivacySecurity / Security Newssecurity roundup, privacy, security, cybersecurity, ChatGPTLily Hay NewmanCondé NastSecurity Roundup
- ‘Terrorgram’ Charges Show US Has Had Tools to Crack Down on Far-Right Terrorism All Alonghttps://www.wired.com/story/terrorgram-collective-indictments/66e0a638f31b48b10871c39cFri, 13 Sep 2024 15:48:46 +0000The federal indictment of two alleged members of the Terrorgram Collective, a far-right cell accused of inspiring “lone wolf” attacks, reveals the US is now using a “forgotten” legal strategy.SecuritySecurity / National SecuritySecurity / Security Newsterrorism, far-right, Telegram, FBI, department of justice, Crime, national securityAli WinstonCondé NastNeo-Fascism
- Apple Vision Pro’s Eye Tracking Exposed What People Typehttps://www.wired.com/story/apple-vision-pro-persona-eye-tracking-spy-typing/66db35c7549e2be2db9b66c4Thu, 12 Sep 2024 10:00:00 +0000The Vision Pro uses 3D avatars on calls and for streaming. These researchers used eye tracking to work out the passwords and PINs people typed with their avatars.SecuritySecurity / Cyberattacks and HacksSecurity / PrivacySecurity / Security Newsapple, security, privacy, surveillance, vulnerabilities, Vision ProMatt BurgessCondé NastLook Out
- Apple Intelligence Promises Better AI Privacy. Here’s How It Actually Workshttps://www.wired.com/story/apple-private-cloud-compute-ai/66e0aee4c5e30c7d71d8ae6aWed, 11 Sep 2024 20:38:43 +0000Private Cloud Compute is an entirely new kind of infrastructure that, Apple’s Craig Federighi tells WIRED, allows your personal data to be “hermetically sealed inside of a privacy bubble.”SecuritySecurity / PrivacySecurity / Security Newsapple, ios, iPhone, Mac, artificial intelligence, security, cybersecurity, privacy, OpenAI, ChatGPT, phonesLily Hay NewmanCondé NastBottled Up
- What You Need to Know About Grok AI and Your Privacyhttps://www.wired.com/story/grok-ai-privacy-opt-out/66d9e19575865e7cf455dbceMon, 09 Sep 2024 10:30:00 +0000xAI’s generative AI tool, Grok AI, is unhinged compared to its competitors. It’s also scooping up a ton of data that people post on X. Here’s how to keep your posts out of Grok—and why you should.SecuritySecurity / PrivacyBusiness / Artificial IntelligenceX, artificial intelligence, OpenAI, Elon Musk, privacy, machine learning, algorithmsKate O'FlahertyCondé NastTweet Creep
- Hackers Threaten to Leak Planned Parenthood Datahttps://www.wired.com/story/hackers-threaten-to-leak-planned-parenthood-data/66dae96b340c671b3c3938d1Sat, 07 Sep 2024 11:30:00 +0000Plus: Kaspersky’s US business sold, Nigerian sextortion scammers jailed, and Europe’s controversial encryption plans return.SecuritySecurity / Cyberattacks and HacksSecurity / National SecuritySecurity / PrivacySecurity / Security Newssecurity roundup, hacking, security, cybersecurity, Russia, encryptionMatt Burgess, Andrew CoutsCondé NastSecurity Roundup
- The NSA Has a Podcast—Here's How to Decode Ithttps://www.wired.com/story/the-nsa-has-a-podcast-heres-how-to-decode-it-no-such-podcast/66da1771340c671b3c3938caFri, 06 Sep 2024 13:00:00 +0000The spy agency that dared not speak its name is now the Joe Rogan of the SIGINT set. And the pod's actually worth a listen.BusinessBusiness / Tech CultureSecuritySecurity / National SecurityPlaintext, NSA, encryption, podcasts, MediaSteven LevyCondé NastPlaintext
- Therapy Sessions Exposed by Mental Health Care Firm’s Unsecured Databasehttps://www.wired.com/story/confidant-health-therapy-records-database-exposure/66d7286525a29dc3f1275f6eFri, 06 Sep 2024 10:45:00 +0000Video and audio of therapy sessions, transcripts, and other patient records were accidentally exposed in a publicly accessible database operated by the virtual medical company Confidant Health.SecuritySecurity / PrivacySecurity / Security Newshealthcare, cybersecurity, privacy, securityMatt BurgessCondé NastFreudian Slip
- YubiKeys Are a Security Gold Standard—but They Can Be Clonedhttps://www.wired.com/story/yubikey-vulnerability-cloning/66d9fb2e380da952206eebe6Thu, 05 Sep 2024 21:01:38 +0000Security researchers have discovered a cryptographic flaw that leaves the YubiKey 5 vulnerable to attack.SecuritySecurity / Cyberattacks and HacksArs Technica, security, hacking, two-factor authentication, vulnerabilitiesDan Goodin, Ars TechnicaCondé Nastachievement unlocked
- Russia’s Most Notorious Special Forces Unit Now Has Its Own Cyber Warfare Teamhttps://www.wired.com/story/russia-gru-unit-29155-hacker-team/66cf575fe04d39bc4fae6773Thu, 05 Sep 2024 17:00:35 +0000Unit 29155 of Russia’s GRU military intelligence agency—a team responsible for coup attempts, assassinations, and bombings—has branched out into brazen hacking operations with targets across the world.SecuritySecurity / Cyberattacks and HacksSecurity / National SecuritySecurity / Security NewsRussia, cyberwar, cyberattacks, cybersecurity, hacking, malwareAndy GreenbergCondé NastBad to Worse
- Why It's So Hard to Fully Block X in Brazilhttps://www.wired.com/story/brazil-x-ban-isp-blocking/66d71a4ff91eb4e9913a1a32Thu, 05 Sep 2024 15:41:52 +0000With 20,000 internet providers across the country, the technical challenges of blocking X in Brazil mean some connections are slipping through the cracks.SecuritySecurity / Security NewsBusiness / Social MediaX, Elon Musk, content moderation, censorship, isps, websites, Social Media, InternetLily Hay NewmanCondé NastWhac-a-mole
- We Hunted Hidden Police Signals at the DNChttps://www.wired.com/story/dnc-hidden-signal-hunt/66d719dafd8d9729ac70581aThu, 05 Sep 2024 10:30:00 +0000Using special software, WIRED investigated police surveillance at the DNC. We collected signals from nearly 300,000 devices, revealing vulnerabilities for both law enforcement and everyday citizens alike.SecuritySecurity / PrivacySecurity / Security NewsSecurity / National Securitysurveillance, privacy, security, drones, Crime, politics, elections, 2024 electionDhruv MehrotraCondé NastDigital Trail
- The Japanese Robot Controversy Lurking in Israel’s Military Supply Chainhttps://www.wired.com/story/japan-fanuc-robots-israel-gaza-war/66ccc23adaf478ea072f0095Wed, 04 Sep 2024 05:00:00 +0000Activists claim Japanese industrial robots are being used to build military equipment for Israel. The robot maker denies the claims, but the episode reveals the complex ethics of global manufacturing.SecuritySecurity / National SecuritySecurity / Security NewsIsrael-Hamas War, robots, Japan, robotics, military tech, weaponsJustin LingCondé NastOrigin Story