GettyImages-465166064-660x495

11 Police Robots Patrolling Around the World

Many of them can kill. The post 11 Police Robots Patrolling Around the World appeared first on WIRED.


WikiLeaks publishes 19,252 DNC-related emails packed with personal information

 WikiLeaks has put online a searchable database of thousands of emails sent to and from top figures in the Democratic National Committee — many of which contain personal and financial … Continue Reading →


GettyImages-485508231TR-f2-660x330

The KickassTorrents Case Could Be Huge

The feds seized the world’s largest torrent site this week. What happens next has serious implications. The post The KickassTorrents Case Could Be Huge appeared first on WIRED.


GettyImages-578135814-660x440

How the Republican Convention Fends Off Hackers

Security at the convention is crucial both online and off. The post How the Republican Convention Fends Off Hackers appeared first on WIRED.


Edward Snowden is working on an iPhone case

 Most probably wouldn’t have anticipated a smartphone case being high on Edward Snowden’s to-do list, but an on-going collaboration with Andrew “Bunnie” Huang detailed today during an event at MIT … Continue Reading →


Acr821342097496832-8341-660x495

Snowden Designs a Device to Warn If Your iPhone’s Radios Are Snitching

Your smartphone’s radio can be used to spy on you. The exiled NSA leaker teamed up with renowned hardware hacker Bunnie Huang to stop it. The post Snowden Designs a … Continue Reading →


GettyImages-577910934-660x441

How the RNC Would Handle a Worst-Case Scenario Like a Bio or Chemical Attack

Cleveland is prepared itself for biological, chemical, or radiological attack. The post How the RNC Would Handle a Worst-Case Scenario Like a Bio or Chemical Attack appeared first on WIRED.


GettyImages-497452733-f-660x330

Now You Can Hide Your Smart Home on the Darknet

The privacy-focused Tor Project backs a new initiative that lets you use Tor to keep your home’s Internet-of-things devices hidden from hackers. The post Now You Can Hide Your Smart … Continue Reading →


CounterCraft bags $1.1M to fire up a security decoy play

 Spain-based security startup CounterCraft, founded last September, has closed a €1 million ($.1M) seed round to accelerate development of a b2b security decoy technology designed to engage hackers and keep … Continue Reading →


GettyImages-577705232-660x440

WikiLeaks Dumps ‘Erdogan Emails’ After Turkey’s Failed Coup

The secret-spilling group’s latest publication claims to shed light on the circumstances of Turkey’s recent armed uprising and the crackdown that’s followed. The post WikiLeaks Dumps ‘Erdogan Emails’ After Turkey’s … Continue Reading →


Attention nerds: Chrysler announces bug bounty program

 If you like poking, prodding, and proving big corporations wrong, has FCA US got a challenge for you. FCA US is the umbrella company for Fiat, Chrysler, Jeep, Dodge, and … Continue Reading →


Sift Science raises $30 million to predict and prevent fraud everywhere online

 To predict and prevent fraud online even more quickly than cybercriminals adopt new tactics, Sift Science has raised $30 million in a Series C round of venture funding in a … Continue Reading →


Civic launches a free service that aims to stop identity theft before it happens

 A new startup called Civic, launching today, wants to help Americans stop becoming victims of identity theft. The company is aiming to topple similar identity protection services like Lifelock by focusing … Continue Reading →


GettyImages-129310449-660x495

A New Service Alerts You When Someone Uses Your Social Security Number

Civic focuses on monitoring your Social Security number to prevent identity theft, so you don’t have to chase it down after the fact. The post A New Service Alerts You … Continue Reading →


Google’s latest transparency report shows record government data requests

 Google saw a record number of data requests from law enforcement agencies worldwide during the second half of 2015 as the request total passed the 40,000 mark for the first … Continue Reading →


RNC braces for cyber attacks

 The Republican National Convention kicks off today in Cleveland and the event promises to be unusual. Donald Trump’s campaign has, of course, been controversial, and he’s putting his own strange … Continue Reading →


Beware the fake Pokémon Go apps

 Earlier this month, the first Pokémon Go malware was spotted in the wild, but the app was not much of a threat to users as it never made it into the … Continue Reading →


GettyImages-175402346-660x440

Security News This Week: ATM Thieves Steal Millions With Malware

Each Saturday we round up the news stories that we didn’t break or cover in depth at WIRED, but which deserve your attention nonetheless. The post Security News This Week: … Continue Reading →


How to circumvent Turkey’s social media block

 Access to several social media sites was blocked for over an hour in Turkey today during a reported military coup. Although internet traffic appears to be flowing normally again, Turkey’s … Continue Reading →


TurkeyHP-576514828-660x439

Watching the Attempted Turkish Coup Unfold on Twitter

On Friday afternoon the images started rolling in on Twitter. Was it a terror attack, or a coup? The post Watching the Attempted Turkish Coup Unfold on Twitter appeared first … Continue Reading →


Encrypted comms company Silent Circle closes $50M Series C

 Encrypted comms company Silent Circle, which also makes a security-focused Android smartphone called the Blackphone, has announced it’s closed a $50 million Series C round of financing, led by Santander … Continue Reading →


MarcRogers-049-660x495

How the Real Hackers Behind Mr. Robot Get It So Right

The people who create the hacks on the hit TV show are just as obsessed with getting it right as viewers are. The post How the Real Hackers Behind Mr. … Continue Reading →


UK surveillance bill includes powers to limit end-to-end encryption

 The UK government has explicitly confirmed that a surveillance bill now making its way through the second chamber could be used to require a company to remove encryption. And even, … Continue Reading →


Your website may be engaged in secret criminal activity

 Most of us think of website hacks as illicit activities aimed at siphoning critical information or disrupting the business of website owners. But what happens when your site becomes hacked, … Continue Reading →


DOJ-microsoft-479913281-660x440

Big Privacy Ruling Says Feds Can’t Grab Data Abroad With a Warrant

Microsoft successfully fends off prosecutors’ demand for an Irish Silk Road suspect’s data, setting new limits on the Justice Department’s reach. The post Big Privacy Ruling Says Feds Can’t Grab … Continue Reading →


GettyImages-154907576-660x440

Clever Tool Shields Your Car From Hacks by Watching Its Internal Clocks

A new prototype gadget uses the technique of fingerprinting computers based on their “clock skew” to detect vehicle hacking. The post Clever Tool Shields Your Car From Hacks by Watching … Continue Reading →


NUP_172826_0324-660x441

What to Expect From Mr. Robot, Season Two (Hint: Lotsa Easter Eggs)

Looking back at Season 1 gives us some ideas where Elliot’s journey may go after the E Corp hack. The post What to Expect From Mr. Robot, Season Two (Hint: … Continue Reading →


GettyImages-494576965-660x420

Chrysler Launches Detroit’s First ‘Bug Bounty’ for Hackers

The rewards program, though limited, is another sign that the auto industry is starting to take the threat of car hacking seriously. The post Chrysler Launches Detroit’s First ‘Bug Bounty’ … Continue Reading →


PokemonGoogle-660x371

Update Your Pokémon Go App Now to Fix That Privacy Mess

Pokémon Go no longer catches all your Google account info. The post Update Your Pokémon Go App Now to Fix That Privacy Mess appeared first on WIRED.


Pokémon Go promises to fix the bug that let it access all your Google data

 Pokémon Go isn’t reading your Gmail. The makers of the hot, new mobile game are fixing a bug that allowed the app to gain full access to users’ accounts, when they … Continue Reading →


MIT’s anonymous online communications protocol Riffle could beat Tor at its own game

 Tor has been the go-to for anonymous communication online for years now — and that has made it one of the juiciest targets possible to the likes of the NSA … Continue Reading →


Pokémon GO shouldn’t have full access to your Gmail, Docs, and Google account – but it does

 When you use Google to sign into Pokémon GO, as so many of you have already, the popular game for some reason grants itself (for some users, anyway) the highest … Continue Reading →


Here comes the Pokémon Go malware

 Well, that didn’t take long. Pokémon Go, the massively popular new game that’s bigger than Tinder, and poised to top Twitter in terms of daily users, has now been targeted by … Continue Reading →


Pokemon Go wants to catch (almost) all your app permissions

 Let’s be honest, players of Pokemon Go aren’t going to care a Joltik or a Flabébé about the app permissions required to roam their neighbourhoods garnering the disproving glances of … Continue Reading →


dallas-police-shooting-16190137737786-660x407

Why a Killer Robot Was Likely the Only Option For Dallas Police

Just how does a bomb-defusing robot kill a human being? The post Why a Killer Robot Was Likely the Only Option For Dallas Police appeared first on WIRED.


Facebook Messenger adds end-to-end encryption in a bid to become your primary messaging app

 Facebook Messenger wants to be your primary messaging app. As people become more and more concerned about security, being the best messaging app means being the most secure. That’s why … Continue Reading →


GettyImages-186964710-1-660x495

‘Secret Conversations:’ End-to-End Encryption Comes to Facebook Messenger

The beta test of a new end-to-end encryption option will expand to all 900 million users by autumn. The post ‘Secret Conversations:’ End-to-End Encryption Comes to Facebook Messenger appeared first … Continue Reading →


Europe’s new EU-US data flow deal clears final vote

 The EU-US Privacy Shield, the cumbersomely christened replacement for the now defunct Safe Harbor transatlantic data transfer agreement, is rapidly approaching adoption, with Europe’s Member States today agreeing to support … Continue Reading →


Oops! Wearables can leak your PINs and passwords

 The security nightmare posed by the Internet of Things isn’t just related to the lack of expertise in the types of companies adding connectivity to gizmos and gadgets. It’s the … Continue Reading →


Facebook needs a way to report content as “Graphic But Newsworthy”

 Mark Zuckerberg believes Facebook Live could illuminate wrongdoing in the world. Facebook still hasn’t explained the details of its policy on censorship of Live video. But today in response to … Continue Reading →