Acr821342097496832-8341-660x495

Snowden Designs a Device to Warn If Your iPhone’s Radios Are Snitching

Your smartphone’s radio can be used to spy on you. The exiled NSA leaker teamed up with renowned hardware hacker Bunnie Huang to stop it. The post Snowden Designs a … Continue Reading →


GettyImages-497452733-f-660x330

Now You Can Hide Your Smart Home on the Darknet

The privacy-focused Tor Project backs a new initiative that lets you use Tor to keep your home’s Internet-of-things devices hidden from hackers. The post Now You Can Hide Your Smart … Continue Reading →


GettyImages-577705232-660x440

WikiLeaks Dumps ‘Erdogan Emails’ After Turkey’s Failed Coup

The secret-spilling group’s latest publication claims to shed light on the circumstances of Turkey’s recent armed uprising and the crackdown that’s followed. The post WikiLeaks Dumps ‘Erdogan Emails’ After Turkey’s … Continue Reading →


MarcRogers-049-660x495

How the Real Hackers Behind Mr. Robot Get It So Right

The people who create the hacks on the hit TV show are just as obsessed with getting it right as viewers are. The post How the Real Hackers Behind Mr. … Continue Reading →


DOJ-microsoft-479913281-660x440

Big Privacy Ruling Says Feds Can’t Grab Data Abroad With a Warrant

Microsoft successfully fends off prosecutors’ demand for an Irish Silk Road suspect’s data, setting new limits on the Justice Department’s reach. The post Big Privacy Ruling Says Feds Can’t Grab … Continue Reading →


GettyImages-154907576-660x440

Clever Tool Shields Your Car From Hacks by Watching Its Internal Clocks

A new prototype gadget uses the technique of fingerprinting computers based on their “clock skew” to detect vehicle hacking. The post Clever Tool Shields Your Car From Hacks by Watching … Continue Reading →


NUP_172826_0324-660x441

What to Expect From Mr. Robot, Season Two (Hint: Lotsa Easter Eggs)

Looking back at Season 1 gives us some ideas where Elliot’s journey may go after the E Corp hack. The post What to Expect From Mr. Robot, Season Two (Hint: … Continue Reading →


GettyImages-494576965-660x420

Chrysler Launches Detroit’s First ‘Bug Bounty’ for Hackers

The rewards program, though limited, is another sign that the auto industry is starting to take the threat of car hacking seriously. The post Chrysler Launches Detroit’s First ‘Bug Bounty’ … Continue Reading →


dallas-police-shooting-16190137737786-660x407

Why a Killer Robot Was Likely the Only Option For Dallas Police

Just how does a bomb-defusing robot kill a human being? The post Why a Killer Robot Was Likely the Only Option For Dallas Police appeared first on WIRED.


GettyImages-186964710-1-660x495

‘Secret Conversations:’ End-to-End Encryption Comes to Facebook Messenger

The beta test of a new end-to-end encryption option will expand to all 900 million users by autumn. The post ‘Secret Conversations:’ End-to-End Encryption Comes to Facebook Messenger appeared first … Continue Reading →


GettyImages-466770936-featured-660x330

Google Tests New Crypto in Chrome to Fend Off Quantum Attacks

The web giant is rolling out the biggest-ever test of encryption designed to be resistant to a sci-fi future threat: a codebreaking quantum computer. The post Google Tests New Crypto … Continue Reading →


GettyImages-496384556-660x495

Hacker Lexicon: What Are CNE and CNA?

Two types of cyberattacks may sound similar, but they’re quite different in practice. The post Hacker Lexicon: What Are CNE and CNA? appeared first on WIRED.


GettyImages-528338761-660x495

Hacker Lexicon: What Is Full Disk Encryption?

The security at the center of everything from the Apple-FBI fight to a sweeping new Android vulnerability. The post Hacker Lexicon: What Is Full Disk Encryption? appeared first on WIRED.


symantec-logo-660x495

Symantec’s Woes Expose the Antivirus Industry’s Security Gaps

Vulnerabilities revealed this week show how security software can not only fail to protect us, but also create new attack holes in systems. The post Symantec’s Woes Expose the Antivirus … Continue Reading →


GettyImages-471441926-660x439

Congressional Report Is the Latest to Slam a Bad Crypto Bill

A research paper from the House Subcommittee on Homeland Security puts another nail in the coffin of a Senate bill to effectively ban strong encryption. The post Congressional Report Is … Continue Reading →


GettyImages-535586455-660x438

Researchers Sue the Government Over Computer Hacking Law

The CFAA makes it illegal to violate a web site’s terms of service, preventing researchers from investigating possible discrimination on sites. The post Researchers Sue the Government Over Computer Hacking … Continue Reading →


GettyImages-99203809-660x495

Clever Attack Uses the Sound of a Computer’s Fan to Steal Data

By controlling the speed of a computer’s internal fans, researchers show how they can steal passwords and other data from “air-gapped” machines. The post Clever Attack Uses the Sound of … Continue Reading →


RTX29NW9-660x440

Meet OurMine, the ‘Security’ Group Hacking CEOs and Celebs

The hacker group that has defaced the Twitter feeds of Google, Facebook, and Amazon execs claims it’s just trying to sell innocent audit services. The post Meet OurMine, the ‘Security’ … Continue Reading →


two-factor-authentication-text-660x495

So Hey You Should Stop Using Texts for Two-Factor Authentication

A string of recent SMS hacks means security-conscious users should switch to a more secure login system. The post So Hey You Should Stop Using Texts for Two-Factor Authentication appeared … Continue Reading →


chrome-fa-660x440

A Bug in Chrome Makes It Easy to Pirate Movies

A flaw in the way Google implemented its content-protection technology for the Chrome browser lets you steal movies streamed from Netflix and other providers. The post A Bug in Chrome … Continue Reading →


GhostGun-09-tone-expanded-660x342

After Orlando, the Homemade AR-15 Industry Surges

As talk of an AR-15 ban rises after the worst mass shooting in US history, so do the sales of materials and tools to make those deadly guns at home. … Continue Reading →