Skip to main content

Security

Gun Database Breach Leaks Details on Thousands of Owners

Plus: Indian hacker-for-hire groups, Chinese student espionage efforts, and more.

Is Your New Car a Threat to National Security?

Putting sensor-packed Chinese cars on Western roads could be a privacy issue. Just ask Tesla.

A New, Remarkably Sophisticated Malware Is Attacking Routers

Researchers say the remote-access Trojan ZuoRAT is likely the work of a nation-state and has infected at least 80 different targets.

You Need to Update Windows and Chrome Right Now

Plus: Google issues fixes for Android bugs. And Cisco, Citrix, SAP, WordPress, and more issue major patches for enterprise systems.

The Post-Roe Privacy Nightmare Has Arrived

Plus: Microsoft details Russia’s Ukraine hacking campaign, Meta’s election integrity efforts dwindle, and more.

Google Warns of New Spyware Targeting iOS and Android Users

The spyware has been used to target people in Italy, Kazakhstan, and Syria, researchers at Google and Lookout have found.

The Ghost of Internet Explorer Will Haunt the Web for Years

Microsoft's legacy browser may be dead—but its remnants are not going anywhere, and neither are its lingering security risks.

‘Supercookies’ Have Privacy Experts Sounding the Alarm

A German ad-tech trial features what Vodafone calls “digital tokens.” Should you be worried?

How to Move Your WhatsApp Chats Across Devices and Apps

It's never been easier to switch between iPhone and Android—and to get your messages out of the Meta ecosystem entirely.

Parents Need to Know What’s Going On Inside Their Day Care Apps

After months of digging into privacy and security issues around these apps, I have some serious concerns. 

Brave Now Lets You Customize Search Results—for Better or Worse

The privacy-focused company's new Goggles tool allows users to weed out the noise—whatever that might mean.

How to Use Microsoft Defender on All Your Devices

If you use a mix of Apple, Android, and Windows gadgets, you're in luck: The security tool is now available to any Microsoft 365 subscriber.

How to Password Protect Any File

Put a digital lock on your most important data.

You Need to Update iOS, Chrome, Windows, and Zoom ASAP

Plus: Google patches 36 Android vulnerabilities, Cisco fixes three high-severity issues, and VMWare closes two “serious” flaws.

What Do Those Pesky 'Cookie Preferences' Pop-Ups Really Mean?

We asked the engineer who invented cookies what they mean and how to handle them.

The Power and Pitfalls of AI for US Intelligence

Artificial intelligence use is booming, but it's not the secret weapon you might imagine.

Julian Assange Is Running Out of Options

The WikiLeaks founder will appeal the UK Home Office's decision to extradite him to the US. 

How China Hacked US Phone Networks

Plus: Russia rattles its cyber sword, a huge Facebook phishing operation is uncovered, feds take down the SSNDOB marketplace, and more.

The January 6 Hearing Was a Warning

The House committee's televised hearings interrogate the Capitol attack with damning new evidence. Whether it's enough to prevent another one is uncertain.
Security Roundup

An Alleged Russian Spy Was Busted Trying to Intern at The Hague

Plus: Firefox adds new privacy protections, a big Intel and AMD chip flaw, and more of the week’s top security news.
Spamalot

Here’s Why You’re Still Stuck in Robocall Hell

Despite major progress fighting spam and scams, the roots of the problem go far deeper than your phone company’s defenses.
Touchy Subjects

Cops Will Be Able to Scan Your Fingerprints With a Phone

Contactless fingerprinting uses a smartphone camera to capture your prints—and opens up a whole new set of privacy concerns.
Modified Elephant

Police Linked to Hacking Campaign to Frame Indian Activists

New details connect police in India to a plot to plant evidence on victims' computers that led to their arrest.
Domain Seizure

Russia Is Taking Over Ukraine’s Internet

In occupied Ukraine, people’s internet is being routed to Russia—and subjected to its powerful censorship and surveillance machine.
Data Trail

Shanghai’s Censors Can’t Hide Stories of the Dead

Many people reportedly died after struggling to access medical care during a brutal lockdown. The families want to make sure these deaths are counted.
Malware

Conti's Attack Against Costa Rica Sparks a New Ransomware Era

A pair of ransomware attacks crippled parts of the country—and rewrote the rules of cybercrime.
Data Stream

The Tricky Business of Elon Musk Getting Twitter Fire-Hose Access

Twitter has reportedly given the billionaire access to its full stream of tweets and related user data. Is your privacy in jeopardy?
Gone in 130 Seconds

Hackers Can Steal Your Tesla by Creating Their Own Personal Keys

A researcher found that a recent update lets anyone enroll their own key during the 130-second interval after the car is unlocked with an NFC card.
Reverberations

How a Saxophonist Tricked the KGB by Encrypting Secrets in Music

Using a custom encryption scheme within music notation, Merryl Goldberg and three other US musicians slipped information to Soviet performers and activists known as the Phantom Orchestra.
moderation

Disinfo and Hate Speech Flood TikTok Ahead of Kenya’s Elections

Dozens of accounts shared videos that racked up millions of views before the platform took action.
PA55WØRD123

Apple Just Killed the Password—for Real This Time

Apple’s iOS 16 and macOS Ventura will introduce passwordless login for apps and websites. It’s only the beginning.
Lock and Keyphrase

A Long-Awaited Defense Against Data Leaks May Have Just Arrived

MongoDB claims its new “Queryable Encryption” lets users search their databases while sensitive data stays encrypted. Oh, and its cryptography is open source.
Women's Health

Period-Tracking and Fertility Apps Can Put Women Seeking Abortions at Risk

Apps collect sensitive data that could be subpoenaed by law enforcement or sold by data brokers.
Comebacks

AlphaBay Is Taking Over the Dark Web—Again

Five years after it was torn offline, the resurrected dark web marketplace is clawing its way back to the top of the online underworld.
Cybercrime

The Hacker Gold Rush That's Poised to Eclipse Ransomware

As governments crack down on ransomware, cybercriminals may soon shift to business email compromise—already the world's most profitable type of scam.
Security Roundup

Google May Owe You a Chunk of $100 Million

Plus: The US admits to cyber operations supporting Ukraine, SCOTUS investigates its own, and a Michael Flynn surveillance mystery is solved.
Brewed Awakening

Your Tim Hortons Coffee App Knew Where You Were at All Times

The Canada-based company illegally collected “vast amounts of location data,” such as every time a person entered or left their home, workplace, or another coffee shop.
Open Windows

An Actively Exploited Microsoft Zero-Day Flaw Still Has No Patch

The company continues to downplay the severity of the Follina vulnerability, which remains present in all supported versions of Windows.
Hangups

The Fight Against Robocall Spam and Scams Heats Up in India

A new proposal by India's telecom regulator aims to make accurate caller ID mandatory, but critics say it may be fundamentally flawed.