FreshRSS

🔒
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayWIRED

This Clever Anti-Censorship Tool Lets Russians Read Blocked News

By Matt Burgess
Samizdat Online syndicates banned news sites by hosting them on uncensored domains—allowing people to access independent reporting.

Apple’s Killing the Password. Here’s Everything You Need to Know

By Matt Burgess
With iOS 16 and macOS Ventura, Apple is introducing passkeys—a more convenient and secure alternative to passwords.

It’s Time to Get Real About TikTok’s Risks

By Lily Hay Newman
US lawmakers keep warning about the popular app. But until they can explain what makes it uniquely dangerous, it’s difficult to tailor a resolution.

Police Across US Bypass Warrants With Mass Location-Tracking Tool

By Lily Hay Newman
Plus: An unsecured database exposed face recognition data in China, ‘Cuba’ ransomware knocks out Montenegro, and more.

TikTok Users Were Vulnerable to a Single-Click Attack

By Dan Goodin, Ars Technica
Microsoft disclosed the flaw in the Android app’s deep link verification process, which has since been fixed.

A Windows 11 Automation Tool Can Easily Be Hijacked

By Matt Burgess
Hackers can use Microsoft’s Power Automate to push out ransomware and key loggers—if they get machine access first.

The US May Soon Learn What a ‘Kid-Friendly’ Internet Looks Like

By Pia Ceres
The California Age-Appropriate Design Code would launch a huge online privacy experiment. And it won’t just affect children.

Careless Errors in Hundreds of Apps Could Expose Troves of Data

By Lily Hay Newman
Researchers found that mobile applications contain keys that could provide access to both user information and private files from unconnected apps.

Apple Fixed a Serious iOS Security Flaw—Have You Updated Yet?

By Kate O'Flaherty
Plus: Chrome patches another zero-day flaw, Microsoft closes up 100 vulnerabilities, Android gets a significant patch, and more.

The Telegram-Powered News Outlet Waging Guerrilla War on Russia

By Guillaume Ptak
Anti-Putin media network February Morning has become a central player in the underground fight against the Kremlin.

A US Propaganda Operation Hit Russia and China With Memes

By Matt Burgess
Plus: An Iranian hacking tool steals inboxes, LastPass gets hacked, and a deepfake scammer targets the crypto world.

Why the Twilio Breach Cuts So Deep

By Lily Hay Newman
The phishing attack on the SMS giant exposes the dangers of B2B companies to the entire tech ecosystem.

Their Photos Were Posted Online. Then They Were Bombed

By Matt Burgess
An attack on Russian mercenaries shows how militaries are increasingly using open source data—with sometimes deadly consequences.

Scans of Students’ Homes During Tests Are Deemed Unconstitutional

By Ashley Belanger, Ars Technica
An Ohio judge ruled that such surveillance to prevent cheating could form a slippery slope to more illegal searches.

The Privacy Flaw Threatening US Democracy

By Thor Benson
Without robust federal protections, the country's widespread mass surveillance systems could be used against citizens like never before.

The Twitter Whistleblower Report’s Most Damning Allegation

By Lily Hay Newman
Peiter “Mudge” Zatko’s claims about the company’s lax security are all bad. But one clearly captures the extent of systemic issues.

Inside the World’s Biggest Hacker Rickroll

By Matt Burgess
As a graduation prank, four high school students hijacked 500 screens across six school buildings to troll their classmates and teachers.

Janet Jackson’s ‘Rhythm Nation’ Can Crash Old Hard Drives

By Lily Hay Newman
Plus: The Twilio hack snags a reporter, a new tool to check for spyware, and the Canadian weed pipeline gets hit by a cyberattack.

iOS Can Stop VPNs From Working as Expected—and Expose Your Data

By Kevin Purdy, Ars Technica
A security researcher claims that Apple mobile devices keep connections open if they are created before a VPN is activated.

Spyware Hunters Are Expanding Their Tool Set

By Lily Hay Newman
This invasive malware isn’t just for phones—it can target your PC too. But a new batch of algorithms aims to weed out this threat.

How to Use Signal Encrypted Messaging

By Brian Barrett, Andrew Couts
The best end-to-end encrypted messaging app has a host of security features. Here are the ones you should care about.

The Family That Mined the Pentagon's Data for Profit

By Mark Harris
The Freedom of Information Act helps Americans learn what the government is up to. The Poseys exploited it—and became unlikely defenders of transparency.

The Android 13 Privacy Settings You Should Update Now

By Matt Burgess
Google’s new mobile operating system has arrived. Take back some control with these privacy and security tips.

How to Create a Secure Folder on Your Phone

By David Nield
Keep private photos, videos, and documents away from prying eyes.

A New Tractor Jailbreak Rides the Right-to-Repair Wave

By Lily Hay Newman
A hacker has formulated an exploit that provides root access to two popular models of the company’s farm equipment.

Flaw in the VA Medical Records Platform May Put Patients at Risk

By Lily Hay Newman
The Veterans Affairs’ VistA software has a vulnerability that could let an attacker “masquerade as a doctor,” a security researcher warns.

The Feds Gear Up for a Privacy Crackdown

By Matt Burgess, Andrew Couts
Plus: Cisco gets hit by ransomware, Twilio gets phished, a new way to fight email spammers, and much more.

A Single Flaw Broke Every Layer of Security in MacOS

By Matt Burgess
An injection flaw allowed a researcher to access all files on a Mac. Apple issued a fix, but some machines may still be vulnerable.

Zoom’s Auto-Update Feature Came With Hidden Risks on Mac

By Lily Hay Newman
The popular video meeting app makes it easy to keep the software up to date—but it also introduced vulnerabilities.

Here’s What Trump’s ‘Nuclear Documents’ Could Be

By Garrett M. Graff
FBI agents reportedly searched Mar-a-Lago for “nuclear documents.” That can fall into one of these four categories.

The US Offers a $10M Bounty for Intel on Conti Ransomware Gang

By Matt Burgess
The State Department organization has called for people to share details about five key members of the hacking group.

Sloppy Software Patches Are a ‘Disturbing Trend’

By Lily Hay Newman
The Zero Day Initiative has found a concerning uptick in security updates that fail to fix vulnerabilities.

Meta Just Happens to Expand Messenger’s End-to-End Encryption

By Lily Hay Newman
The company says an expansion of privacy features in Messenger is unrelated to a high-profile Nebraska abortion case.

This Anti-Tracking Tool Checks If You’re Being Followed

By Matt Burgess
The Raspberry Pi-powered device can scan for phones around you. If it keeps spotting the same one, it’ll send you an alert.

Google's Android Red Team Had a Full Pixel 6 Pwn Before Launch

By Lily Hay Newman
Before the flagship phone ever landed in users’ hands, the security team thoroughly hacked it by finding bugs and developing exploits.

A Long-Awaited IoT Reverse Engineering Tool Is Finally Here

By Lily Hay Newman
Ten years after it was first unveiled, the powerful firmware analysis platform Ofrak is now available to anyone.

The Hacking of Starlink Terminals Has Begun

By Matt Burgess
It cost a researcher only $25 worth of parts to create a tool that allows custom code to run on the satellite dishes.

One of 5G’s Biggest Features Is a Security Minefield

By Lily Hay Newman
New research found troubling vulnerabilities in the 5G platforms carriers offer to wrangle embedded device data.

Big Takeaways From the FBI's Mar-a-Lago Raid

By Garrett M. Graff
The fact that a search of Donald Trump's Florida home was even necessary says a lot.

Will Europe Force a Facebook Blackout?

By Matt Burgess
Regulators are close to stopping Meta from sending EU data to the US, bringing a years-long privacy battle to a head.

GitHub Moves to Guard Open Source Against Supply Chain Attacks

By Lily Hay Newman
The popular Microsoft-owned code repository plans to roll out code signing, which will help beef up the security of open source projects.

A Phone Carrier That Doesn’t Track Your Browsing or Location

By Lily Hay Newman
The new Pretty Good Phone Privacy service for Android hides the data linking you to your mobile device.

How to Use Lockdown Mode in iOS 16 to Make Your Phone More Secure

By David Nield
Whether you want to turn off link previews or block unwanted FaceTime calls, here's what you need to know.

The US Emergency Alert System Has Dangerous Flaws

By Andrew Couts
Plus: A crypto-heist extravaganza, a peek at an NSO spyware dashboard, and more.

An ISP Settled Piracy Lawsuits. Could Users Take the Hit?

By Jon Brodkin, Ars Technica
Now that Charter has reached settlements with major record labels, it’s unclear whether the cable provider will pull the plug on users who pirate music.

A Slack Bug Exposed Some Users’ Hashed Passwords for 5 Years

By Lily Hay Newman
The exposure of cryptographically scrambled passwords isn’t a worst-case scenario—but it isn’t great, either.

All the Data Amazon's Ring Cameras Collect About You

By Matt Burgess
The popular security devices are tracking (and sharing) more than you might think.

An Attack on Albanian Government Suggests New Iranian Aggression

By Lily Hay Newman
A Tehran-linked hack of a NATO member marks a significant escalation against the backdrop of US-Iran nuclear talks.

The Microsoft Team Racing to Catch Bugs Before They Happen

By Lily Hay Newman
What's it like to be responsible for a billion people's digital security? Just ask the company's Morse researchers.

A New Attack Easily Knocked Out a Potential Encryption Algorithm

By Dan Goodin, Ars Technica
SIKE was a contender for post-quantum-computing encryption. It took researchers an hour and a single PC to break it.

Bitcoin Fog Case Could Put Cryptocurrency Tracing on Trial

By Lily Hay Newman, Andy Greenberg
Roman Sterlingov, accused of laundering $336 million, is proclaiming his innocence—and challenging a key investigative tool.

Apple Just Patched 39 iPhone Security Bugs

By Kate O'Flaherty
Plus: A Google Chrome patch licks the DevilsTongue spyware, Android’s kernel gets a tune-up, and Microsoft fixes 84 flaws.

You Pay More When Companies Get Hacked

By Matt Burgess
Plus: Google delays the end of cookies (again), EU officials were targeted with Pegasus spyware, and more of the top security news.

How Tor Is Fighting—and Beating—Russian Censorship

By Matt Burgess
Russia has been trying to block the anonymous browser since December—with mixed results.

Don’t Call the New Federal Gun Law a Gun Law

By Matt Laslo
Democratic senators lacked actionable gun data for their negotiations—so they passed mental health reform instead.

Russia Is Quietly Ramping Up Its Internet Censorship Machine

By Matt Burgess
Since Vladimir Putin blocked Facebook, Instagram, and Twitter in March, Russia has been pushing away from the global internet at a rapid pace.

Interstate Travel Post-Roe Isn’t as Secure as You May Think

By Thor Benson
Despite the DOJ vowing to protect people's ability to travel out of state for abortion care, legal experts warn not to take that freedom for granted.

How to Safely Lend Someone Else Your Phone

By David Nield
The next time someone wants to borrow your device to make a call or take a picture, take these steps to protect your privacy.
❌