FreshRSS

🔒
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayWIRED

Ukraine Enters a Dark New Era of Drone Warfare

By Morgan Meaker
A series of deadly attacks using Iranian “suicide drones” shows Russia is shifting gears in the conflict.

How Vice Society Got Away With a Global Ransomware Spree

By Lily Hay Newman
Vice Society has a superpower that’s allowed it to quietly carry out attacks on schools and hospitals around the world: mediocrity.

How the World Will Know If Russia Is Preparing to Launch a Nuclear Attack

By Lily Hay Newman
While tensions over a possible nuclear attack on Ukraine remain high, experts say surveillance will likely catch Russia if it plans to do the unthinkable.

The Hunt for Wikipedia's Disinformation Moles

By Masha Borak
Custodians of the crowdsourced encyclopedia are charged with protecting it from state-sponsored manipulators. A new study reveals how.

How to Use Passkeys in Google Chrome and Android

By David Nield
Google wants to make your digital life—in its ecosystem, anyway—passwordless and more secure.

Elon Musk’s SpaceX Bails on Starlink Funding for Ukraine

By Andrew Couts
Plus: Hackers hit the Mormon Church, Signal plans to ditch SMS for Android, and a Fat Bear election erupts in scandal.

The $1 Billion Alex Jones Effect

By Chris Stokel-Walker
The Infowars host now knows the cost of “free speech”—but does the landmark judgment signal a crackdown on disinformation?

Celsius Exchange Data Dump Is a Gift to Crypto Sleuths—and Thieves

By Andy Greenberg
By releasing half a million users’ transactions in a bankruptcy court filing, the company has opened a vast breach in its users’ financial privacy.

Google’s Pixel 7 and Pixel 7 Pro Pack New Android VPN and Tensor G2, Titan M2 Chips

By Lily Hay Newman
The company says it hardened the security of its new flagship phones—and plans to release a built-in Android VPN.

Windows 11 Now Offers Automatic Phishing Protection

By David Nield
You’re safer than ever—here’s how.

Binance Hackers Minted $569M in Crypto—Then It Got Complicated

By Lily Hay Newman, Andy Greenberg
Plus: The US warns of a mysterious military contractor breach, a "poisoned" version of the Tor Browser is tracking Chinese users, and more.

The Uber Data Breach Conviction Shows Security Execs What Not to Do

By Lily Hay Newman
Former Uber security chief Joe Sullivan’s conviction is a rare criminal consequence for an executive’s handling of a hack.

Biden’s Privacy Order Slaps a Band-Aid on the EU-US Data Crisis

By Morgan Meaker
A new executive order tries to reassure Europeans that their data is safe on US soil, despite government surveillance.

Meta Says It Has Busted More Than 400 Login-Stealing Apps This Year

By Lily Hay Newman
The company plans to alert 1 million Facebook users that their account credentials may have been compromised by malicious software.

The Fight to Cut Off the Crypto Fueling Russia's Ukraine Invasion

By Andy Greenberg
Blockchain investigators have uncovered at least $4 million—and counting—in cryptocurrency donations to Russia’s violent militia groups.

Swatted: A Shooting Hoax Spree Is Terrorizing Schools Across the US

By Dhruv Mehrotra
Sixteen states collectively suffered more than 90 false reports of school shooters during three weeks in September—and many appear to be connected.

The High Cost of Living Your Life Online

By Thor Benson
Constantly posting content on social media can erode your privacy—and sense of self.

Microsoft Exchange Server Has a Zero-Day Problem

By Lily Hay Newman, Dhruv Mehrotra
Plus: CIA failures allegedly got US informants killed, a former NSA worker is charged under the Espionage Act, and more.

The Challenge of Cracking Iran’s Internet Blockade

By Lily Hay Newman
People around the world are rallying to subvert Iran's internet shutdown, but actually pulling it off is proving difficult and risky.

Go Update iOS, Chrome, and HP Computers to Fix Serious Flaws

By Kate O'Flaherty
Plus: WhatsApp plugs holes that could be used for remote execution attacks, Microsoft patches a zero-day vulnerability, and more.

A Matrix Update Patches Serious End-to-End Encryption Flaws

By Dan Goodin, Ars Technica
The messenger protocol had gained popularity for its robust security, but vulnerabilities allowed attackers to decrypt messages and impersonate users.

Mystery Hackers Are ‘Hyperjacking’ Targets for Insidious Spying

By Andy Greenberg
For decades, security researchers warned about techniques for hijacking virtualization software. Now one group has put them into practice.

The Race to Find the Nord Stream Saboteurs

By Matt Burgess
Damage to the pipeline that runs between Russia and Germany is being treated as deliberate. Finding out what happened may not be straightforward.

Cloudflare Takes a Stab at a Captcha That Doesn’t Suck

By Lily Hay Newman
The internet infrastructure company has an alternative tool to check whether you’re human—and it doesn’t force you to pick out buses in tiny boxes.

How to Advocate for Data Privacy and Users' Rights

By Omar L. Gallaga
Want to speak up against Big Tech, unjust data collection, and surveillance? Here's how to be an activist in your community and beyond.

The Dire Warnings in the Lapsus$ Hacker Joyride

By Lily Hay Newman
The fun-loving cybercriminals blamed for breaches of Uber and Rockstar are exposing weaknesses in ways others aren't.

The ITU's Secretary-General Election Could Shape the Internet's Future

By Justin Ling
UN countries are preparing to pick a new head of the International Telecommunications Union. Who wins could shape the open web's future.

VPN Providers Flee India as a New Data Law Takes Hold

By Varsha Bansal
Many companies have pulled physical servers from the country as a mandate to collect customer data goes into effect.

Child Predators Mine Twitch to Prey on Kids

By Lily Hay Newman, Matt Burgess
Plus: A leaked trove illuminates Russia’s internet regulator, a report finds Facebook and Instagram violated Palestinian rights, and more.

Slack’s and Teams’ Lax App Security Raises Alarms

By Andy Greenberg
New research shows how third-party apps could be exploited to infiltrate these sensitive workplace tools.

Iran’s Internet Shutdown Hides a Deadly Crackdown

By Matt Burgess
Amid protests against the killing of Mahsa Amini, authorities have cut off mobile internet, WhatsApp, and Instagram. The death toll continues to rise.

The Ungodly Surveillance of Anti-Porn ‘Shameware’ Apps

By Dhruv Mehrotra
Churches are using invasive phone-monitoring tech to discourage “sinful” behavior. Some software is seeing more than congregants realize.

A New Linux Tool Aims to Guard Against Supply Chain Attacks

By Lily Hay Newman
Security firm Chainguard has created a simple, open source way for organizations to defend the cloud against some of the most insidious attacks.

Shadowy Russian Cell Phone Companies Are Cropping Up in Ukraine

By Matt Burgess
But as Ukrainians retake ground, some of the firms are erasing their online presence.

Telegram Has a Serious Doxing Problem

By Peter Guest
The encrypted messaging app is a haven for politically motivated vitriol, but users are increasingly bringing threats to targets’ doorsteps.

The Deep Roots of Nigeria’s Cybersecurity Problem

By Olatunji Olaigbe
Despite having one of the strongest data-protection policies in Africa, the country’s enforcement and disclosure practices remain dangerously broken.

How to Use DuckDuckGo’s Privacy-First Email Service

By David Nield
Tired of advertisers spying on your private communications? This beta promises to kick tracking technology to the curb.

The Queen’s Funeral Sets Off the Biggest UK Police Operation Ever

By Matt Burgess
Snipers on buildings. Drone no-fly zones. Temporary CCTV. The security plan is even more complex than it was for the London 2012 Olympics.

US Border Agents May Have a Copy of Your Text Messages

By Andrew Couts
Plus: An AI artist exposes surveillance of Instagram users, the US charges Iranians over a ransomware campaign, and more.

The Uber Hack’s Devastation Is Just Starting to Reveal Itself

By Lily Hay Newman
An alleged teen hacker claims to have gained deep access to the company’s systems, but the full picture of the breach is still coming into focus.

The Shaky Future of a Post-Roe Federal Privacy Law

By Matt Laslo
The American Data Privacy and Protection Act could protect people across the country. But first, it has to get past Nancy Pelosi.

Inside the Shadow Evacuation of Kabul

By Michael Venutolo-Mantovani
In the last two weeks of the war, an ad hoc team armed with group chats, QR codes, and satellite maps launched a mad dash to save imperiled Afghan allies.

The Twitter Whistleblower’s Testimony Has Senators Out for Blood

By Matt Laslo
Peiter “Mudge” Zatko’s allegations about the social media platform renewed a sense of urgency for lawmakers to rein in Big Tech.

Ukraine’s Cyberwar Chief Sounds Like He’s Winning

By Chris Stokel-Walker
Yurii Shchyhol gives WIRED a rare interview about running the country’s Derzhspetszviazok and the state of the online conflict with Russia.

How Whistleblowers Navigate a Security Minefield

By Matt Burgess
Exposing wrongdoing is risky on the best of days. Whistleblower Aid cofounder John Tye explains the extensive steps needed to keep people safe.

iOS 16 Has 2 New Security Features for Worst-Case Scenarios

By Lily Hay Newman
Safety Check and Lockdown Mode give people in vulnerable situations ways to quarantine themselves from acute risks.

Hackers Target Los Angeles School District With Ransomware

By Matt Burgess
Plus: Albania cuts ties with Iran, claims of a TikTok data breach that didn’t happen, and much more.

This Clever Anti-Censorship Tool Lets Russians Read Blocked News

By Matt Burgess
Samizdat Online syndicates banned news sites by hosting them on uncensored domains—allowing people to access independent reporting.

Apple’s Killing the Password. Here’s Everything You Need to Know

By Matt Burgess
With iOS 16 and macOS Ventura, Apple is introducing passkeys—a more convenient and secure alternative to passwords.

It’s Time to Get Real About TikTok’s Risks

By Lily Hay Newman
US lawmakers keep warning about the popular app. But until they can explain what makes it uniquely dangerous, it’s difficult to tailor a resolution.

Police Across US Bypass Warrants With Mass Location-Tracking Tool

By Lily Hay Newman
Plus: An unsecured database exposed face recognition data in China, ‘Cuba’ ransomware knocks out Montenegro, and more.

TikTok Users Were Vulnerable to a Single-Click Attack

By Dan Goodin, Ars Technica
Microsoft disclosed the flaw in the Android app’s deep link verification process, which has since been fixed.

A Windows 11 Automation Tool Can Easily Be Hijacked

By Matt Burgess
Hackers can use Microsoft’s Power Automate to push out ransomware and key loggers—if they get machine access first.

The US May Soon Learn What a ‘Kid-Friendly’ Internet Looks Like

By Pia Ceres
The California Age-Appropriate Design Code would launch a huge online privacy experiment. And it won’t just affect children.

Careless Errors in Hundreds of Apps Could Expose Troves of Data

By Lily Hay Newman
Researchers found that mobile applications contain keys that could provide access to both user information and private files from unconnected apps.

Apple Fixed a Serious iOS Security Flaw—Have You Updated Yet?

By Kate O'Flaherty
Plus: Chrome patches another zero-day flaw, Microsoft closes up 100 vulnerabilities, Android gets a significant patch, and more.

The Telegram-Powered News Outlet Waging Guerrilla War on Russia

By Guillaume Ptak
Anti-Putin media network February Morning has become a central player in the underground fight against the Kremlin.
❌