FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayWIRED

The New Era of Social Media Looks as Bad for Privacy as the Last One

By Vittoria Elliott
The slow-motion implosion of Elon Musk’s X has given rise to a slew of competitors, where privacy invasions that ran rampant over the past decade still largely persist.

Apple, Google, and Microsoft Just Patched Some Spooky Security Flaws

By Kate O'Flaherty
Plus: Major vulnerability fixes are now available for a number of enterprise giants, including Cisco, VMWare, Citrix, and SAP.

This Cryptomining Tool Is Stealing Secrets

By Lily Hay Newman
Plus: Details emerge of a US government social media-scanning tool that flags β€œderogatory” speech, and researchers find vulnerabilities in the global mobile communications network.

The Destruction of Gaza’s Internet Is Complete

By Matt Burgess
As Israel increases its ground operation in Gaza, the last remaining internet and mobile connections have gone dark.

TikTok Streamers Are Staging β€˜Israel vs. Palestine’ Live Matches to Cash In on Virtual Gifts

By David Gilbert
TikTokkers are using a little-known livestreaming feature to falsely represent Israelis and Palestiniansβ€”and the company is taking a cut of costly in-app gifts viewers give to participants.

Maine Mass Shooting Disinformation Floods Social Media as Suspect Remains at Large

By David Gilbert
In the hours following the worst mass shooting in Maine’s history, disinformation about the suspected gunman flooded social media with false claims that he had been arrested.

Okta's Latest Security Breach Is Haunted by the Ghost of Incidents Past

By Lily Hay Newman
A recent breach of authentication giant Okta has impacted nearly 200 of its clients. But repeated incidents and the company’s delayed disclosure have security experts calling foul.

Elon Musk Mocked Ukraine, and Russian Trolls Went Wild

By Matt Burgess
Inauthentic accounts on X flocked to its owner’s post about Ukrainian president Vlodymr Zelensky, hailing β€œComrade Musk” and boosting pro-Russia propaganda.

The AI-Generated Child Abuse Nightmare Is Here

By Matt Burgess
Thousands of child abuse images are being created with AI. New images of old victims are appearing, as criminals trade datasets.

A Controversial Plan to Scan Private Messages for Child Abuse Meets Fresh Scandal

By Vas Panagiotopoulos
An EU government body is pushing a proposal to combat child sexual abuse material that has significant privacy implications. Its lead advocate is making things even messier.

A Powerful Tool US Spies Misused to Stalk Women Faces Its Potential Demise

By Dell Cameron
Though often viewed as the β€œcrown jewel” of the US intelligence community, fresh reports of abuse by NSA employees and chaos in the US Congress put the tool's future in jeopardy.

They Cracked the Code to a Locked USB Drive Worth $235 Million in Bitcoin. Then It Got Weird

By Andy Greenberg
Stefan Thomas lost the password to an encrypted USB drive holding 7,002 bitcoins. One team of hackers believes they can unlock itβ€”if they can get Thomas to let them.

The Hamas Threat of Hostage Execution Videos Looms Large Over Social Media

By David Gilbert
Hamas has threatened to broadcast videos of hostage executions. With the war between Israel and Hamas poised to enter a new phase, are social platforms ready?

The 23andMe User Data Leak May Be Far Worse Than Believed

By Andrew Couts
Plus: IT workers secretly funnel money to North Korea, a court in the US upholds keyword search warrants, and WhatsApp gets a passwordless upgrade on Android

The Dangerous Mystery of Hamas’ Missing β€˜Suicide Drones’

By Justin Ling
Hamas has long touted its military drones, but little is known about the true scale of the threat. The answer may have consequences for people on both sides of the Israel-Gaza border.

Citing Hamas, the US Wants to Treat Crypto "Mixers" as Suspected Money Launderers

By Andy Greenberg
With a new emphasis on the Hamas attacks on Israel, the US Treasury has proposed designating foreign cryptocurrency β€œmixer” services as money launderers and national security threats.

Who’s Responsible for the Gaza Hospital Explosion? Here’s Why It’s Hard to Know What’s Real

By David Gilbert
A flood of false information, partisan narratives, and weaponized β€œfact-checking" has obscured efforts to find out who’s responsible for an explosion at a hospital in Gaza.

Elon Musk’s Main Tool for Fighting Disinformation on X Is Making the Problem Worse, Insiders Claim

By Vittoria Elliott, David Gilbert
X is promoting Community Notes to solve its disinformation problems, but some former employees and people who currently contribute notes say it’s not fit for that purpose.

They Supported Air Strike Victims. Then They Were Doxed and Arrested

By Matt Burgess
Myanmar’s military junta is increasing surveillance and violating basic human rights. The combination of physical and digital surveillance is reaching dangerous new levels.

Deepfake Porn Is Out of Control

By Matt Burgess
New research shows the number of deepfake videos is skyrocketingβ€”and the world's biggest search engines are funneling clicks to dozens of sites dedicated to the nonconsensual fakes.

The US Congress Was Targeted With Predator Spyware

By Andy Greenberg, Lily Hay Newman
Plus: Hamas raised millions in crypto, Exxon used hacked data, and more.

Rumors of a β€˜Global Day of Jihad’ Have Unleashed a Dangerous Wave of Disinformation

By David Gilbert
The rapid spread of violent videos and photos, combined with a toxic stew of mis- and disinformation, now threatens to spill over into real-world violence.

US House Republicans Had Their Phones Confiscated to Stop Leaks

By Matt Laslo
In an attempt to wrest control from raucous far-right hardliners amid the fight for a new House speaker, Republican Party leaders are instituting phone bans to keep backroom deals secret.

HTTP/2 Rapid Reset: A New Protocol Vulnerability Will Haunt the Web for Years

By Lily Hay Newman
Dubbed β€œHTTP/2 Rapid Reset,” the flaw requires issuing patches to virtually every web server around the world before the problem can be eradicated.

New Clues Suggest Stolen FTX Funds Went to Russia-Linked Money Launderers

By Andy Greenberg
Whoever looted FTX on the day of its bankruptcy has now moved the stolen money through a long string of intermediariesβ€”and eventually some that look Russian in origin.

A Graphic Hamas Video Donald Trump Jr. Shared on X Is Actually Real, Research Confirms

By David Gilbert
A video posted by Donald Trump Jr. showing Hamas militants attacking Israelis was falsely flagged in a Community Note as being years old, thus making X's disinformation problem worse, not better.

The UN Risks Normalizing Internet Censorship

By Justin Ling
The United Nations' top internet governance body will allegedly host its next two annual meetings in countries known for repressive internet policies and human rights abuses.

Elon Musk Is Personally Undermining X’s Efforts to Curb Israel-Hamas War Disinformation

By David Gilbert
X’s Trust and Safety team says it’s working to remove false information related to the Israel-Hamas war. Meanwhile, Elon Musk is sharing conspiracies and chatting with QAnon promoters.

Google Makes Passkeys Default, Stepping Up Its Push to Kill Passwords

By Lily Hay Newman
Google is making passkeys, the emerging passwordless login technology, the default option for users as it moves to make passwords β€œobsolete.”

Activist Hackers Are Racing Into the Israel-Hamas Warβ€”for Both Sides

By Lily Hay Newman, Matt Burgess
Since the conflict escalated, hackers have targeted dozens of government websites and media outlets with defacements and DDoS attacks, and attempted to overload targets with junk traffic to bring them down.

The Israel-Hamas War Is Drowning X in Disinformation

By David Gilbert
People who have turned to X for breaking news about the Israel-Hamas conflict are being hit with old videos, fake photos, and video game footage at a level researchers have never seen.

Inside FTX’s All-Night Race to Stop a $1 Billion Crypto Heist

By Andy Greenberg
The same chaotic day FTX declared bankruptcy, someone began stealing hundreds of millions of dollars from its coffers. A WIRED investigation reveals the company’s β€œvery crazy night” trying to stop them.

Israel's Failure to Stop the Hamas Attack Shows the Danger of Too Much Surveillance

By Matt Burgess, Lily Hay Newman
Hundreds dead, thousands woundedβ€”Hamas’ surprise attack on Israel shows the limits of even the most advanced and invasive surveillance dragnets as full-scale war erupts.

Apple's Encryption Is Under Attack by a Mysterious Group

By Andrew Couts
Plus: Sony confirms a breach of its networks, US federal agents get caught illegally using phone location data, and more.

White Supremacist Active Clubs Are Breeding on Telegram

By David Gilbert
A β€œfriendlier” front for racist extremism has spread rapidly across the US in recent months, as active club channels network on Telegram's encrypted messaging app.

23andMe User Data Stolen in Targeted Attack on Ashkenazi Jews

By Lily Hay Newman
At least a million data points from 23andMe accounts appear to have been exposed on BreachForums. While the scale of the campaign is unknown, 23andMe says it's working to verify the data.

The Team Helping Women Fight Digital Domestic Abuse

By Matt Burgess
Location-enabled tech designed to make our lives easier is often exploited by domestic abusers. Refuge, a UK nonprofit, helps women to leave abusive relationships, secure their devices, and stay safe.

Your Cheap Android TV Streaming Box May Have a Dangerous Backdoor

By Matt Burgess
New research has found that some streaming devices and dozens of Android and iOS apps are secretly being used for fraud and other cybercrime.

How Neuralink Keeps Dead Monkey Photos Secret

By Dell Cameron, Dhruv Mehrotra
Elon Musk’s brain-chip startup conducted years of tests at UC Davis, a public university. A WIRED investigation reveals how Neuralink and the university keep the grisly images of test subjects hidden.

The Biggest Hack of 2023 Keeps Getting Bigger

By Lily Hay Newman, Matt Burgess
Victims of the MOVEit breach continue to come forward. But the full scale of the attack is still unknown.

Predictive Policing Software Terrible at Predicting Crimes

By Aaron Sankin, Surya Mattu
A software company sold a New Jersey police department an algorithm that was right less than 1 percent of the time.

How to Stop Google Bard From Storing Your Data and Location

By Reece Rogers
Checking out this AI chatbot's new features? Make sure to keep these privacy tips in mind during your interactions.

How to Tell When Your Phone Will Stop Getting Security Updates

By David Nield
Every smartphone has an expiration date. Here’s when yours will probably come.

Chinese Hackers Are Hiding in Routers in the US and Japan

By Lily Hay Newman, Matt Burgess
Plus: Stolen US State Department emails, $20 million zero-day flaws, and controversy over the EU’s message-scanning law.

Apple, Microsoft, and Google Just Fixed Multiple Zero-Day Flaws

By Kate O'Flaherty
Plus: Mozilla patches 10 Firefox bugs, Cisco fixes a vulnerability with a rare maximum severity score, and SAP releases updates to stamp out three highly critical flaws.

US Justice Department Urged to Investigate Gunshot Detector Purchases

By Dell Cameron, Dhruv Mehrotra
A civil liberties group has asked the DOJ to investigate deployment of the ShotSpotter gunfire-detection system, which research shows is often installed in predominantly Black neighborhoods.

SoundThinking, Maker of ShotSpotter, Is Buying Parts of PredPol Creator Geolitica

By Dhruv Mehrotra, Dell Cameron
SoundThinking is purchasing parts of Geolitica, the company that created PredPol. Experts say the acquisition marks a new era of companies dictating how police operate.

Risk of a US Government Shutdown Is Fueled by Very Online Republicans

By Matt Laslo
Egged on by a far-reaching conservative media ecosystem, right-wing hardliners are forcing Washington to bend to their reality as the federal government careens toward a possible shutdown.

Satellite Images Show the Devastating Cost of Sudan’s Aerial War

By Vittoria Elliott
As civil conflict continues in and above the streets of Khartoum, satellite images from the Conflict Observatory at Yale University have captured the catastrophic damage.

A Tricky New Way to Sneak Past Repressive Internet Censorship

By Justin Ling
With the number of internet blackouts on the rise, cybersecurity firm eQualitie figured out how to hide censored online news in satellite TV signals.

Your Boss’s Spyware Could Train AI to Replace You

By Thor Benson
Corporations are using software to monitor employees on a large scale. Some experts fear the data these tools collect could be used to automate people out of their jobs.

The Shocking Data on Kia and Hyundai Thefts in the US

By Lily Hay Newman
Plus: MGM hackers hit more than just casinos, Microsoft researchers accidentally leak terabytes of data, and China goes on the PR offensive over cyberespionage.

Chinese Spies Infected Dozens of Networks With Thumb Drive Malware

By Andy Greenberg
Security researchers found USB-based Sogu espionage malware spreading within African operations of European and US firms.

Massive MGM and Caesars Hacks Epitomize a Vicious Ransomware Cycle

By Lily Hay Newman
Cyberattacks on casinos grab attention, but a steady stream of less publicized attacks leave vulnerable victims struggling to recover.

The US Congress Has Trust Issues. Generative AI Is Making It Worse

By Matt Laslo
Senators are meeting with Silicon Valley's elite to learn how to deal with AI. But can Congress tackle the rapidly emerging tech before working on itself?

The Twisted Eye in the Sky Over Buenos Aires

By Karen Naundorf
A scandal unfolding in Argentina shows the dangers of implementing facial recognitionβ€”even with laws and limits in place.

China-Linked Hackers Breached a Power Gridβ€”Again

By Andy Greenberg
Signs suggest the culprits worked within a notorious Chinese hacker group that may have also hacked Indian electric utilities years earlier.

AI Chatbots Are Invading Your Local Governmentβ€”and Making Everyone Nervous

By Todd Feathers
State and local governments in the US are scrambling to harness tools like ChatGPT to unburden their bureaucracies, rushing to write their own rulesβ€”and avoid generative AI's many pitfalls.

Mozilla: Your New Car Is a Data Privacy Nightmare

By Dhruv Mehrotra, Andrew Couts
Plus: Apple patches newly discovered flaws exploited by NSO Group spyware, North Korean hackers target security researchers, and more.
❌