FreshRSS

🔒
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayWIRED

Okta Breach Impacted All Customer Support Users—Not 1 Percent

By Lily Hay Newman
Okta upped its original estimate of customer support users affected by a recent breach from 1 percent to 100 percent, citing a “discrepancy.”

A Civil Rights Firestorm Erupts Around a Looming Surveillance Power Grab

By Dell Cameron
Dozens of advocacy groups are pressuring the US Congress to abandon plans to ram through the renewal of a controversial surveillance program that they say poses an “alarming threat to civil rights.”

Telegram’s Bans on Extremist Channels Aren't Really Bans

By Vittoria Elliott
A WIRED analysis of more than 100 restricted channels shows these communities remain active, and content shared within them often spreads to channels accessible to the public.

Section 702 Surveillance Reauthorization May Get Slipped Into ‘Must-Pass’ NDAA

By Dell Cameron
Congressional leaders are discussing ways to reauthorize Section 702 surveillance, including by attaching it to the National Defense Authorization Act, Capitol Hill sources tell WIRED.

Google’s Ad Blocker Crackdown Is Growing

By Matt Burgess
Plus: North Korean supply chain attacks, a Russian USB worm spreads internationally, and more.

It's Time to Log Off

By Thor Benson
There’s a devastating amount of heavy news these days. Psychology experts say you need to know your limits—and when to put down the phone.

DOJ Charges Binance With Vast Money-Laundering Scheme and Sanctions Violations

By Andy Greenberg
From Russia to Iran, the feds have charged Binance with conducting well over $1 billion in transactions with sanctioned countries and criminal actors.

Secretive White House Surveillance Program Gives Cops Access to Trillions of US Phone Records

By Dell Cameron, Dhruv Mehrotra
A WIRED analysis of leaked police documents verifies that a secretive government program is allowing federal, state, and local law enforcement to access phone records of Americans who are not suspected of a crime.

Cybersecurity Industry Baffled by FBI’s Lack of Action on Ransomware Gang

By Andy Greenberg, Andrew Couts
Plus: Hackers reveal flaws in crypto wallets holding $1 billion, a massive breach of Danish electric utilities, and more.

Inside the Race to Secure the F1 Las Vegas Grand Prix

By Lily Hay Newman
Beyond the blinding speeds and sharp turns on new terrain, the teams at this weekend’s big F1 race are preparing for another kind of danger.

US Congress Report Calls for Privacy Reforms After FBI Surveillance 'Abuses'

By Dell Cameron
A new report by an oversight committee in the US House of Representatives says the FBI has routinely violated rules governing FISA’s Section 702 surveillance program and must be reined in.

Running Signal Will Soon Cost $50 Million a Year

By Andy Greenberg
Signal’s president reveals the cost of running the privacy-preserving platform—not just to drum up donations, but to call out the for-profit surveillance business models it competes against.

A Spy Agency Leaked People's Data Online—Then the Data Was Stolen

By Matt Burgess
The National Telecommunication Monitoring Center in Bangladesh exposed a database to the open web. The types of data leaked online are extensive.

Google’s New Titan Security Key Adds Another Piece to the Password-Killing Puzzle

By Lily Hay Newman
The new generation of hardware authentication key includes support for cryptographic passkeys as Google pushes adoption of the more secure login alternative.

Asian Americans Raise Alarm Over ‘Chilling Effects’ of Section 702 Surveillance Program

By Dell Cameron
More than 60 groups advocating for Asian American and Pacific Islander communities are pushing the US Congress to reform the Section 702 surveillance program as Senate leaders move to renew it.

CISA Has a New Road Map for Handling Weaponized AI

By Lily Hay Newman
In its plans to implement a White House executive order, CISA aims to strike a balance between promoting AI adoption for national security and defending against its malicious use.

US Privacy Groups Urge Senate Not to Ram Through NSA Spying Powers

By Dell Cameron
An effort to reauthorize a controversial US surveillance program by attaching it to a must-pass spending bill has civil liberties advocates calling foul.

Signal Is Finally Testing Usernames

By Dhruv Mehrotra, Dell Cameron
Plus: A DDoS attack shuts down ChatGPT, Lockbit shuts down a bank, and a communications breakdown between politicians and Big Tech.

This New Tool Aims to Keep Terrorism Content Off the Internet

By David Gilbert
Small platforms without resources to handle takedown requests have been weaponized by terrorist groups that share their content online. A free new tool is coming to help clean house.

Here’s How Violent Extremists Are Exploiting Generative AI Tools

By David Gilbert
Experts are finding thousands of examples of AI-created content every week that could allow terrorist groups and other violent extremists to bypass automated detection systems.

Omegle Was Forced to Shut Down by a Lawsuit From a Sexual Abuse Survivor

By Amanda Hoover
Omegle connected strangers to one another and had a long-standing problem of pairing minors with sexual predators. A legal settlement took it down.

Sandworm Hackers Caused Another Blackout in Ukraine—During a Missile Strike

By Andy Greenberg
Russia's most notorious military hackers successfully sabotaged Ukraine's power grid for the third time last year. And in this case, the blackout coincided with a physical attack.

This Is the Ops Manual for the Most Tech-Savvy Animal Liberation Group in the US

By Andy Greenberg
For the first time, guerrilla animal rights group Direct Action Everywhere reveals a guide to its investigative tactics and toolkit, from spy cams to night vision and drones.

Government Surveillance Reform Act of 2023 Seeks to End Warrantless Police and FBI Spying

By Dell Cameron
The Government Surveillance Reform Act of 2023 pulls from past privacy bills to overhaul how police and the feds access Americans’ data and communications.

Internet Blackouts in Gaza Are a New Weapon in the Israel-Hamas War

By Matt Burgess, Lily Hay Newman
Israel has said it’s prepared to disrupt internet service in Gaza, signaling a new age of warfare. In the past two weeks, the Palestinian territory has already suffered three communications shutdowns.

YouTube's Ad Blocker Detection Believed to Break EU Privacy Law

By K.G. Orphanides
A complaint filed with the EU’s independent data regulator accuses YouTube of failing to get explicit user permission for its ad blocker detection system, potentially violating the ePrivacy Directive.

This Cheap Hacking Device Can Crash Your iPhone With Pop-Ups

By Matt Burgess
Plus: SolarWinds is charged with fraud, New Orleans police face recognition has flaws, and new details about Okta’s October data breach emerge.

Microsoft Does Damage Control With Its New 'Secure Future Initiative'

By Lily Hay Newman
Following a string of serious security incidents, Microsoft says it has a plan to deal with escalating threats from cybercriminals and state-backed hackers.

This Cryptomining Tool Is Stealing Secrets

By Lily Hay Newman
Plus: Details emerge of a US government social media-scanning tool that flags “derogatory” speech, and researchers find vulnerabilities in the global mobile communications network.

The Destruction of Gaza’s Internet Is Complete

By Matt Burgess
As Israel increases its ground operation in Gaza, the last remaining internet and mobile connections have gone dark.

Okta's Latest Security Breach Is Haunted by the Ghost of Incidents Past

By Lily Hay Newman
A recent breach of authentication giant Okta has impacted nearly 200 of its clients. But repeated incidents and the company’s delayed disclosure have security experts calling foul.

A Powerful Tool US Spies Misused to Stalk Women Faces Its Potential Demise

By Dell Cameron
Though often viewed as the “crown jewel” of the US intelligence community, fresh reports of abuse by NSA employees and chaos in the US Congress put the tool's future in jeopardy.

The 23andMe User Data Leak May Be Far Worse Than Believed

By Andrew Couts
Plus: IT workers secretly funnel money to North Korea, a court in the US upholds keyword search warrants, and WhatsApp gets a passwordless upgrade on Android

Who’s Responsible for the Gaza Hospital Explosion? Here’s Why It’s Hard to Know What’s Real

By David Gilbert
A flood of false information, partisan narratives, and weaponized “fact-checking" has obscured efforts to find out who’s responsible for an explosion at a hospital in Gaza.

The US Congress Was Targeted With Predator Spyware

By Andy Greenberg, Lily Hay Newman
Plus: Hamas raised millions in crypto, Exxon used hacked data, and more.

HTTP/2 Rapid Reset: A New Protocol Vulnerability Will Haunt the Web for Years

By Lily Hay Newman
Dubbed “HTTP/2 Rapid Reset,” the flaw requires issuing patches to virtually every web server around the world before the problem can be eradicated.

New Clues Suggest Stolen FTX Funds Went to Russia-Linked Money Launderers

By Andy Greenberg
Whoever looted FTX on the day of its bankruptcy has now moved the stolen money through a long string of intermediaries—and eventually some that look Russian in origin.

A Graphic Hamas Video Donald Trump Jr. Shared on X Is Actually Real, Research Confirms

By David Gilbert
A video posted by Donald Trump Jr. showing Hamas militants attacking Israelis was falsely flagged in a Community Note as being years old, thus making X's disinformation problem worse, not better.

The UN Risks Normalizing Internet Censorship

By Justin Ling
The United Nations' top internet governance body will allegedly host its next two annual meetings in countries known for repressive internet policies and human rights abuses.

Elon Musk Is Personally Undermining X’s Efforts to Curb Israel-Hamas War Disinformation

By David Gilbert
X’s Trust and Safety team says it’s working to remove false information related to the Israel-Hamas war. Meanwhile, Elon Musk is sharing conspiracies and chatting with QAnon promoters.

Google Makes Passkeys Default, Stepping Up Its Push to Kill Passwords

By Lily Hay Newman
Google is making passkeys, the emerging passwordless login technology, the default option for users as it moves to make passwords “obsolete.”

The Israel-Hamas War Is Drowning X in Disinformation

By David Gilbert
People who have turned to X for breaking news about the Israel-Hamas conflict are being hit with old videos, fake photos, and video game footage at a level researchers have never seen.

Inside FTX’s All-Night Race to Stop a $1 Billion Crypto Heist

By Andy Greenberg
The same chaotic day FTX declared bankruptcy, someone began stealing hundreds of millions of dollars from its coffers. A WIRED investigation reveals the company’s “very crazy night” trying to stop them.

Israel's Failure to Stop the Hamas Attack Shows the Danger of Too Much Surveillance

By Matt Burgess, Lily Hay Newman
Hundreds dead, thousands wounded—Hamas’ surprise attack on Israel shows the limits of even the most advanced and invasive surveillance dragnets as full-scale war erupts.

Apple's Encryption Is Under Attack by a Mysterious Group

By Andrew Couts
Plus: Sony confirms a breach of its networks, US federal agents get caught illegally using phone location data, and more.

23andMe User Data Stolen in Targeted Attack on Ashkenazi Jews

By Lily Hay Newman
At least a million data points from 23andMe accounts appear to have been exposed on BreachForums. While the scale of the campaign is unknown, 23andMe says it's working to verify the data.

How Neuralink Keeps Dead Monkey Photos Secret

By Dell Cameron, Dhruv Mehrotra
Elon Musk’s brain-chip startup conducted years of tests at UC Davis, a public university. A WIRED investigation reveals how Neuralink and the university keep the grisly images of test subjects hidden.

The Biggest Hack of 2023 Keeps Getting Bigger

By Lily Hay Newman, Matt Burgess
Victims of the MOVEit breach continue to come forward. But the full scale of the attack is still unknown.

Predictive Policing Software Terrible at Predicting Crimes

By Aaron Sankin, Surya Mattu
A software company sold a New Jersey police department an algorithm that was right less than 1 percent of the time.

US Justice Department Urged to Investigate Gunshot Detector Purchases

By Dell Cameron, Dhruv Mehrotra
A civil liberties group has asked the DOJ to investigate deployment of the ShotSpotter gunfire-detection system, which research shows is often installed in predominantly Black neighborhoods.

SoundThinking, Maker of ShotSpotter, Is Buying Parts of PredPol Creator Geolitica

By Dhruv Mehrotra, Dell Cameron
SoundThinking is purchasing parts of Geolitica, the company that created PredPol. Experts say the acquisition marks a new era of companies dictating how police operate.

Satellite Images Show the Devastating Cost of Sudan’s Aerial War

By Vittoria Elliott
As civil conflict continues in and above the streets of Khartoum, satellite images from the Conflict Observatory at Yale University have captured the catastrophic damage.

A Tricky New Way to Sneak Past Repressive Internet Censorship

By Justin Ling
With the number of internet blackouts on the rise, cybersecurity firm eQualitie figured out how to hide censored online news in satellite TV signals.

The Shocking Data on Kia and Hyundai Thefts in the US

By Lily Hay Newman
Plus: MGM hackers hit more than just casinos, Microsoft researchers accidentally leak terabytes of data, and China goes on the PR offensive over cyberespionage.

Chinese Spies Infected Dozens of Networks With Thumb Drive Malware

By Andy Greenberg
Security researchers found USB-based Sogu espionage malware spreading within African operations of European and US firms.

Massive MGM and Caesars Hacks Epitomize a Vicious Ransomware Cycle

By Lily Hay Newman
Cyberattacks on casinos grab attention, but a steady stream of less publicized attacks leave vulnerable victims struggling to recover.

The Twisted Eye in the Sky Over Buenos Aires

By Karen Naundorf
A scandal unfolding in Argentina shows the dangers of implementing facial recognition—even with laws and limits in place.

China-Linked Hackers Breached a Power Grid—Again

By Andy Greenberg
Signs suggest the culprits worked within a notorious Chinese hacker group that may have also hacked Indian electric utilities years earlier.

Mozilla: Your New Car Is a Data Privacy Nightmare

By Dhruv Mehrotra, Andrew Couts
Plus: Apple patches newly discovered flaws exploited by NSO Group spyware, North Korean hackers target security researchers, and more.
❌