FreshRSS

🔒
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayWIRED

How to Opt Out of Comcast’s Xfinity Storing Your Sensitive Data

By Reece Rogers
One of America’s largest internet providers may collect data about your political beliefs, race, and sexual orientation to serve personalized ads.

The Sad Truth of the FTC's Location Data Privacy Settlement

By Dell Cameron
The FTC forced a data broker to stop selling “sensitive location data.” But most companies can avoid such scrutiny by doing the bare minimum, exposing the lack of protections Americans truly have.

McDonald’s Ice Cream Machine Hackers Say They Found the ‘Smoking Gun’ That Killed Their Startup

By Andy Greenberg
Kytch, the company that tried to fix McDonald’s broken ice cream machines, has unearthed a 3-year-old email it says proves claims of an alleged plot to undermine their business.

The CDC's Gun Violence Research Is in Danger

By Matt Laslo
In a year pocked with fights over US government funding, Republicans are quietly trying to strip the Centers for Disease Control and Prevention of its ability to research gun violence.

A Civil Rights Firestorm Erupts Around a Looming Surveillance Power Grab

By Dell Cameron
Dozens of advocacy groups are pressuring the US Congress to abandon plans to ram through the renewal of a controversial surveillance program that they say poses an “alarming threat to civil rights.”

The GOP Presidential Debate Is Livestreaming on Rumble, Home to White Nationalist Nick Fuentes

By David Gilbert
The third GOP debate is sponsored by the Republican Jewish Coalition and will be livestreamed on a platform favored by one of America’s most notorious white nationalists.

Internet Blackouts in Gaza Are a New Weapon in the Israel-Hamas War

By Matt Burgess, Lily Hay Newman
Israel has said it’s prepared to disrupt internet service in Gaza, signaling a new age of warfare. In the past two weeks, the Palestinian territory has already suffered three communications shutdowns.

SoundThinking, Maker of ShotSpotter, Is Buying Parts of PredPol Creator Geolitica

By Dhruv Mehrotra, Dell Cameron
SoundThinking is purchasing parts of Geolitica, the company that created PredPol. Experts say the acquisition marks a new era of companies dictating how police operate.

US and UK Mount Aggressive Crackdown on Trickbot and Conti Ransomware Gangs

By Lily Hay Newman
Authorities have sanctioned 11 alleged members of the cybercriminal groups, while the US Justice Department unsealed three federal indictments against nine people accused of being members.

How China Demands Tech Firms Reveal Hackable Flaws in Their Products

By Andy Greenberg
Some foreign companies may be complying—potentially offering China’s spies hints for hacking their customers.

GitHub’s Hardcore Plan to Roll Out Two-Factor Authentication (2FA)

By Lily Hay Newman
GitHub has spent two years researching and slowly rolling out its multifactor authentication system. Soon it will be mandatory for all 100 million users—with no opt-out.

The US Is Openly Stockpiling Dirt on All Its Citizens

By Dell Cameron
A newly declassified report from the Office of the Director of National Intelligence reveals that the federal government is buying troves of data about Americans.

The Bold Plan to Create Cyber 311 Hotlines

By Eric Geller
UT-Austin will join a growing movement to launch cybersecurity clinics for cities and small businesses that often fall through the cracks.

A Mysterious Group Has Ties to 15 Years of Ukraine-Russia Hacks

By Lily Hay Newman
Kaspersky researchers have uncovered clues that further illuminate the hackers’ activities, which appear to have begun far earlier than originally believed.

ChatGPT Scams Are Infiltrating Apple's App Store and Google Play

By Lily Hay Newman
An explosion of interest in OpenAI’s sophisticated chatbot means a proliferation of “fleeceware” apps that trick users with sneaky in-app subscriptions.

Doctors Behind Mifepristone Ban Called ‘Christians’ a Top Threat

By Dell Cameron, Dhruv Mehrotra
Leaked documents reveal that the American College of Pediatricians viewed “mainstream medicine” and “nominal Christians” as its opposition.

Leaked Pentagon Documents May Herald a New Era of Revelations

By Lily Hay Newman
The bizarre release of sensitive US government materials soon after their creation signals a potential shift to near-real-time unauthorized disclosures.

Mullvad VPN and Tor Project Create New Privacy-Focused Mullvad Browser

By Lily Hay Newman
Mullvad Browser, a collaboration between the nonprofit and Mullvad VPN, offers an anti-tracking browser designed to be used with a VPN.

How Denmark’s Welfare State Became a Surveillance Nightmare

By Gabriel Geiger
Once praised for its generous social safety net, the country now collects troves of data on welfare claimants.

This Algorithm Could Ruin Your Life

By Matt Burgess, Evaline Schot, Gabriel Geiger
A system used by the Dutch city of Rotterdam ranked people based on their risk of fraud. The results were troubling.

How to Protect Yourself From Twitter’s 2FA Crackdown

By Matt Burgess
Twitter is disabling SMS-based two-factor authentication. Switch to these alternatives to keep your account safe.

The Small but Mighty Danger of Echo Chamber Extremism

By Thor Benson
Research shows that relatively few people exist in perfectly sealed-off media bubbles—but they’re still having an outsize impact on US politics.

Android Phone Makers’ Encryption Keys Stolen and Used in Malware

By Lily Hay Newman
Device manufacturers use “platform certificates” to verify an app’s authenticity, making them particularly dangerous in the wrong hands.

A Peek Inside the FBI's Unprecedented January 6 Geofence Dragnet

By Mark Harris
Google provided investigators with location data for more than 5,000 devices as part of the federal investigation into the attack on the US Capitol.

Twitter’s SMS Two-Factor Authentication Is Melting Down

By Lily Hay Newman
Problems with the important security feature may be some of the first signs that Elon Musk’s social network is fraying at the edges.

Careless Errors in Hundreds of Apps Could Expose Troves of Data

By Lily Hay Newman
Researchers found that mobile applications contain keys that could provide access to both user information and private files from unconnected apps.

Sloppy Software Patches Are a ‘Disturbing Trend’

By Lily Hay Newman
The Zero Day Initiative has found a concerning uptick in security updates that fail to fix vulnerabilities.

Meta Just Happens to Expand Messenger’s End-to-End Encryption

By Lily Hay Newman
The company says an expansion of privacy features in Messenger is unrelated to a high-profile Nebraska abortion case.

A Long-Awaited IoT Reverse Engineering Tool Is Finally Here

By Lily Hay Newman
Ten years after it was first unveiled, the powerful firmware analysis platform Ofrak is now available to anyone.

A Phone Carrier That Doesn’t Track Your Browsing or Location

By Lily Hay Newman
The new Pretty Good Phone Privacy service for Android hides the data linking you to your mobile device.

An ISP Settled Piracy Lawsuits. Could Users Take the Hit?

By Jon Brodkin, Ars Technica
Now that Charter has reached settlements with major record labels, it’s unclear whether the cable provider will pull the plug on users who pirate music.

How Tor Is Fighting—and Beating—Russian Censorship

By Matt Burgess
Russia has been trying to block the anonymous browser since December—with mixed results.

End-to-End Encryption's Central Role in Modern Self-Defense

By Lily Hay Newman
With abortion set to be criminalized in more than half the US, encryption has never been more important for protection—and civil disobedience.

Hackers Can Steal Your Tesla by Creating Their Own Personal Keys

By Dan Goodin, Ars Technica
A researcher found that a recent update lets anyone enroll their own key during the 130-second interval after the car is unlocked with an NFC card.

AlphaBay Is Taking Over the Dark Web—Again

By Andy Greenberg
Five years after it was torn offline, the resurrected dark web marketplace is clawing its way back to the top of the online underworld.

The Race to Hide Your Voice

By Matt Burgess
Voice recognition—and data collection—have boomed in recent years. Researchers are figuring out how to protect your privacy.
❌