Skip to main content
Menu
SECURITY
POLITICS
THE BIG STORY
BUSINESS
SCIENCE
CULTURE
REVIEWS
Menu
Account
Account
Newsletters
Security
Politics
The Big Story
Business
Science
Culture
Reviews
Chevron
More
Expand
The Big Interview
Magazine
Events
WIRED Insider
WIRED Consulting
Newsletters
Podcasts
Video
Livestreams
Merch
Search
Search
Security
Latest
youth
Teen Hacker Finds Bugs in School Software Affecting Millions
Andy Greenberg
defcon
Inside the Hidden World of Elevator Phone Phreaking
Andy Greenberg
Chaos Agents
Trump’s Intel Vacancies Put Americans in Danger
Garrett M. Graff
defcon
How Safecrackers Can Unlock an ATM in Minutes
Andy Greenberg
web hacks
How Apple Pay Buttons Can Make Websites Less Safe
Lily Hay Newman
ios
Apple Is Sending a Special iPhone to Its Favorite Hackers
Andy Greenberg
DefCon
How a 10-Year-Old Desk Phone Bug Came Back From the Dead
Lily Hay Newman
dos
Hidden Algorithm Flaws Expose Websites to DoS Attacks
Lily Hay Newman
Hacking
TfL kills the Oyster website as customers are hit by a dumb hack
Matt Burgess
imessage
Hackers Can Break Into an iPhone Just by Sending a Text
Lily Hay Newman
Crime
How AT&T Insiders Were Bribed to 'Unlock' Millions of Phones
Louise Matsakis
bugs
Boeing Code Leak Exposes Security Flaws Deep in a 787's Guts
Andy Greenberg
rsa
13-Year-Old Encryption Bugs Still Haunt Apps and IoT
Lily Hay Newman
Extremism
The Weird, Dark History of 8chan
Timothy McLaughlin
defcon
A Model Hospital Where the Devices Get Hacked—on Purpose
Lily Hay Newman
ddos
Cloudflare Ditches 8chan. What Happens Now?
Lily Hay Newman
extremism
The Wrong Way to Talk About a Shooter's Manifesto
Brian Barrett
Privacy
VyprVPN review: a VPN with streaming prowess and security
K.G. Orphanides
security roundup
Apple Contractors Will Stop Listening to Your Siri Recordings
Brian Barrett
standards
5G Is Here—and Still Vulnerable to Stingray Surveillance
Lily Hay Newman
Next Page