Skip to main content
Menu
SECURITY
POLITICS
THE BIG STORY
BUSINESS
SCIENCE
CULTURE
REVIEWS
Menu
Account
Account
Newsletters
Security
Politics
The Big Story
Business
Science
Culture
Reviews
Chevron
More
Expand
The Big Interview
Magazine
Events
WIRED Insider
WIRED Consulting
Newsletters
Podcasts
Video
Livestreams
Merch
Search
Search
Security
Latest
Clearing the Bar
The Low Threshold for Face Recognition in New Delhi
Varsha Bansal
Security Roundup
Janet Jackson’s ‘Rhythm Nation’ Can Crash Old Hard Drives
Lily Hay Newman
Leaky Pipes
iOS Can Stop VPNs From Working as Expected—and Expose Your Data
Kevin Purdy, Ars Technica
Memory Forensics
Spyware Hunters Are Expanding Their Tool Set
Lily Hay Newman
Patriot Games
The Family That Mined the Pentagon's Data for Profit
Mark Harris
Lockdown
The Android 13 Privacy Settings You Should Update Now
Matt Burgess
No Peeking
How to Create a Secure Folder on Your Phone
David Nield
Oh Deere
A New Tractor Jailbreak Rides the Right-to-Repair Wave
Lily Hay Newman
Side Effects
Flaw in the VA Medical Records Platform May Put Patients at Risk
Lily Hay Newman
Security Roundup
The Feds Gear Up for a Privacy Crackdown
Matt Burgess
and
Andrew Couts
All Access
A Single Flaw Broke Every Layer of Security in MacOS
Matt Burgess
Vulnerabilities
Zoom’s Auto-Update Feature Came With Hidden Risks on Mac
Lily Hay Newman
It's Classified
Here’s What Trump’s ‘Nuclear Documents’ Could Be
Garrett M. Graff
Cybercrime
The US Offers a $10M Bounty for Intel on Conti Ransomware Gang
Matt Burgess
Quality Control
Sloppy Software Patches Are a ‘Disturbing Trend’
Lily Hay Newman
Unfollow
This Anti-Tracking Tool Checks If You’re Being Followed
Matt Burgess
Pure Coincidence
Meta Just Happens to Expand Messenger’s End-to-End Encryption
Lily Hay Newman
White Hats
Google's Android Red Team Had a Full Pixel 6 Pwn Before Launch
Lily Hay Newman
DefCon
A Long-Awaited IoT Reverse Engineering Tool Is Finally Here
Lily Hay Newman
Glitchy McFlatface
The Hacking of Starlink Terminals Has Begun
Matt Burgess
Next Page