Skip to main content
Menu
SECURITY
POLITICS
THE BIG STORY
BUSINESS
SCIENCE
CULTURE
REVIEWS
Menu
Account
Account
Newsletters
Security
Politics
The Big Story
Business
Science
Culture
Reviews
Chevron
More
Expand
The Big Interview
Magazine
Events
WIRED Insider
WIRED Consulting
Newsletters
Podcasts
Video
Livestreams
Merch
Search
Search
Security
Latest
lazarus
North Korean Hackers Stole Nearly $400M in Crypto Last Year
Andy Greenberg
pegasus
NSO Group Spyware Targeted Dozens of Reporters in El Salvador
Lily Hay Newman
Privacy
Apple’s Private Relay Roils Telecoms Around the World
Matt Burgess
Cyber Chase
The FTC Wants Companies to Find Log4j Fast. It Won't Be Easy
Chris Stokel-Walker
iphone
How to Read Your iOS 15 App Privacy Report
Lily Hay Newman
Security Roundup
Norton Put a Cryptominer in Its Antivirus Software
Brian Barrett
regulation
The Future of Tech Is Here. Congress Isn't Ready for It
Lily Hay Newman
mobilecoin
Signal's Cryptocurrency Feature Has Gone Worldwide
Andy Greenberg
zloader
Hackers Are Exploiting a Flaw Microsoft Fixed 9 Years Ago
Lily Hay Newman
Erase All
6 Ways to Delete Yourself From the Internet
Matt Burgess
smoke bomb
How to Send Messages That Automatically Disappear
David Nield
and
Reece Rogers
year in review
The Worst Hacks of 2021
Lily Hay Newman
security roundup
Buckle Up for More Log4j Madness
Lily Hay Newman
spyware
Meta Ousts 7 Surveillance-for-Hire Operations From Its Platforms
Lily Hay Newman
log4shell
The Next Wave of Log4J Attacks Will Be Brutal
Brian Barrett
forcedentry
Google Warns That NSO Hacking Is On Par With Elite Spy Groups
Lily Hay Newman
Artificial intelligence
The Biggest Deepfake Abuse Site Is Growing in Disturbing Ways
Matt Burgess
log4shell
The Log4J Vulnerability Will Haunt the Internet for Years
Lily Hay Newman
Risk Assessment
Privacy Versus Security is a False Choice
Ian Levy
Don't Tap
How to Guard Against Smishing Attacks on Your Phone
David Nield
Next Page