Skip to main content
Menu
SECURITY
POLITICS
THE BIG STORY
BUSINESS
SCIENCE
CULTURE
REVIEWS
Menu
Account
Account
Newsletters
Security
Politics
The Big Story
Business
Science
Culture
Reviews
Chevron
More
Expand
The Big Interview
Magazine
Events
WIRED Insider
WIRED Consulting
Newsletters
Podcasts
Video
Livestreams
Merch
Search
Search
Security News
Record Scratch
An ISP Settled Piracy Lawsuits. Could Users Take the Hit?
By
Jon Brodkin, Ars Technica
Slacking Off
A Slack Bug Exposed Some Users’ Hashed Passwords for 5 Years
By
Lily Hay Newman
Under Pressure
The Microsoft Team Racing to Catch Bugs Before They Happen
By
Lily Hay Newman
Mixed Bag
Bitcoin Fog Case Could Put Cryptocurrency Tracing on Trial
By
Lily Hay Newman
and
Andy Greenberg
Security Roundup
You Pay More When Companies Get Hacked
By
Matt Burgess
Counter Measures
How Tor Is Fighting—and Beating—Russian Censorship
By
Matt Burgess
Security Roundup
The January 6 Secret Service Text Scandal Turns Criminal
By
Lily Hay Newman
Security Roundup
Gun Database Breach Leaks Details on Thousands of Owners
By
Matt Burgess
Security Roundup
The Post-
Roe
Privacy Nightmare Has Arrived
By
Andrew Couts
Exploits
Google Warns of New Spyware Targeting iOS and Android Users
By
Lily Hay Newman
Security Roundup
How China Hacked US Phone Networks
By
Matt Burgess
moderation
Disinfo and Hate Speech Flood TikTok Ahead of Kenya’s Elections
By
Vittoria Elliott
PA55WØRD123
Apple Just Killed the Password—for Real This Time
By
Matt Burgess
Lock and Keyphrase
A Long-Awaited Defense Against Data Leaks May Have Just Arrived
By
Lily Hay Newman
Comebacks
AlphaBay Is Taking Over the Dark Web—Again
By
Andy Greenberg
Cybercrime
The Hacker Gold Rush That's Poised to Eclipse Ransomware
By
Lily Hay Newman
Security Roundup
Google May Owe You a Chunk of $100 Million
By
Andrew Couts
Security Roundup
DuckDuckGo Isn’t as Private as You Think
By
Andy Greenberg
Encrypt Everything
Proton Is Trying to Become Google—Without Your Data
By
Gilad Edelman
Security Roundup
The NSA Swears It Has ‘No Backdoors’ in Next-Gen Encryption
By
Lily Hay Newman
Next Page