malwareSecurityHackers Are Exploiting a Flaw Microsoft Fixed 9 Years AgoBy Lily Hay NewmanSecurityBuckle Up for More Log4j MadnessBy Lily Hay NewmanSecurityMeta Ousts 7 Surveillance-for-Hire Operations From Its PlatformsBy Lily Hay NewmanSecurityThe Next Wave of Log4J Attacks Will Be BrutalBy Brian BarrettSecurityGoogle Warns That NSO Hacking Is On Par With Elite Spy GroupsBy Lily Hay NewmanSecurityThe Log4J Vulnerability Will Haunt the Internet for YearsBy Lily Hay NewmanSecurityHow to Guard Against Smishing Attacks on Your PhoneBy David NieldSecurityNSO Group Spyware Hits at Least 9 US State Department PhonesBy Lily Hay NewmanSecurityA Bunch of Malicious Google Play Apps Stole User Banking InfoBy Dan Goodin, Ars TechnicaSecurityWhat Is a Watering Hole Attack?By Lily Hay NewmanSecurityThe Pentagon Has Set Up a UFO OfficeBy Brian Barrett and Lily Hay NewmanSecurityDevious ‘Tardigrade’ Malware Hits Biomanufacturing FacilitiesBy Lily Hay NewmanSecurityHow Hackers Hijacked Thousands of YouTube AccountsBy Lily Hay NewmanSecurityHundreds of Scam Apps Hit Over 10 Million Android DevicesBy Lily Hay NewmanSecurityEven the CIA and NSA Use Ad Blockers to Stay Safe OnlineBy Lily Hay NewmanSecurityRansomware Isn't Back. It Never LeftBy Lily Hay NewmanSecurityIt’s a Good Day to Update All Your Devices. Trust UsBy Brian BarrettSecurityWhy Ransomware Hackers Love a Holiday WeekendBy Brian BarrettSecurityThe Stealthy iPhone Hacks That Apple Still Can't StopBy Lily Hay NewmanSecurityHackers Could Up Medication Doses Through Infusion Pump FlawsBy Lily Hay NewmanSecurityA Controversial Tool Calls Out Vulnerabilities Across the WebBy Andy GreenbergSecurityThe Kaseya Ransomware Nightmare Is Almost OverBy Brian BarrettSecurityAn Explosive Spyware Report Shows the Limits of iOS SecurityBy Lily Hay NewmanSecurityThe Latest Pro-Trump Twitter Clone Leaks User Data on Day 1By Andy GreenbergMore Stories