Category: Wired

Did a Chinese University Hacking Competition Target a Real Victim?
18
Sep
2024

Did a Chinese University Hacking Competition Target a Real Victim?

Capture the flag hacking contests at security conferences generally serve two purposes: to help participants develop and demonstrate computer hacking…

The Mystery of Hezbollah’s Deadly Exploding Pagers
17
Sep
2024

The Mystery of Hezbollah’s Deadly Exploding Pagers

This pager runs on two AAA batteries, which, like any battery, could be induced to explode, but likely not with…

Apple’s New Passwords App May Solve Your Login Nightmares
16
Sep
2024

Apple’s New Passwords App May Solve Your Login Nightmares

Apple’s latest iPhone software update, iOS 18, arrives today and includes a new app: Passwords. For the first time, Apple…

Security News This Week: A Creative Trick Makes ChatGPT Spit Out Bomb-Making Instructions
14
Sep
2024

Security News This Week: A Creative Trick Makes ChatGPT Spit Out Bomb-Making Instructions

After Apple’s product launch event this week, WIRED did a deep dive on the company’s new secure server environment, known…

‘Terrorgram’ Charges Show US Has Had Tools to Crack Down on Far-Right Terrorism All Along
13
Sep
2024

‘Terrorgram’ Charges Show US Has Had Tools to Crack Down on Far-Right Terrorism All Along

Allison’s commitment to neo-fascism and white supremacy appears to have run deep—“I won’t quit til I’m dead. my only goal…

Apple Vision Pro’s Eye Tracking Exposed What People Type
12
Sep
2024

Apple Vision Pro’s Eye Tracking Exposed What People Type

The GAZEploit attack consists of two parts, says Zhan, one of the lead researchers. First, the researchers created a way…

Apple Intelligence Promises Better AI Privacy. Here’s How It Actually Works
11
Sep
2024

Apple Intelligence Promises Better AI Privacy. Here’s How It Actually Works

Apple is making every production PCC server build publicly available for inspection so people unaffiliated with Apple can verify that…

What You Need to Know About Grok AI and Your Privacy
09
Sep
2024

What You Need to Know About Grok AI and Your Privacy

But X also makes it clear the onus is on the user to judge the AI’s accuracy. “This is an…

Hackers Threaten to Leak Planned Parenthood Data
07
Sep
2024

Hackers Threaten to Leak Planned Parenthood Data

Even those of you who do everything you can to secure those secrets can find yourself vulnerable—especially if you’re using…

The NSA Has a Podcast—Here's How to Decode It
06
Sep
2024

The NSA Has a Podcast—Here’s How to Decode It

The spy agency that dared not speak its name is now the Joe Rogan of the SIGINT set. And the…

Therapy Sessions Exposed by Mental Health Care Firm’s Unsecured Database
06
Sep
2024

Therapy Sessions Exposed by Mental Health Care Firm’s Unsecured Database

Thousands of people’s highly sensitive health details, including audio and video of therapy sessions, were openly accessible on the internet,…

YubiKeys Are a Security Gold Standard—but They Can Be Cloned
06
Sep
2024

YubiKeys Are a Security Gold Standard—but They Can Be Cloned

The YubiKey 5, the most widely used hardware token for two-factor authentication based on the FIDO standard, contains a cryptographic…