FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ ☆ ✇ WIRED

Change Healthcare’s New Ransomware Nightmare Goes From Bad to Worse

By: Eric Geller — April 16th 2024 at 19:09
A cybercriminal gang called RansomHub claims to be selling highly sensitive patient information stolen from Change Healthcare following a ransomware attack by another group in February.
☐ ☆ ✇ WIRED

The US Government Has a Microsoft Problem

By: Eric Geller — April 15th 2024 at 10:30
Microsoft has stumbled through a series of major cybersecurity failures over the past few years. Experts say the US government’s reliance on its systems means the company continues to get a free pass.
☐ ☆ ✇ WIRED

Roku Breach Hits 567,000 Users

By: Andy Greenberg, Andrew Couts — April 13th 2024 at 10:30
Plus: Apple warns iPhone users about spyware attacks, CISA issues an emergency directive about a Microsoft breach, and a ransomware hacker tangles with an unimpressed HR manager named Beth.
☐ ☆ ✇ WIRED

Change Healthcare Faces Another Ransomware Threat—and It Looks Credible

By: Andy Greenberg, Matt Burgess — April 12th 2024 at 18:25
Change Healthcare ransomware hackers already received a $22 million payment. Now a second group is demanding money, and it has sent WIRED samples of what they claim is the company's stolen data.
☐ ☆ ✇ WIRED

Identity Thief Lived as a Different Man for 33 Years

By: Dell Cameron, Andrew Couts — April 6th 2024 at 09:00
Plus: Microsoft scolded for a “cascade” of security failures, AI-generated lawyers send fake legal threats, a data broker quietly lobbies against US privacy legislation, and more.
☐ ☆ ✇ WIRED

A Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask

By: Andy Greenberg — April 4th 2024 at 09:00
As “P4x,” Alejandro Caceres single-handedly disrupted the internet of an entire country. Then he tried to show the US military how it can—and should—adopt his methods.
☐ ☆ ✇ WIRED

The Mystery of ‘Jia Tan,’ the XZ Backdoor Mastermind

By: Andy Greenberg, Matt Burgess — April 3rd 2024 at 13:54
The thwarted XZ Utils supply chain attack was years in the making. Now, clues suggest nation-state hackers were behind the persona that inserted the malicious code.
☐ ☆ ✇ WIRED

The Incognito Mode Myth Has Fully Unraveled

By: Dell Cameron, Andrew Couts — April 1st 2024 at 21:22
To settle a years-long lawsuit, Google has agreed to delete “billions of data records” collected from users of “Incognito mode,” illuminating the pitfalls of relying on Chrome to protect your privacy.
☐ ☆ ✇ WIRED

A Ghost Ship’s Doomed Journey Through the Gate of Tears

By: Matt Burgess — April 1st 2024 at 06:00
Millions lost internet service after three cables in the Red Sea were damaged. Houthi rebels deny targeting the cables, but their missile attack on a cargo ship, left adrift for months, is likely to blame.
☐ ☆ ✇ McAfee Blogs

UPDATED: AT&T Data Leak: What You Need to Know and How to Protect Yourself

By: Jasdev Dhaliwal — July 12th 2024 at 17:00

Update:

AT&T announced a cybersecurity breach on July 12th that exposed call records and text data for a significant portion of its customer base. This includes customers on mobile virtual network operators (MVNOs) that use AT&T’s network, like Cricket, Boost Mobile, and Consumer Cellular.

The compromised data covers a period between May 1, 2022, and October 31, 2022, with a small number of records from January 2, 2023, also affected. According to AT&T, hackers gained access through a third-party cloud platform account, similar to breaches at Ticketmaster and Santander Bank.

What Information Was Exposed?

The stolen data reveals the phone numbers customers communicated with, along with the frequency and total duration of calls/texts for specific periods. However, AT&T assures customers that the content of calls or texts, timestamps, Social Security numbers, dates of birth, or other personal details were not compromised.

What AT&T is Doing

AT&T claims the data isn’t publicly available and has secured the access point used by the hackers. They’re collaborating with law enforcement to apprehend those involved, with one arrest already reported. AT&T will notify affected customers and offer resources to protect their information.

This incident follows a previous leak earlier this year that exposed data of over 70 million AT&T customers, details of that leak can be found below.

AT&T, one of the largest telecom giants, recently acknowledged a significant data leak that has affected millions of its customers. The leaked dataset, which includes personal information such as names, addresses, phone numbers, and Social Security numbers, has raised concerns about privacy and security. In this blog post, we will provide an overview of the situation, explain the steps AT&T is taking to address the issue, and offer guidance on how you can protect yourself.

The Data Leak: AT&T has confirmed that the leaked dataset contains information from over 7.6 million current customers and 65 million former customers. The compromised data may include full names, email addresses, mailing addresses, phone numbers, Social Security numbers, dates of birth, AT&T account numbers, and passcodes. The company has reset the security passcodes of affected active customers.

AT&T’s Response: AT&T is actively reaching out to affected customers via email or letter to inform them about the data that was included in the leak and the measures being taken to address the situation. The company has also initiated a thorough investigation, working with external cybersecurity experts to analyze the incident. So far, there is no evidence of authorized access to AT&T’s systems resulting in data exfiltration.

Protecting Yourself: If you are an AT&T customer, it is crucial to take steps to protect yourself from potential fraud or identity theft. AT&T recommends setting up free fraud alerts with credit bureaus Equifax, Experian, and TransUnion. These alerts can help notify you of any suspicious activity related to your personal information. Additionally, consider implementing the following measures:

  1. Monitor Your Accounts: Regularly review your bank statements, credit card statements, and other financial accounts for any unauthorized transactions.
  2. Change Passwords: Update your passwords for all online accounts, including your AT&T account. Use strong, unique passwords and consider using a password manager to securely store them.
  3. Enable Two-Factor Authentication: Enable two-factor authentication whenever possible to add an extra layer of security to your accounts.
  4. Be Cautious of Phishing Attempts: Stay vigilant against phishing emails, calls, or texts that may try to trick you into revealing sensitive information. Be skeptical of any unsolicited communications and verify the source before sharing any personal data
  5. Enroll in an Identity Monitoring service. McAfee+ can help keep your personal info safe, with early alerts if your data is found on the dark web. We’ll monitor the dark web for your personal info, including email, government IDs, credit card and bank account numbers, and more

McAfee+ automatically monitors your personal data, including your:

✓ Social Security Number / Government ID
✓ Driver’s license number
✓ Passport number
✓ Tax ID
✓ Date of birth
✓ Credit card numbers
✓ Bank account numbers
✓ Usernames
✓ Insurance ID cards
✓ Email addresses
✓ Phone numbers

AT&T’s data leak is a concerning incident that highlights the importance of safeguarding personal information in the digital age. By staying informed, taking proactive measures to protect yourself, and remaining vigilant against potential threats, you can minimize the risk of falling victim to fraud or identity theft. Remember, your privacy and security are paramount, and it’s crucial to stay one step ahead of cybercriminals.

The post UPDATED: AT&T Data Leak: What You Need to Know and How to Protect Yourself appeared first on McAfee Blog.

☐ ☆ ✇ WIRED

Yogurt Heist Reveals a Rampant Form of Online Fraud

By: Andy Greenberg, Andrew Couts — March 30th 2024 at 13:00
Plus: “MFA bombing” attacks target Apple users, Israel deploys face recognition tech on Gazans, AI gets trained to spot tent encampments, and OSINT investigators find fugitive Amond Bundy.
☐ ☆ ✇ WIRED

Jeffrey Epstein’s Island Visitors Exposed by Data Broker

By: Dhruv Mehrotra, Dell Cameron — March 28th 2024 at 11:00
A WIRED investigation uncovered coordinates collected by a controversial data broker that reveal sensitive information about visitors to an island once owned by Epstein, the notorious sex offender.
☐ ☆ ✇ WIRED

‘Malicious Activity’ Hits the University of Cambridge’s Medical School

By: Matt Burgess — March 27th 2024 at 16:36
Multiple university departments linked to the Clinical School Computing Service have been inaccessible for a month. The university has not revealed the nature of the “malicious activity.”
☐ ☆ ✇ WIRED

Judges Block US Extradition of WikiLeaks Founder Julian Assange—for Now

By: Dell Cameron, Matt Burgess — March 26th 2024 at 10:53
A high court in London says the WikiLeaks founder won’t be extradited “immediately” and the US must provide more “assurances” about any extradition.
☐ ☆ ✇ WIRED

Chinese Hackers Charged in Decade-Long Global Spying Rampage

By: Matt Burgess — March 25th 2024 at 18:22
US and UK officials hit Chinese hacking group APT31 with sanctions and criminal charges after they targeted thousands of businesses, politicians, and critics of China.
☐ ☆ ✇ WIRED

Apple Chip Flaw Leaks Secret Encryption Keys

By: Andrew Couts — March 23rd 2024 at 10:00
Plus: The Biden administration warns of nationwide attacks on US water systems, a new Russian wiper malware emerges, and China-linked hackers wage a global attack spree.
☐ ☆ ✇ WIRED

The DOJ Puts Apple's iMessage Encryption in the Antitrust Crosshairs

By: Andy Greenberg, Andrew Couts — March 21st 2024 at 21:59
Privacy and security are an Apple selling point. But the DOJ’s new antitrust lawsuit argues that Apple selectively embraces privacy and security features in ways that hurt competition—and users.
☐ ☆ ✇ WIRED

Automakers Are Telling Your Insurance Company How You Really Drive

By: Dell Cameron, Andrew Couts — March 16th 2024 at 13:00
Plus: The operator of a dark-web cryptocurrency “mixing” service is found guilty, and a US senator reveals that popular safes contain secret backdoors.
☐ ☆ ✇ WIRED

There Are Dark Corners of the Internet. Then There's 764

By: Ali Winston — March 13th 2024 at 12:00
A global network of violent predators is hiding in plain sight, targeting children on major platforms, grooming them, and extorting them to commit horrific acts of abuse.
☐ ☆ ✇ WIRED

Binance’s Top Crypto Crime Investigator Is Being Detained in Nigeria

By: Andy Greenberg — March 12th 2024 at 04:03
Tigran Gambaryan, a former crypto-focused US federal agent, and a second Binance executive, Nadeem Anjarwalla, have been held in Abuja without passports for two weeks.
☐ ☆ ✇ WIRED

Google Is Getting Thousands of Deepfake Porn Complaints

By: Matt Burgess — March 11th 2024 at 07:00
Content creators are using copyright laws to get nonconsensual deepfakes removed from the web. With the complaints covering nearly 30,000 URLs, experts say Google should do more to help.
☐ ☆ ✇ WIRED

Russian Hackers Stole Microsoft Source Code—and the Attack Isn’t Over

By: Dhruv Mehrotra, Andrew Couts — March 9th 2024 at 14:00
Plus: An ex-Google engineer gets arrested for allegedly stealing trade secrets, hackers breach the top US cybersecurity agency, and X’s new feature exposes sensitive user data.
☐ ☆ ✇ WIRED

Meta Abandons Hacking Victims, Draining Law Enforcement Resources, Officials Say

By: Dell Cameron — March 6th 2024 at 15:38
A coalition of 41 state attorneys general says Meta is failing to assist Facebook and Instagram users whose accounts have been hacked—and they want the company to take “immediate action.”
☐ ☆ ✇ WIRED

Hackers Behind the Change Healthcare Ransomware Attack Just Received a $22 Million Payment

By: Andy Greenberg — March 4th 2024 at 17:41
The transaction, visible on Bitcoin's blockchain, suggests the victim of one of the worst ransomware attacks in years may have paid a very large ransom.
☐ ☆ ✇ WIRED

The Privacy Danger Lurking in Push Notifications

By: Andy Greenberg, Andrew Couts, Matt Burgess — March 2nd 2024 at 14:00
Plus: Apple warns about sideloading apps, a court orders NSO group to turn over the code of its Pegasus spyware, and an investigation finds widely available security cams are wildly insecure.
☐ ☆ ✇ McAfee Blogs

Hybrid Workplace Vulnerabilities: 4 Ways to Promote Online Safety

By: Vishnu Varadaraj — March 1st 2024 at 13:20

Over the past year and a half, workers everywhere have gotten used to working from home. They have adopted an entirely new work from home mindset and diverted their weekly commuting hours to other productive and more enjoyable pursuits. As parts of the world return to a “new normal,” another change is on the way: a gradual return to the office. 

The hybrid working model is met with mixed reviews from employees and business security teams alike. For some employees, a clearer separation between work and home is a welcome change. CTV News reports 66% of Canadian respondents to an International Workplace Group poll say they are looking forward to splitting their working hours between the office and home. 

For business security teams who are just catching their breath after the monumental shift to a remote workforce, they are now gearing up for the new online safety challenges posed by the hybrid work model. According to a VMware Canada Threat Report, 86% of security professionals agree that cyberattacks aimed at their organizations have become more sophisticated since the onset of the pandemic. Additionally, 91% of global respondents cite employees working from home as the cause of cyberattacks. Challenges of the hybrid workforce include the constant back-and-forth of company-issued devices, the lack of control over home office setups, and mixing personal and company devices with company and personal business respectively. For example, if you pay your bills or shop online using your work device, it opens several new avenues for a hacker to walk right onto the corporate network. When your guard is down even a little bit when you are off the clock, you could fall victim to e-skimmers, fake login pages, or phishing scams. 

Best Practices for Mitigating Attacks in the Hybrid Workplace 

No matter how advanced your company’s threat detection system, hackers know where vulnerabilities lie and are on the hunt to exploit them. Check out these tips to ensure you are not the weak link in your organization. 

1. Use a VPN

virtual private network (VPN) is a service that scrambles online browsing data, making it impossible for nefarious characters to decipher your activity. This is an excellent way to deter hackers from tracking your movements and picking up sensitive pieces of information. 

VPNs are essential if you are working in a public area, sharing a wireless network with strangers, or using a Wi-Fi connection that is not password protected. Public Wi-Fi networks are notoriously easy pickings for hackers seeking entry into unsuspecting users’ devices. On the days where you are not in the office, make sure your wireless connection is secure. 

2. Lockaway your passwords 

While a VPN is an excellent tool, security measures and your accounts are vulnerable without a strong and private password or passphrase to protect them. The gigantic Colonial Pipeline hack is being blamed on a hacker gaining entry through an unused VPN that was not secured with multifactor authentication. Multifactor authentication is an online safety measure where more than one method of identity verification is needed to access the valuable information that lies within password-protected accounts. 

Consider using a password manager to organize all your passwords and logins. Password managers remember each pairing so you don’t have to, plus most managers are secured with multifactor authentication. A password manager makes it easier to add variety to your passwords and prevents you from ever having to write them down.

3. Secure work-issued devices 

Professionals who travel between their home and an office are likely transporting their devices back and forth, increasing the number of opportunities for devices to be forgotten at either location or in transit. As convenient as it may be, never use your personal device for official business. Even if you pride yourself on sound online safety habits, your company device likely has more defenses ingrained in its hardware than your personal devices. 

With your personal devices, you should carefully vet everything you download. With your work-issued devices, this vetting process is even more important as company information is at stake. The Information and Privacy Commissioner of Ontario states that employees should never download applications to their work devices without permission from the IT team. Apps and programs often have security vulnerabilities that could open a gateway for hackers. 

4. Practice a personal Zero Trust model 

Zero Trust is a security philosophy that is exactly what it sounds like: trust no one. Businesses are employing Zero Trust models to greatly limit who has access to sensitive data sources. Adopt your own personal Zero Trust philosophy concerning your passwords, logins, and device access. This means never sharing passwords or log in details, especially over email, instant messenger, or over a video conference. Hackers commonly eavesdrop on all three mediums. Also, even your most trusted coworker could mishandle your passwords and login details, such as writing them down and leaving them in a public place.  

A key aspect of the Zero Trust model is only granting employees access to platforms that are vital to their job. Sharing your logins with coworkers who may not be authorized for using that platform undermines all the hard work the IT team does to keep tabs on data access. 

Work Intelligently, Diligently, and Securely 

Every time you turn on the nightly news, another ransomware attack has hit another organization, each one bigger than the last. This heightened prevalence is a reflection on the wiliness of hackers, but also the number of security holes every company must plug.  

There are several vulnerable points of entry in every company, and some of those vulnerabilities are heightened by the hybrid work model. Always heed the advice of your company’s IT team, and make sure to do your part to keep your devices and work information secure. 

The post Hybrid Workplace Vulnerabilities: 4 Ways to Promote Online Safety appeared first on McAfee Blog.

☐ ☆ ✇ WIRED

Here Come the AI Worms

By: Matt Burgess — March 1st 2024 at 09:00
Security researchers created an AI worm in a test environment that can automatically spread between generative AI agents—potentially stealing data and sending spam emails along the way.
☐ ☆ ✇ WIRED

The Mysterious Case of the Missing Trump Trial Ransomware Leak

By: Andy Greenberg — February 29th 2024 at 18:24
The notorious LockBit gang promised a Georgia court leak "that could affect the upcoming US election.” It didn't materialize—but the story may not be over yet.
☐ ☆ ✇ WIRED

Russia Attacked Ukraine's Power Grid at Least 66 Times to ‘Freeze It Into Submission’

By: Vittoria Elliott — February 29th 2024 at 13:00
Several of the strikes occurred far from the front lines of the conflict, indicating possible war crimes. Researchers say the attacks likely had devastating impacts on civilians.
☐ ☆ ✇ WIRED

A Pornhub Chatbot Stopped Millions From Searching for Child Abuse Videos

By: Matt Burgess — February 29th 2024 at 08:00
Every time someone in the UK searched for child abuse material on Pornhub, a chatbot appeared and told them how to get help.
☐ ☆ ✇ WIRED

Biden Executive Order Bans Sale of US Data to China, Russia. Good Luck

By: Dell Cameron — February 28th 2024 at 19:23
The White House issued an executive order on Wednesday that aims to prevent the sale of Americans' data to “countries of concern,” including China and Russia. Its effectiveness may vary.
☐ ☆ ✇ WIRED

Dictators Used Sandvine Tech to Censor the Internet. The US Finally Did Something About It

By: Peter Guest — February 28th 2024 at 15:45
Canada-based Sandvine has long sold its web-monitoring tech to authoritarian regimes. This week, the US sanctioned the company, severely limiting its ability to do business with American firms.
☐ ☆ ✇ WIRED

Change Healthcare Ransomware Attack: BlackCat Hackers Quickly Returned After FBI Bust

By: Andy Greenberg — February 27th 2024 at 22:35
Two months ago, the FBI “disrupted” the BlackCat ransomware group. They're already back—and their latest attack is causing delays at pharmacies across the US.
☐ ☆ ✇ WIRED

How a Right-Wing Controversy Could Sabotage US Election Security

By: Eric Geller — February 26th 2024 at 13:00
Republicans who run elections are split over whether to keep working with the Cybersecurity and Infrastructure Security Agency to fight hackers, online falsehoods, and polling-place threats.
☐ ☆ ✇ WIRED

A Mysterious Leak Exposed Chinese Hacking Secrets

By: Matt Burgess — February 24th 2024 at 14:00
Plus: Scammers try to dupe Apple with 5,000 fake iPhones, Avast gets fined for selling browsing data, and researchers figure out how to clone fingerprints from your phone screen.
☐ ☆ ✇ WIRED

Here Are the Secret Locations of ShotSpotter Gunfire Sensors

By: Dhruv Mehrotra, Joey Scott — February 23rd 2024 at 01:18
The locations of microphones used to detect gunshots have been kept hidden from police and the public. A WIRED analysis of leaked coordinates confirms arguments critics have made against the technology.
☐ ☆ ✇ WIRED

Leak Reveals the Unusual Path of ‘Urgent’ Russian Threat Warning

By: Dell Cameron — February 22nd 2024 at 19:57
The US Congress was preparing to vote on a key foreign surveillance program last week. Then a wild Russian threat appeared.
☐ ☆ ✇ WIRED

Apple iOS 17.4: iMessage Gets Post-Quantum Encryption in New Update

By: Matt Burgess — February 21st 2024 at 14:00
Useful quantum computers aren’t a reality—yet. But in one of the biggest deployments of post-quantum encryption so far, Apple is bringing the technology to iMessage.
☐ ☆ ✇ WIRED

Anne Neuberger, a Top White House Cyber Official, Sees the 'Promise and Peril' in AI

By: Garrett M. Graff — February 21st 2024 at 12:00
Anne Neuberger, the Biden administration’s deputy national security adviser for cyber, tells WIRED about emerging cybersecurity threats—and what the US plans to do about them.
☐ ☆ ✇ WIRED

The Danger Lurking Just Below Ukraine's Surface

By: Justin Ling — February 19th 2024 at 07:00
The widespread use of mines has left Ukrainians scrambling to find ways to clear the explosives. New efforts to develop mine-clearing technology may help them push back Russia's invading forces.
☐ ☆ ✇ WIRED

How to Not Get Scammed Out of $50,000

By: Andrew Couts — February 17th 2024 at 14:00
Plus: State-backed hackers test out generative AI, the US takes down a major Russian military botnet, and 100 hospitals in Romania go offline amid a major ransomware attack.
☐ ☆ ✇ WIRED

Leak of Russian ‘Threat’ Part of a Bid to Kill US Surveillance Reform, Sources Say

By: Dell Cameron — February 16th 2024 at 20:30
A surprise disclosure of a national security threat by the House Intelligence chair was part of an effort to block legislation that aimed to limit cops and spies from buying Americans' private data.
☐ ☆ ✇ WIRED

Section 702 Surveillance Fight Pits the White House Opposite Reproductive Rights

By: Dell Cameron, Andrew Couts — February 14th 2024 at 16:05
Prominent advocates for the rights of pregnant people are urging members of Congress to support legislation that would ban warrantless access to sensitive data as the White House fights against it.
☐ ☆ ✇ WIRED

‘AI Girlfriends’ Are a Privacy Nightmare

By: Matt Burgess — February 14th 2024 at 09:00
Romantic chatbots collect huge amounts of data, provide vague information about how they use it, use weak password protections, and aren’t transparent, new research from Mozilla says.
☐ ☆ ✇ WIRED

A Backroom Deal Looms Over Section 702 Surveillance Fight

By: Dell Cameron — February 12th 2024 at 19:15
Top congressional lawmakers are meeting in private to discuss the future of a widely unpopular surveillance program, worrying members devoted to reforming Section 702.
☐ ☆ ✇ WIRED

Satellite Images Point to Indiscriminate Israeli Attacks on Gaza’s Health Care Facilities

By: Vittoria Elliott — February 12th 2024 at 13:34
New research finds that Israel’s attacks on Gaza damaged hospitals and other medical facilities at the same rate as other buildings, potentially in violation of international law.
☐ ☆ ✇ WIRED

How 3 Million ‘Hacked’ Toothbrushes Became a Cyber Urban Legend

By: Andy Greenberg, Dhruv Mehrotra — February 10th 2024 at 14:00
Plus: China’s Volt Typhoon hackers lurked in US systems for years, the Biden administration’s crackdown on spyware vendors ramps up, and a new pro-Beijing disinformation campaign gets exposed.
☐ ☆ ✇ WIRED

London Underground Is Testing Real-Time AI Surveillance Tools to Spot Crime

By: Matt Burgess — February 8th 2024 at 17:55
In a test at one station, Transport for London used a computer vision system to try and detect crime and weapons, people falling on the tracks, and fare dodgers, documents obtained by WIRED show.
☐ ☆ ✇ WIRED

Ransomware Payments Hit a Record $1.1 Billion in 2023

By: Andy Greenberg — February 7th 2024 at 14:00
After a slowdown in payments to ransomware gangs in 2022, last year saw total ransom payouts jump to their highest level yet, according to a new report from crypto-tracing firm Chainalysis.
☐ ☆ ✇ WIRED

WhatsApp Chats Will Soon Work With Other Encrypted Messaging Apps

By: Matt Burgess — February 6th 2024 at 16:53
New EU rules mean WhatsApp and Messenger must be interoperable with other chat apps. Here’s how that will work.
☐ ☆ ✇ WIRED

China’s Hackers Keep Targeting US Water and Electricity Supplies

By: Matt Burgess, Dhruv Mehrotra — February 3rd 2024 at 14:00
Plus: Russia was likely behind widespread GPS outages, Vault 7 leaker was sentenced, police claim to trace Monero cryptocurrency, and more.
☐ ☆ ✇ WIRED

The Mystery of the $400 Million FTX Heist May Have Been Solved

By: Andy Greenberg — February 1st 2024 at 21:48
An indictment against three Americans suggests that at least some of the culprits behind the theft of an FTX crypto fortune may be in custody.
☐ ☆ ✇ WIRED

A Startup Allegedly ‘Hacked the World.’ Then Came the Censorship—and Now the Backlash

By: Andy Greenberg — February 1st 2024 at 17:30
A loose coalition of anti-censorship voices is working to highlight reports of one Indian company’s hacker-for-hire past—and the legal threats aimed at making them disappear.
☐ ☆ ✇ WIRED

YouTube, Discord, and ‘Lord of the Rings’ Led Police to a Teen Accused of a US Swatting Spree

By: Dhruv Mehrotra, Andrew Couts — February 1st 2024 at 01:28
For nearly two years, police have been tracking down the culprit behind a wave of hoax threats. A digital trail took them to the door of a 17-year-old in California.
☐ ☆ ✇ WIRED

Robots Are Fighting Robots in Russia's War in Ukraine

By: Matt Burgess — January 30th 2024 at 12:00
Aerial drones have changed the war in Ukraine. Now, both Russia’s and Ukraine’s militaries are deploying more unmanned ground robots—and the two are colliding.
☐ ☆ ✇ WIRED

US Lawmakers Tell DOJ to Quit Blindly Funding ‘Predictive’ Police Tools

By: Dell Cameron — January 29th 2024 at 16:19
Members of Congress say the DOJ is funding the use of AI tools that further discriminatory policing practices. They're demanding higher standards for federal grants.
☐ ☆ ✇ WIRED

23andMe Failed to Detect Account Intrusions for Months

By: Lily Hay Newman — January 27th 2024 at 14:00
Plus: North Korean hackers get into generative AI, a phone surveillance tool that can monitor billions of devices gets exposed, and ambient light sensors pose a new privacy risk.
☐ ☆ ✇ WIRED

Police Arrest Teen Said to Be Linked to Hundreds of Swatting Attacks

By: Dhruv Mehrotra — January 26th 2024 at 21:07
A California teenager who allegedly used the handle Torswats to carry out a nationwide swatting campaign is being extradited to Florida to face felony charges, WIRED has learned.
☐ ☆ ✇ WIRED

The Pentagon Tried to Hide That It Bought Americans’ Data Without a Warrant

By: Dell Cameron — January 26th 2024 at 19:13
US spy agencies purchased Americans’ phone location data and internet metadata without a warrant but only admitted it after a US senator blocked the appointment of a new NSA director.
☐ ☆ ✇ WIRED

Big-Name Targets Push Midnight Blizzard Hacking Spree Back Into the Limelight

By: Lily Hay Newman — January 25th 2024 at 21:30
Newly disclosed breaches of Microsoft and Hewlett-Packard Enterprise highlight the persistent threat posed by Midnight Blizzard, a notorious Russian cyber-espionage group.
❌