Scamming operations that once originated in Southeast Asia are now proliferating around the world, likely raking in billions of dollars in the process. from Security Latest https://ift.tt/GSuOAqF
Plus: The US Justice Department indicts three Iranians over Trump campaign hack, EU regulators fine Meta $100 million for a password security lapse, and the Tor Project enters a new phase. from Security Latest https://ift.tt/dpDYqiH
A handful of Tesla’s electric pickup trucks are armed and ready for battle in the hands of Chechen forces fighting in Ukraine as part of Russia’s ongoing invasion. Can the EV take the heat? from Security Latest https://ift.tt/rBkuScD
As Israel intensifies its attacks on Lebanon, eerie messages have been arriving on the phones of civilians on both sides of the border, with authorities in each country accusing the other of psychological warfare. from Security Latest https://ift.tt/GgLpMyz
Researchers found a flaw in a Kia web portal that let them track millions of cars, unlock doors, and start engines at will—the latest in a plague of web bugs that’s affected a dozen carmakers. from Security Latest https://ift.tt/UlRkuxp
The US government says outlets like RT work closely with Russian intelligence, and platforms have removed or banned their content. But they’re still influential all around the world. from Security Latest https://ift.tt/OfJ98BF
Plus: The FBI dismantles the largest-ever China-backed botnet, the DOJ charges two men with a $243 million crypto theft, Apple’s MacOS Sequoia breaks cybersecurity tools, and more. from Security Latest https://ift.tt/a4xRpuk
Thousands of beepers and two-way radios exploded in attacks against Hezbollah, but mainstream consumer devices like smartphones aren’t likely to be weaponized the same way. from Security Latest https://ift.tt/4J2fxrg
In a second attack on Hezbollah members, two-way radios detonated around Lebanon on Wednesday, causing injuries and multiple deaths. from Security Latest https://ift.tt/TxS8nkv
Participants in a hacking competition with ties to China’s military were, unusually, required to keep their activities secret, but security researchers say the mystery only gets stranger from there. from Security Latest https://ift.tt/VQWNP2l
At least eight people have been killed and more than 2,700 people have been injured in Lebanon by exploding pagers. Experts say the blasts point toward a supply chain compromise, not a cyberattack. from Security Latest https://ift.tt/jRo5t2x
Musk’s now-deleted post questioning why no one has attempted to assassinate Joe Biden and Kamala Harris renews concerns over his work for the US government—and potential to inspire extremist violence. from Security Latest https://ift.tt/1lfPKdz
Plus: New evidence emerges about who may have helped 9/11 hijackers, UK police arrest a teen in connection with an attack on London’s transit system, and Poland’s spyware scandal enters a new phase. from Security Latest https://ift.tt/BYfKokt
The federal indictment of two alleged members of the Terrorgram Collective, a far-right cell accused of inspiring “lone wolf” attacks, reveals the US is now using a “forgotten” legal strategy. from Security Latest https://ift.tt/5xdojAD
The Vision Pro uses 3D avatars on calls and for streaming. These researchers used eye tracking to work out the passwords and PINs people typed with their avatars. from Security Latest https://ift.tt/sJidAxN
Private Cloud Compute is an entirely new kind of infrastructure that, Apple's Craig Federighi tells WIRED, allows your personal data to be “hermetically sealed inside of a privacy bubble.” from Security Latest https://ift.tt/Yw2loMN
xAI's generative AI tool, Grok AI, is unhinged compared to its competitors. It's also scooping up a ton of data people post on X. Here's how to keep your posts out of Grok—and why you should. from Security Latest https://ift.tt/Z1O8Jhb
Plus: Kaspersky’s US business sold, Nigerian sextortion scammers jailed, and Europe’s controversial encryption plans return. from Security Latest https://ift.tt/bLUnE9c
The spy agency that dared not speak its name is now the Joe Rogan of the SIGINT set. And the pod's actually worth a listen. from Security Latest https://ift.tt/Wbw0PlE
Video and audio of therapy sessions, transcripts, and other patient records were accidentally exposed in a publicly accessible database operated by the virtual medical company Confidant Health. from Security Latest https://ift.tt/SMaJI52
Unit 29155 of Russia’s GRU military intelligence agency—a team responsible for coup attempts, assassinations, and bombings—has branched out into brazen hacking operations with targets across the world. from Security Latest https://ift.tt/MSBo3E2
With 20,000 internet providers across the country, the technical challenges of blocking X in Brazil means some connections are slipping through the cracks. from Security Latest https://ift.tt/5MFztmr
Using special software, WIRED investigated police surveillance at the DNC. We collected signals from nearly 300,000 devices, revealing vulnerabilities for both law enforcement and everyday citizens alike. from Security Latest https://ift.tt/XSAtmbr
Activists claim Japanese industrial robots are being used to build military equipment for Israel. The robot maker denies the claims, but the episode reveals the complex ethics of global manufacturing. from Security Latest https://ift.tt/Vdyvgt3
The Navy is testing out the Elon Musk–owned satellite constellation to provide high-speed internet access to sailors at sea. It’s part of a bigger project that’s about more than just getting online. from Security Latest https://ift.tt/KbQp4Lr