Posts

Showing posts from September, 2025

Google's Latest AI Ransomware Defense Only Goes So Far

Google has launched a new AI-based protection in Drive for desktop that can shut down an attack before it spreads—but its benefits have their limits. from Security Latest https://ift.tt/LUINT9M

How to Use Passkeys With Google Password Manager (2025)

Google can create and manage passkeys from your browser, but the process is more involved than it suggests. from Security Latest https://ift.tt/vg86LUc

How to Use a Password Manager to Share Your Logins After You Die (2025)

Your logins will live on after you pass on. Make sure they end up in the right hands. from Security Latest https://ift.tt/3SyY2v4

Tile Tracking Tags Can Be Exploited by Tech-Savvy Stalkers, Researchers Say

A team of researchers found that, by not encrypting the data broadcast by Tile tags, users could be vulnerable to having their location information exposed to malicious actors. from Security Latest https://ift.tt/psdWMGg

How a Travel YouTuber Captured Nepal’s Revolution for the World

Harry Jackson went into Kathmandu as a tourist. He ended up being one of the main international sources of news on Nepal’s Gen Z protests. from Security Latest https://ift.tt/nhG9oHu

An App Used to Dox Charlie Kirk Critics Doxed Its Own Users Instead

Plus: A ransomeware gang steals data on 8,000 preschoolers, Microsoft blocks Israel’s military from using its cloud for surveillance, call-recording app Neon hits pause over security holes, and more. from Security Latest https://ift.tt/RElXMgV

Inside the Nuclear Bunkers, Mines, and Mountains Being Retrofitted as Data Centers

Companies are going to great lengths to protect the infrastructure that provides the backbone of the world’s digital services—by burying their data deep underground. from Security Latest https://ift.tt/R4T8mxS

Heritage Foundation Uses Bogus Stat to Push a Trans Terrorism Classification

By inflating numbers and narrowing definitions, Heritage promotes a false link between transgender identity and violence in its push for the FBI to create a new terrorism category. from Security Latest https://ift.tt/CAraUpz

‘SIM Farms’ Are a Spam Plague. A Giant One in New York Threatened US Infrastructure, Feds Say

The agency says it found a network of some 300 servers and 100,000 SIM cards—enough to knock out cell service in the NYC area. Experts say it mirrors facilities typically used for cybercrime. from Security Latest https://ift.tt/WeMT4lC

DHS Has Been Collecting US Citizens’ DNA for Years

Newly released data shows Customs and Border Protection funneled the DNA of nearly 2,000 US citizens—some as young as 14—into an FBI crime database, raising alarms about oversight and legality. from Security Latest https://ift.tt/5TcC3kH

How to Use 1Password's Travel Mode at the Border (2025)

Travel Mode not only hides your most sensitive data—it acts as if that data never existed in the first place. from Security Latest https://ift.tt/moD7Nxy

A Cyberattack on Jaguar Land Rover Is Causing a Supply Chain Disaster

The UK-based automaker has been forced to stop vehicle production as a result of the attack—costing JLR tens of millions of dollars and forcing its parts suppliers to lay off workers. from Security Latest https://ift.tt/Oi2EwN6

Security News This Week: A Dangerous Worm Is Eating Its Way Through Software Packages

Plus: An investigation reveals how US tech companies reportedly helped build China's sweeping surveillance state, and two more alleged members of the Scattered Spider hacking group were arrested. from Security Latest https://ift.tt/xMClYvJ

These Are the 15 New York Officials ICE and NYPD Arrested in Manhattan

More than a dozen elected officials were arrested in or around 26 Federal Plaza in New York City, where ICE detains people in what courts have ruled are unsanitary conditions. from Security Latest https://ift.tt/m938ydW

This Microsoft Entra ID Vulnerability Could Have Been Catastrophic

A pair of flaws in Microsoft's Entra ID identity and access management system could have allowed an attacker to gain access to virtually all Azure customer accounts. from Security Latest https://ift.tt/za8DuCo

Cybercriminals Have a Weird New Way to Target You With Scam Texts

Scammers are now using “SMS blasters” to send out up to 100,000 texts per hour to phones that are tricked into thinking the devices are cell towers. Your wireless carrier is powerless to stop them. from Security Latest https://ift.tt/VdFC1Pz

A DHS Data Hub Exposed Sensitive Intel to Thousands of Unauthorized Users

A misconfigured platform used by the Department of Homeland Security left national security information—including some related to the surveillance of Americans—accessible to thousands of people. from Security Latest https://ift.tt/QAcMfEt

How to Set Up and Use a Burner Phone

Obtaining and using a true burner phone is hard—but not impossible. Here are the steps you need to take to protect your mobile communications based on the risks you face. from Security Latest https://ift.tt/1pvS4KJ

5 Best VPN Services (2025), Tested and Reviewed

Every VPN says it’s the best, but only some of them are telling the truth. from Security Latest https://ift.tt/F3TK90m

Russia Tests Hypersonic Missile at NATO’s Doorstep—and Shares the Video

Russian military exercises near NATO borders follow the recent incursion of Russian drones into the airspace of Poland and Romania, further stoking tensions with the West. from Security Latest https://ift.tt/lSab73G

Security News This Week: Jeffrey Epstein’s Yahoo Inbox Revealed

Plus: ICE deploys secretive phone surveillance tech, officials warn of Chinese surveillance tools in US highway infrastructure, and more. from Security Latest https://ift.tt/Z0AOfok

Charlie Kirk Shooting Suspect Identified as 22-Year-Old Utah Man

Authorities have named Tyler Robinson as a suspect in the murder of right-wing influencer Charlie Kirk, citing Discord messages as evidence of his alleged role. from Security Latest https://ift.tt/croVUkI

How China’s Propaganda and Surveillance Systems Really Operate

A series of corporate leaks show that Chinese technology companies function far more like their Western peers than one might imagine. from Security Latest https://ift.tt/gterApM

Apple’s Big Bet to Eliminate the iPhone’s Most Targeted Vulnerabilities

Alongside new iPhones, Apple released a new security architecture on Tuesday: Memory Integrity Enforcement aims to eliminate the most frequently exploited class of iOS bugs. from Security Latest https://ift.tt/NBypC9v

Here's What to Know About Poland Shooting Down Russian Drones

On Wednesday morning, Poland shot down several Russian drones that entered its airspace—a first since Moscow's invasion of Ukraine. The incident disrupted air travel and set the region on edge. from Security Latest https://ift.tt/gievBUk

US Investment in Spyware Is Skyrocketing

A new report warns that the number of US investors in powerful commercial spyware rose sharply in 2024 and names new countries linked to the dangerous technology. from Security Latest https://ift.tt/x7gNlYG

Cindy Cohn Is Leaving the EFF, but Not the Fight for Digital Rights

After 25 years at the Electronic Frontier Foundation, Cindy Cohn is stepping down as executive director. In a WIRED interview, she reflects on encryption, AI, and why she’s not ready to quit the battle. from Security Latest https://ift.tt/3bJS42O

A New Platform Is Launching to Protect Public Servants From an Angry Mob

From data-removal services to threat monitoring, the Public Service Alliance says its new marketplace will help public servants defend themselves in an era of data brokers and political violence. from Security Latest https://ift.tt/tjLhs8k

Massive Leak Shows How a Chinese Company Is Exporting the Great Firewall to the World

Geedge Networks, a company with ties to the founder of China’s mass censorship infrastructure, is selling its censorship and surveillance systems to at least four other countries in Asia and Africa. from Security Latest https://ift.tt/26Ftes5

ICE Has Spyware Now

Plus: An AI chatbot system is linked to a widespread hack, details emerge of a US plan to plant a spy device in North Korea, your job’s security training isn’t working, and more. from Security Latest https://ift.tt/EIFmufS

Defense Department Scrambles to Pretend It’s Called the War Department

President Donald Trump said the so-called Department of War branding is to counter the “woke” Department of Defense name. from Security Latest https://ift.tt/7ndCI29

7 Best Password Managers (2025), Tested and Reviewed

Keep your logins locked down with our favorite password management apps for PC, Mac, Android, iPhone, and web browsers. from Security Latest https://ift.tt/rwNoxut

US Congressman’s Brother Lands No-Bid Contract to Train DHS Snipers

DHS says retired Marine sniper Dan LaLota’s firm is uniquely qualified to meet the government’s needs. LaLota tells WIRED his brother, GOP congressman Nick LaLota, played no role in the contract. from Security Latest https://ift.tt/oQhTAGw

Automated Sextortion Spyware Takes Webcam Pics of Victims Watching Porn

A new specimen of “infostealer” malware offers a disturbing feature: It monitors a target's browser for NSFW content, then takes simultaneous screenshots and webcam photos of the victim. from Security Latest https://ift.tt/O8lkfmU

What Is a Passkey? Here’s How to Set Up and Use Them (2025)

Passkeys were built to enable a password-free future. Here's what they are and how you can start using them. from Security Latest https://ift.tt/oibp0ed

No, Trump Can’t Legally Federalize US Elections

The United States Constitution is clear: President Donald Trump can’t take control of the country’s elections. But he can sow confusion and fear. from Security Latest https://ift.tt/36qsBr7

China Is About to Show Off Its New High-Tech Weapons to the World

On September 3, China will hold a “Victory Day” military parade in Tiananmen Square to celebrate the 80th anniversary of its victory over Japan—and to send the West a message. from Security Latest https://ift.tt/Q0XGmac