Skip to main content
Menu
SECURITY
POLITICS
THE BIG STORY
BUSINESS
SCIENCE
CULTURE
REVIEWS
Menu
Account
Account
Newsletters
Security
Politics
The Big Story
Business
Science
Culture
Reviews
Chevron
More
Expand
The Big Interview
Magazine
Events
WIRED Insider
WIRED Consulting
Newsletters
Podcasts
Video
Merch
Search
Search
Sign In
Sign In
Dan Goodin, Ars Technica
Dan Goodin is IT Security Editor at Ars Technica.
X
Cyberattacks and Hacks
Why the F5 Hack Created an ‘Imminent Threat’ for Thousands of Networks
Security
A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones
Security
Hackers Are Finding New Ways to Hide Malware in DNS Records
Security
AI Code Hallucinations Increase the Risk of ‘Package Confusion’ Attacks
Security
Microsoft’s Recall AI Tool Is Making an Unwelcome Return
Security
Cybersecurity Professor Mysteriously Disappears as FBI Raids His Homes
Security
A Brand-New Botnet Is Delivering Record-Size DDoS Attacks
Security
A Mysterious Hacking Group Has 2 New Tools to Steal Data From Air-Gapped Machines
Security
Stealthy Malware Has Infected Thousands of Linux Systems for Years
Security
YubiKeys Are a Security Gold Standard—but They Can Be Cloned
Security
‘TunnelVision’ Attack Leaves Nearly All VPNs Vulnerable to Spying
Security
The XZ Backdoor: Everything You Need to Know
Security
A Matrix Update Patches Serious End-to-End Encryption Flaws
Security
TikTok Users Were Vulnerable to a Single-Click Attack
Security
A New Attack Easily Knocked Out a Potential Encryption Algorithm
Security
New ‘Retbleed’ Attack Can Swipe Key Data From Intel and AMD CPUs
Security
A New, Remarkably Sophisticated Malware Is Attacking Routers
Security
Hackers Can Steal Your Tesla by Creating Their Own Personal Keys
Security
‘Tough to Forge’ Digital Driver’s Licenses Are—Yep—Easy to Forge
Security
Your iPhone Is Vulnerable to a Malware Attack Even When It’s Off
More Stories