Skip to main content
Menu
SECURITY
POLITICS
THE BIG STORY
BUSINESS
SCIENCE
CULTURE
REVIEWS
Menu
Account
Account
Newsletters
Security
Politics
The Big Story
Business
Science
Culture
Reviews
Chevron
More
Expand
The Big Interview
Magazine
Events
WIRED Insider
WIRED Consulting
Newsletters
Podcasts
Video
Merch
Search
Search
Sign In
Sign In
Cyberattacks and Hacks
Bad to the Bone
‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections
You Got Picked
How Hackers Extracted the ‘Keys to the Kingdom’ to Clone HID Keycards
Downtime
Computer Crash Reports Are an Untapped Hacker Gold Mine
Nick of Time
Tricky Web Timing Attacks Are Getting Easier to Use—and Abuse
Inside Out
Microsoft’s AI Can Be Turned Into an Automated Phishing Machine
Return to Sender
USPS Text Scammers Duped His Wife, So He Hacked Their Operation
Bad Vibrations
Watch How a Hacker’s Infrared Laser Can Spy on Your Laptop’s Keystrokes
Sub-version
A Flaw in Windows Update Opens the Door to Zombie Exploits
Leveling Up
A New Plan to Break the Cycle of Destructive Critical Infrastructure Hacks
Hamstrung
How Project 2025 Would Put US Elections at Risk
Security Roundup
US Hands Over Russian Cybercriminals in WSJ Reporter Prisoner Swap
Zapped
A $500 Open Source Tool Lets Anyone Hack Computer Chips With Lasers
Grab and Run
How Infostealers Pillaged the World’s Passwords
oops
A North Korean Hacker Tricked a US Security Vendor Into Hiring Him—and Immediately Tried to Hack Them
Lurkers
A Hacker ‘Ghost’ Network Is Quietly Spreading Malware on GitHub
Stone Cold
How Russia-Linked Malware Cut Heat to 600 Ukrainian Buildings in Deep Winter
Security Roundup
The Feds Say These Are the Russian Hackers Who Attacked US Water Utilities
Taking Advantage
Don’t Fall for CrowdStrike Outage Scams
Breaking the Rules
The US Supreme Court Kneecapped US Cyber Strategy
Unhappy Places
Hackers Claim to Have Leaked 1.1 TB of Disney Slack Messages
Next Page