Skip to main content
Menu
SECURITY
POLITICS
THE BIG STORY
BUSINESS
SCIENCE
CULTURE
REVIEWS
Menu
Account
Account
Newsletters
Security
Politics
The Big Story
Business
Science
Culture
Reviews
Chevron
More
Expand
The Big Interview
Magazine
Events
WIRED Insider
WIRED Consulting
Newsletters
Podcasts
Video
Merch
Search
Search
Sign In
Sign In
Security News
Social Insecurity
The Slow-Burn Nightmare of the National Public Data Breach
Sneak Attack
Nearly All Google Pixel Phones Exposed by Unpatched Flaw in Hidden Android App
Bipartisan Phish
A Single Iranian Hacker Group Targeted Both Presidential Campaigns, Google Says
Open Sesame
Your Gym Locker May Be Hackable
Geared Up
Want to Win a Bike Race? Hack Your Rival’s Wireless Shifters
Hiding Out
Thousands of Corporate Secrets Were Left Exposed. This Guy Found Them All
Quick Work
The Hacker Who Hunts Video Game Speedrunning Cheaters
Buy Now
Apple Prototypes and Corporate Secrets Are for Sale Online—If You Know Where to Look
Graphic Warning
Google Researchers Found Nearly a Dozen Flaws in Popular Qualcomm Software for Mobile GPUs
Make It Rain
ATM Software Flaws Left Piles of Cash for Anyone Who Knew to Look
Bad to the Bone
‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections
You Got Picked
How Hackers Extracted the ‘Keys to the Kingdom’ to Clone HID Keycards
Downtime
Computer Crash Reports Are an Untapped Hacker Gold Mine
Nick of Time
Tricky Web Timing Attacks Are Getting Easier to Use—and Abuse
Inside Out
Microsoft’s AI Can Be Turned Into an Automated Phishing Machine
Return to Sender
USPS Text Scammers Duped His Wife, So He Hacked Their Operation
Bad Vibrations
Watch How a Hacker’s Infrared Laser Can Spy on Your Laptop’s Keystrokes
Overexposed
Inside the Dark World of Doxing for Profit
Sub-version
A Flaw in Windows Update Opens the Door to Zombie Exploits
Leveling Up
A New Plan to Break the Cycle of Destructive Critical Infrastructure Hacks
Next Page