vulnerabilitiesSecurityHacker Steals $610M of Cryptocurrency—and Returns Most of ItSecurityMicrosoft Edge’s ‘Super Duper Secure Mode’ Does What It SaysSecurityMessaging Apps Have an Eavesdropping ProblemSecurityWatch a Hacker Hijack a Hotel Room’s Lights, Fans, and BedsSecurityHospitals Still Use Pneumatic Tubes—and They Can Be HackedSecurityA Controversial Tool Calls Out Vulnerabilities Across the WebSecurityAn Explosive Spyware Report Shows the Limits of iOS SecuritySecurityThe Everyday IT Tools That Can Offer ‘God Mode’ to HackersSecurityAn Office Phone Flaw Can’t Be Fixed by Cisco AloneSecurityMicrosoft Keeps Failing to Patch a Critical Windows BugSecurityThe Unfixed Flaw at the Heart of REvil’s Ransomware SpreeSecurityA New Kind of Ransomware Tsunami Hits Hundreds of CompaniesSecuritySolarWinds Hackers Continue Assault With New Microsoft BreachSecurityHow to Make Sure Your Browser Extensions Are SafeSecurityNFC Flaws Let Researchers Hack ATMs by Waving a PhoneSecurityA Well-Meaning Feature Leaves Millions of Dell PCs VulnerableSecurityA New Tool Wants to Save Open Source from Supply Chain HacksSecurityApple’s M1 Chip Has a Fascinating FlawSecurityA Never-Before-Seen Wiper Malware Is Hitting Israeli TargetsSecurityRansomware’s Dangerous New Trick: Double-Encrypting Your DataSecurityDecades-Old Flaws Affect Almost Every Wi-Fi DeviceSecurityHackers Used ‘Mind-Blowing’ Bug to Dodge macOS SafeguardsSecurityVPN Hacks Are a Slow-Motion DisasterSecurityPalestinian Hackers Tricked Victims to Install iOS SpywareMore Stories