The now-patched vulnerability would have let hackers target Microsoft Office using Symbolic Link—a file type that hasn’t been in common use in over 30 years.
Researchers found 18 exploits that take advantage of inconsistencies in the email plumbing most people never think about.
With access to just 50,000 high-wattage smart devices, attackers could make a bundle off of causing minor fluctuations.
NyanSat is an open source ground station that lets you listen in on low-orbit transmissions for about $100 worth of gear.
Every browser has a private mode—but the privacy it offers has a limit.
A SubStack email mess, a Nintendo leak, and more of the week’s top security news.
As ransomware groups turn their attention to bigger game, expect more high-profile targets to fall.
Bitcoin payments and IP addresses led investigators to two of the alleged perpetrators in just over two weeks.
A WIRED investigation found dozens of channels belong to children apparently under 13, and anonymous chat participants sending inappropriate messages their way.
A disinfo operation broke into the content management systems of Eastern European media outlets in a campaign to spread misinformation about NATO.
You’ve seen them before: the UX ploys designed to trick you into spending money, or make it nearly impossible to unsubscribe. Here’s what to look out for.
A ransomware hit and subsequent outage caused problems in the company’s aviation services, including flight planning and mapping.
Make sure that your Dropbox, Google Drive, and Microsoft OneDrive data is protected—while still being easy for you to access.
A combination of technologies helped scientists discover a potentially illegal fishing operation involving more than 900 vessels.
Twitter hack details, a botnet vigilante, and more of the week’s top security news.
A previously unreported Fancy Bear campaign persisted for well over a year—and indicates that the notorious group has broadened its focus.
Abusers can use shared accounts to stalk and harass victims, and plans aren’t always easy to escape.
Last year, Apple announced a special device just for hackers. The phone—for approved researchers only—will soon go into circulation.
Twitter’s new policy won’t make the conspiracy group disappear. But experts say it could dramatically reduce its ability to spread.
The new hardware-based attack, which has targeted machines across Europe, can yield a stream of cash for the attacker.