Berserk Bear has had plenty of opportunity to cause serious trouble. So why hasn't it yet?
7
Plus: An Among Us spam attack, China's favorite vulnerabilities, and more of the week's top security news.
3
The message is meant to deter any similar attack against US infrastructure.
6
A secret experiment in 2007 proved that hackers could devastate power grid equipment beyond repair—with a file no bigger than a gif.
4
Researchers found they could stop a Tesla by flashing a few frames of a stop sign for less than half a second on an internet-connected billboard.
4
New clues indicate that APT28 may be behind a mysterious intrusion that US officials disclosed last week.
9
Guests like Anthony Fauci, Lisa Piccirillo, Patrice Peck, and Audrey Tang discussed how to puzzle through seemingly intractable situations.
6
The Kremlin has meddled in so many elections that democracy’s immune system has gotten wise to its threats. Here are lessons other countries can teach us.
Microsoft says the GRU hacking group has attacked hundreds of organizations over the past year, many of them tied to the upcoming election.
Five out of six brands tested by researchers would have allowed hackers to track kids—and in some cases eavesdrop on them.
Facing looming election threats and a ransomware epidemic, the bureau says it has revamped its process for warning hacking victims.
No one in the meatspace is going to the Black Rock Desert this year. So I soared into the sprawling digital reconstruction that is BRCvr.
Elon Musk confirmed Thursday night that a ransomware gang had approached a Gigafactory employee with alleged promises of a big payout.
In the second part of a Get WIRED series, we go inside one man's mission to bring to light one of factory farming's most notorious practices.
A new kit leaves your cryptographic destiny up to 25 cubes in a plastic box.
“Phone spear phishing” attacks have been on the rise since a bitcoin scam took over the social media platform in July.
Moving images bombard our brains and fog our thoughts—but every now and then they expand our minds.
In the first of a two-part Get WIRED podcast series, we look at the radical, virtual-reality-based tactics of animal-rights group Direct Action Everywhere.
A campaign called Operation Skeleton Key has stolen source code, software development kits, chip designs, and more.
By reverse engineering apps intended for cyclists, security researchers found they could cause delays in at least 10 cities from anywhere in the world.
More

Top