Security News



Buy Now
Apple Prototypes and Corporate Secrets Are for Sale Online—If You Know Where to Look
By Lily Hay Newman

Graphic Warning
Google Researchers Found Nearly a Dozen Flaws in Popular Qualcomm Software for Mobile GPUs
By Lily Hay Newman


Bad to the Bone
‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections
By Andy Greenberg

You Got Picked
How Hackers Extracted the ‘Keys to the Kingdom’ to Clone HID Keycards
By Andy Greenberg





Bad Vibrations
Watch How a Hacker’s Infrared Laser Can Spy on Your Laptop’s Keystrokes
By Andy Greenberg



Leveling Up
A New Plan to Break the Cycle of Destructive Critical Infrastructure Hacks
By Lily Hay Newman


Security Roundup
US Hands Over Russian Cybercriminals in WSJ Reporter Prisoner Swap
By Dhruv Mehrotra and Andrew Couts

Trust Issues
Sensitive Illinois Voter Data Exposed by Contractor’s Unsecured Databases
By Lily Hay Newman

Dirty Jobs
He Was an FBI Informant—and Inspired a Generation of Violent Extremists
By Ali Winston and Jake Hanrahan
