Skip to main content
Menu
SECURITY
POLITICS
THE BIG STORY
BUSINESS
SCIENCE
CULTURE
REVIEWS
Menu
Account
Account
Newsletters
Security
Politics
The Big Story
Business
Science
Culture
Reviews
Chevron
More
Expand
The Big Interview
Magazine
Events
WIRED Insider
WIRED Consulting
Newsletters
Podcasts
Video
Livestreams
Merch
Search
Search
Security News
Info Wars
China Attacks Hong Kong Protesters With Fake Social Posts
By
Louise Matsakis
ios
You Can Jailbreak Your iPhone Again (But Maybe You Shouldn’t)
By
Lily Hay Newman
Car Talk
A Brief History of Vanity License Plates Gone Awry
By
Brian Barrett
security roundup
Facebook Voice Transcripts Were More Invasive Than Amazon's
By
Lily Hay Newman
Book Worm
How Facebook Catches Bugs in Its 100 Million Lines of Code
By
Lily Hay Newman
oops
How a 'NULL' License Plate Landed One Hacker in Ticket Hell
By
Brian Barrett
dejablue
New BlueKeep-Style Bugs Renew the Risk of Windows Worm
By
Andy Greenberg
Crime
TikTok is fuelling India's deadly hate speech epidemic
By
Nilesh Christopher
security roundup
Election Systems Are Even More Vulnerable Than We Thought
By
Louise Matsakis
hack the vote
Hackers Take on Darpa's $10 Million Voting Machine
By
Lily Hay Newman
defcon
Inside the Hidden World of Elevator Phone Phreaking
By
Andy Greenberg
web hacks
How Apple Pay Buttons Can Make Websites Less Safe
By
Lily Hay Newman
ios
Apple Is Sending a Special iPhone to Its Favorite Hackers
By
Andy Greenberg
DefCon
How a 10-Year-Old Desk Phone Bug Came Back From the Dead
By
Lily Hay Newman
bugs
Boeing Code Leak Exposes Security Flaws Deep in a 787's Guts
By
Andy Greenberg
defcon
A Model Hospital Where the Devices Get Hacked—on Purpose
By
Lily Hay Newman
ddos
Cloudflare Ditches 8chan. What Happens Now?
By
Lily Hay Newman
extremism
The Wrong Way to Talk About a Shooter's Manifesto
By
Brian Barrett
security roundup
Apple Contractors Will Stop Listening to Your Siri Recordings
By
Brian Barrett
guardian
An iPhone App That Protects Your Privacy—For Real This Time
By
Lily Hay Newman
Next Page