malwareSecurityThe Next Wave of Log4J Attacks Will Be BrutalBy Brian BarrettSecurityGoogle Warns That NSO Hacking Is On Par With Elite Spy GroupsBy Lily Hay NewmanSecurityThe Log4J Vulnerability Will Haunt the Internet for YearsBy Lily Hay NewmanSecurityHow to Guard Against Smishing Attacks on Your PhoneBy David NieldSecurityNSO Group Spyware Hits at Least 9 US State Department PhonesBy Lily Hay NewmanSecurityA Bunch of Malicious Google Play Apps Stole User Banking InfoBy Dan Goodin, Ars TechnicaSecurityWhat Is a Watering Hole Attack?By Lily Hay NewmanSecurityThe Pentagon Has Set Up a UFO OfficeBy Brian Barrett and Lily Hay NewmanSecurityDevious ‘Tardigrade’ Malware Hits Biomanufacturing FacilitiesBy Lily Hay NewmanSecurityHow Hackers Hijacked Thousands of YouTube AccountsBy Lily Hay NewmanSecurityHundreds of Scam Apps Hit Over 10 Million Android DevicesBy Lily Hay NewmanSecurityEven the CIA and NSA Use Ad Blockers to Stay Safe OnlineBy Lily Hay NewmanSecurityRansomware Isn't Back. It Never LeftBy Lily Hay NewmanSecurityIt’s a Good Day to Update All Your Devices. Trust UsBy Brian BarrettSecurityWhy Ransomware Hackers Love a Holiday WeekendBy Brian BarrettSecurityThe Stealthy iPhone Hacks That Apple Still Can't StopBy Lily Hay NewmanSecurityHackers Could Up Medication Doses Through Infusion Pump FlawsBy Lily Hay NewmanSecurityA Controversial Tool Calls Out Vulnerabilities Across the WebBy Andy GreenbergSecurityThe Kaseya Ransomware Nightmare Is Almost OverBy Brian BarrettSecurityAn Explosive Spyware Report Shows the Limits of iOS SecurityBy Lily Hay NewmanSecurityThe Latest Pro-Trump Twitter Clone Leaks User Data on Day 1By Andy GreenbergSecurityThe Unfixed Flaw at the Heart of REvil’s Ransomware SpreeBy Lily Hay NewmanSecurityHow REvil Ransomware Took Out Thousands of Business at OnceBy Lily Hay NewmanSecurityA New Kind of Ransomware Tsunami Hits Hundreds of CompaniesBy Brian BarrettMore Stories