vulnerabilitiesSecurityJanet Jackson’s ‘Rhythm Nation’ Can Crash Old Hard DrivesBy Lily Hay NewmanSecuritySpyware Hunters Are Expanding Their Tool SetBy Lily Hay NewmanSecurityA New Tractor Jailbreak Rides the Right-to-Repair WaveBy Lily Hay NewmanSecurityFlaw in the VA Medical Records Platform May Put Patients at RiskBy Lily Hay NewmanSecurityZoom’s Auto-Update Feature Came With Hidden Risks on MacBy Lily Hay NewmanSecuritySloppy Software Patches Are a ‘Disturbing Trend’By Lily Hay NewmanSecurityGoogle's Android Red Team Had a Full Pixel 6 Pwn Before LaunchBy Lily Hay NewmanSecurityOne of 5G’s Biggest Features Is a Security MinefieldBy Lily Hay NewmanSecurityGitHub Moves to Guard Open Source Against Supply Chain AttacksBy Lily Hay NewmanSecurityThe US Emergency Alert System Has Dangerous FlawsBy Andrew CoutsSecurityApple Just Patched 39 iPhone Security BugsBy Kate O'FlahertySecurityA New Attack Can Unmask Anonymous Users on Any Major BrowserBy Lily Hay NewmanSecurityNew ‘Retbleed’ Attack Can Swipe Key Data From Intel and AMD CPUsBy Dan Goodin, Ars TechnicaSecurityThe Worst Hacks and Breaches of 2022 So FarBy Lily Hay NewmanSecurityYou Need to Update Windows and Chrome Right NowBy Kate O'FlahertySecurityGoogle Warns of New Spyware Targeting iOS and Android UsersBy Lily Hay NewmanSecurityThe Ghost of Internet Explorer Will Haunt the Web for YearsBy Lily Hay NewmanSecurityAn Actively Exploited Microsoft Zero-Day Flaw Still Has No PatchBy Lily Hay NewmanSecurityYou Need to Update iOS, Chrome, Windows, and Zoom ASAPBy Kate O'FlahertySecuritySpyware Vendors Target Android With Zero-Day ExploitsBy Lily Hay NewmanSecurityAMD Gave Google Cloud Rare Access to Its Tech to Hunt Chip FlawsBy Lily Hay NewmanSecurityHow to Use Windows Security to Keep Your PC ProtectedBy David NieldSecurityHackers Are Getting Caught Exploiting New Bugs More Than Ever By Lily Hay NewmanSecurityThe Tricky Aftermath of Source Code LeaksBy Lily Hay NewmanMore Stories