vulnerabilitiesSecurityThe Log4J Vulnerability Will Haunt the Internet for YearsBy Lily Hay NewmanSecurityUS Wins Appeal to Extradite Julian AssangeBy Brian Barrett and Lily Hay NewmanSecurity‘The Internet Is on Fire’By Lily Hay NewmanSecurityA Year After SolarWinds, Supply Chain Threats Still LoomBy Lily Hay NewmanSecurityThe Pentagon Has Set Up a UFO OfficeBy Brian Barrett and Lily Hay NewmanSecurityDevious ‘Tardigrade’ Malware Hits Biomanufacturing FacilitiesBy Lily Hay NewmanSecurityAnother Intel Chip Flaw Puts a Slew of Gadgets at RiskBy Dan Goodin, Ars TechnicaSecurityA Simple Bug Is Leaving AirTag Users Vulnerable to an AttackBy Jim Salter, Ars TechnicaSecurityIt’s a Good Day to Update All Your Devices. Trust UsBy Brian BarrettSecurityHackers Could Up Medication Doses Through Infusion Pump FlawsBy Lily Hay NewmanSecurity NewsMillions of Web Camera and Baby Monitor Feeds Are ExposedBy Lily Hay NewmanSecurityHacker Steals $610M of Cryptocurrency—and Returns Most of ItBy Brian BarrettSecurityMicrosoft Edge’s ‘Super Duper Secure Mode’ Does What It SaysBy Brian BarrettSecurityMessaging Apps Have an Eavesdropping ProblemBy Lily Hay NewmanSecurityWatch a Hacker Hijack a Hotel Room’s Lights, Fans, and BedsBy Andy GreenbergSecurityHospitals Still Use Pneumatic Tubes—and They Can Be HackedBy Lily Hay NewmanSecurityA Controversial Tool Calls Out Vulnerabilities Across the WebBy Andy GreenbergSecurityAn Explosive Spyware Report Shows the Limits of iOS SecurityBy Lily Hay NewmanSecurityThe Everyday IT Tools That Can Offer ‘God Mode’ to HackersBy Andy GreenbergSecurityAn Office Phone Flaw Can’t Be Fixed by Cisco AloneBy Lily Hay NewmanSecurityMicrosoft Keeps Failing to Patch a Critical Windows BugBy Dan Goodin, Ars TechnicaSecurityThe Unfixed Flaw at the Heart of REvil’s Ransomware SpreeBy Lily Hay NewmanSecurityA New Kind of Ransomware Tsunami Hits Hundreds of CompaniesBy Brian BarrettSecuritySolarWinds Hackers Continue Assault With New Microsoft BreachBy Dan Goodin, Ars TechnicaMore Stories