vulnerabilities
Safari Flaws Exposed Webcams, Online Accounts, and More
Apple awarded a $100,500 bug bounty to the researcher who discovered the latest major vulnerability in its browser.
By Lily Hay Newman
A Bug in iOS 15 Is Leaking User Browsing Activity in Real Time
Apple has known about the vulnerability, which also affects iPadOS 15 and Safari 15, since late November.
By Dan Goodin, Ars Technica
‘Zero-Click’ Zoom Vulnerabilities Could Have Exposed Calls
The flaws are now fixed, but they speak to the growing concerns around interactionless attacks.
By Lily Hay Newman
The FTC Wants Companies to Find Log4j Fast. It Won't Be Easy
The critical vulnerability is buried among endless open source code, and many cyber experts are stumped.
By Chris Stokel-Walker
Hackers Are Exploiting a Flaw Microsoft Fixed 9 Years Ago
Unless you go out of your way to install the patch, your system could be exposed.
By Lily Hay Newman
Buckle Up for More Log4j Madness
Plus: An alleged spy, a ransomware arrest, and more of the week's top security news.
By Lily Hay Newman
The Next Wave of Log4J Attacks Will Be Brutal
So far, Log4Shell has resulted mostly in cryptomining and a little espionage. The really bad stuff is just around the corner.
By Brian Barrett
Google Warns That NSO Hacking Is On Par With Elite Spy Groups
ForcedEntry is “one of the most technically sophisticated exploits” Project Zero security researchers have ever seen.
By Lily Hay Newman
The Log4J Vulnerability Will Haunt the Internet for Years
Hundreds of millions of devices are likely affected.
By Lily Hay Newman
US Wins Appeal to Extradite Julian Assange
Plus: Bluetooth security, a Brazil hack, and more of the week's top security news.
By Brian Barrett and Lily Hay Newman
‘The Internet Is on Fire’
A vulnerability in the Log4j logging framework has security teams scrambling to put in a fix.
By Lily Hay Newman
A Year After SolarWinds, Supply Chain Threats Still Loom
The Russia-led campaign was a wake-up call to the industry, but there's no one solution to the threat.
By Lily Hay Newman
The Pentagon Has Set Up a UFO Office
Plus: An Apple lawsuit, a GoDaddy breach, and more of the week's top security news.
By Brian Barrett and Lily Hay Newman
Devious ‘Tardigrade’ Malware Hits Biomanufacturing Facilities
The surprisingly sophisticated attack is “actively spreading” throughout the industry.
By Lily Hay Newman
Another Intel Chip Flaw Puts a Slew of Gadgets at Risk
The vulnerability allows an attacker with physical access to the CPU to bypass the security measures protecting some of its most sensitive data.
By Dan Goodin, Ars Technica
You Need a Password Manager. Here Are the Best Ones
Keep your logins locked down with our favorite apps for PC, Mac, Android, iPhone, and web browsers.
By Scott Gilbertson
A Simple Bug Is Leaving AirTag Users Vulnerable to an Attack
Apple has reportedly known about the exploit for months.
By Jim Salter, Ars Technica
It’s a Good Day to Update All Your Devices. Trust Us
iOS, Windows, and Chrome all have zero-day vulnerabilities that hackers are going after. Now that the fixes are here, you need to install them ASAP.
By Brian Barrett
Hackers Could Up Medication Doses Through Infusion Pump Flaws
It would take a determined hacker to break into the vulnerable B. Braun products, but the impact could be devastating.
By Lily Hay Newman
Millions of Web Camera and Baby Monitor Feeds Are Exposed
A vulnerability in the Kalay platform leaves countless IoT devices susceptible to hackers.
By Lily Hay Newman
Hacker Steals $610M of Cryptocurrency—and Returns Most of It
Plus: An Apple lawsuit, a VPN audit, and more of the week's top security news.
By Brian Barrett
Microsoft Edge’s ‘Super Duper Secure Mode’ Does What It Says
Plus: Facebook account hacks, Instagram-ban scammers, and more of the week’s top security news.
By Brian Barrett
Messaging Apps Have an Eavesdropping Problem
Vulnerabilities in Signal, Facebook Messenger, Google Duo, and more all point to a pervasive privacy issue.
By Lily Hay Newman
Watch a Hacker Hijack a Hotel Room’s Lights, Fans, and Beds
It’s not a ghost. It’s a half-dozen vulnerabilities in a digital automation system.
By Andy Greenberg