Feeds
|
All News
|
Login

Lily Hay Newman


  1. The Billion-Dollar Adult Streaming Industry Is Fueled by Horrific Labor Abuses

  2. Senators Warn the Pentagon: Get a Handle on China’s Telecom Hacking

  3. A New Phone Scanner That Detects Spyware Has Already Found 7 Pegasus Infections

  4. With Threats to Encryption Looming, Signal’s Meredith Whittaker Says ‘We’re Not Changing’

  5. Malicious Ads in Search Results Are Driving New Generations of Scams

  6. The US Is Calling Out Foreign Influence Campaigns Faster Than Ever

  7. ICE Can Already Sidestep Sanctuary City Laws Through Data-Sharing Fusion Centers

  8. Microsoft Warns Foreign Disinformation Is Hitting the US Election From All Directions

  9. Exposed United Nations Database Left Sensitive Information Accessible Online

  10. Notorious Evil Corp Hackers Targeted NATO Allies for Russian Intelligence

  11. The US Could Finally Ban Inane Forced Password Changes

  12. Security News This Week: A Creative Trick Makes ChatGPT Spit Out Bomb-Making Instructions

  13. Apple Intelligence Promises Better AI Privacy. Here’s How It Actually Works

  14. Why It's So Hard to Fully Block X in Brazil

  15. Taylor Swift Concert Terror Plot Was Thwarted by Key CIA Tip

  16. Powerful Spyware Exploits Enable a New String of ‘Watering Hole’ Attacks

  17. Notorious Iranian Hackers Have Been Targeting the Space Industry With a New Backdoor

  18. Telegram CEO Pavel Durov’s Arrest Linked to Sweeping Criminal Investigation

  19. The US Navy Has Run Out of Pants

  20. The US Government Wants You—Yes, You—to Hunt Down Generative AI Flaws

  21. An AWS Configuration Issue Could Expose Thousands of Web Apps

  22. The Slow-Burn Nightmare of the National Public Data Breach

  23. Nearly All Google Pixel Phones Exposed by Unpatched Flaw in Hidden Android App

  24. Apple Prototypes and Corporate Secrets Are for Sale Online—If You Know Where to Look

  25. Google Researchers Found Nearly a Dozen Flaws in Popular Qualcomm Software for Mobile GPUs

  26. Flaws in Ubiquitous ATM Software Could Have Let Attackers Take Over Cash Machines

  27. Computer Crash Reports Are an Untapped Hacker Gold Mine

  28. Tricky Web Timing Attacks Are Getting Easier to Use—and Abuse

  29. A Flaw in Windows Update Opens the Door to Zombie Exploits

  30. A New Plan to Break the Cycle of Destructive Critical Infrastructure Hacks

  31. Sensitive Illinois Voter Data Exposed by Contractor's Unsecured Databases

  32. Don't Fall for CrowdStrike Outage Scams

  33. Hackers Claim to Have Leaked 1.1 TB of Disney Slack Messages

  34. The Sweeping Danger of the AT&T Phone Records Breach

  35. Google Is Adding Passkey Support for Its Most Vulnerable Users

  36. The Problem the US TikTok Crackdown and Kaspersky Ban Have in Common

  37. Security News This Week: Google Is Piloting Face Recognition for Office Security

  38. 23andMe Failed to Detect Account Intrusions for Months

  39. Big-Name Targets Push Midnight Blizzard Hacking Spree Back Into the Limelight

  40. US Agencies Urged to Patch Ivanti VPNs That Are Actively Being Hacked

  41. How to Stop Your X Account From Getting Hacked Like the SEC's

  42. What It’s Like to Use Apple’s Lockdown Mode

  43. This Clever New Idea Could Fix AirTag Stalking While Maximizing Privacy

  44. A Major Ransomware Takedown Suffers a Strange Setback

  45. Microsoft’s Digital Crime Unit Goes Deep on How It Disrupts Cybercrime

  46. End-to-End Encrypted Instagram and Messenger Chats: Why It Took Meta 7 Years

  47. The 23andMe Data Breach Keeps Spiraling

  48. Okta Breach Impacted All Customer Support Users—Not 1 Percent

  49. Go on a Psychedelic Journey of the Internet's Growth and Evolution

  50. Inside the Race to Secure the F1 Las Vegas Grand Prix