Security

Security Roundup
Apple and Google Pull ICE-Tracking Apps, Bowing to DOJ Pressure
Plus: China sentences scam bosses to death, Europe is ramping up its plans to build a “drone wall” to protect against Russian airspace violations, and more.

An App Used to Dox Charlie Kirk Critics Doxed Its Own Users Instead
Plus: A ransomeware gang steals data on 8,000 preschoolers, Microsoft blocks Israel’s military from using its cloud for surveillance, call-recording app Neon hits pause over security holes, and more.

A Cyberattack on Jaguar Land Rover Is Causing a Supply Chain Disaster
The UK-based automaker has been forced to stop vehicle production as a result of the attack—costing JLR tens of millions of dollars and forcing its parts suppliers to lay off workers.

A Dangerous Worm Is Eating Its Way Through Software Packages
Plus: An investigation reveals how US tech companies reportedly helped build China’s sweeping surveillance state, and two more alleged members of the Scattered Spider hacking group were arrested.

This Microsoft Entra ID Vulnerability Could Have Been Catastrophic
A pair of flaws in Microsoft's Entra ID identity and access management system could have allowed an attacker to gain access to virtually all Azure customer accounts.

Tile Tracking Tags Can Be Exploited by Tech-Savvy Stalkers, Researchers Say
A team of researchers found that, by not encrypting the data broadcast by Tile tags, users could be vulnerable to having their location information exposed to malicious actors.

DHS Has Been Collecting US Citizens’ DNA for Years
Newly released data shows Customs and Border Protection funneled the DNA of nearly 2,000 US citizens—some as young as 14—into an FBI crime database, raising alarms about oversight and legality.

Worried About Phone Searches? 1Password's Travel Mode Can Clean Up Your Data
Travel Mode not only hides your most sensitive data—it acts as if that data never existed in the first place.

How to Set Up and Use a Burner Phone
Obtaining and using a true burner phone is hard—but not impossible. Here are the steps you need to take to protect your mobile communications based on the risks you face.

How to Use Passkeys With Google Password Manager
Google can create and manage passkeys from your browser, but the process is more involved than it suggests.

How to Use a Password Manager to Share Your Logins After You Die
Your logins will live on after you pass on. Make sure they end up in the right hands.

The Password Managers You Should Use Instead of Your Browser
Keep your logins locked down with our favorite password management apps for PC, Mac, Android, iPhone, and web browsers.

The WIRED Guide to Protecting Yourself From Government Surveillance
Donald Trump has vowed to deport millions and jail his enemies. To carry out that agenda, his administration will exploit America’s digital surveillance machine. Here are some steps you can take to evade it.

How a Travel YouTuber Captured Nepal’s Revolution for the World
Harry Jackson went into Kathmandu as a tourist. He ended up being one of the main international sources of news on Nepal’s Gen Z protests.

‘SIM Farms’ Are a Spam Plague. A Giant One in New York Threatened US Infrastructure, Feds Say
The agency says it found a network of some 300 servers and 100,000 SIM cards—enough to knock out cell service in the NYC area. Experts say it mirrors facilities typically used for cybercrime.

These Are the 15 New York Officials ICE and NYPD Arrested in Manhattan
More than a dozen elected officials were arrested in or around 26 Federal Plaza in New York City, where ICE detains people in what courts have ruled are unsanitary conditions.

Cybercriminals Have a Weird New Way to Target You With Scam Texts
Scammers are now using “SMS blasters” to send out up to 100,000 texts per hour to phones that are tricked into thinking the devices are cell towers. Your wireless carrier is powerless to stop them.