New research shows hundreds of attempts by apparent Iranian state hackers to hijack consumer-grade cameras, timed to missile and drone strikes. Israel, Russia, and Ukraine have also adopted this trick.
A pair of US lawmakers are calling for an investigation into how easily spies can steal information based on devicesβ electromagnetic and acoustic leaksβa spying trick the NSA once codenamed TEMPEST.
A highly sophisticated set of iPhone hijacking techniques has likely infected tens of thousands of phones or more. Clues suggest it was originally built for the US government.
Plus: The cybersecurity community grapples with Epstein files revelations, the US State Department plans an online anti-censorship βportalβ for the world, and more.
A staffer of the Incognito dark web market was secretly controlled by the FBIβand still allegedly approved the sale of fentanyl-tainted pills, including those from a dealer linked to a confirmed death.
Flaws in how 17 models of headphones and speakers use Googleβs one-tap Fast Pair Bluetooth protocol have left devices open to eavesdroppers and stalkers.
Law enforcement has more tools than ever to track your movements and access your communications. Hereβs how to protect your privacy if you plan to protest.