Plus: Apple makes big claims about the effectiveness of its Lockdown Mode anti-spyware feature, Russia moves to implement homegrown encryption for 5G, and more.
The Aisuru, Kimwolf, JackSkid, and Mossad botnets had infected more than 3 million devices in total, many inside home networks, according to the US Justice Department.
A powerful iPhone-hacking technique known as DarkSword has been discovered in use by Russian hackers. It can take over devices running iOS 18 that simply visit infected websites.
Plus: A porn-quitting app exposed the masturbation habits of hundreds of thousands of users, Russian hackers are trying to take over peopleβs Signal accounts, and more.
Amid a paralyzing breach of medical tech firm Stryker, the group has come to represent Iran's use of βhacktivismβ as cover for chaotic, retaliatory state-sponsored cyberattacks.
New research shows hundreds of attempts by apparent Iranian state hackers to hijack consumer-grade cameras, timed to missile and drone strikes. Israel, Russia, and Ukraine have also adopted this trick.
A pair of US lawmakers are calling for an investigation into how easily spies can steal information based on devicesβ electromagnetic and acoustic leaksβa spying trick the NSA once codenamed TEMPEST.
A highly sophisticated set of iPhone hijacking techniques has likely infected tens of thousands of phones or more. Clues suggest it was originally built for the US government.
Plus: The cybersecurity community grapples with Epstein files revelations, the US State Department plans an online anti-censorship βportalβ for the world, and more.
A staffer of the Incognito dark web market was secretly controlled by the FBIβand still allegedly approved the sale of fentanyl-tainted pills, including those from a dealer linked to a confirmed death.
Flaws in how 17 models of headphones and speakers use Googleβs one-tap Fast Pair Bluetooth protocol have left devices open to eavesdroppers and stalkers.
Law enforcement has more tools than ever to track your movements and access your communications. Hereβs how to protect your privacy if you plan to protest.