Hacking
Sign In
Subscribe
business
culture
gear
ideas
science
security
transportation
photo
video
backchannel
Search
business
culture
gear
ideas
science
security
transportation
photo
video
backchannel
Sign In
Photo
Video
Backchannel
Artificial Intelligence
Magazine
Wired Insider
Coupons
Get Our Newsletter
WIRED’s biggest stories delivered to your inbox.
submit
This site is protected by reCAPTCHA and the Google
Privacy Policy
and
Terms of Service
apply.
Top Stories
defcon
Hackers Can Turn Speakers Into Acoustic Cyberweapons
Author: Lily Hay Newman
Lily Hay Newman
defcon
Watch a Drone Take Over a Nearby Smart TV
Author: Andy Greenberg
Andy Greenberg
cell networks
Hackers Could Decrypt Your GSM Phone Calls
Author: Lily Hay Newman
Lily Hay Newman
soft cell
Hackers, Likely Chinese, Targeted 10 Telcos to Grab Metadata
Author: Andy Greenberg
Andy Greenberg
mycar
A Remote-Start App Exposed Thousands of Cars to Hackers
Author: Andy Greenberg
Andy Greenberg
youth
Teen Hacker Finds Bugs in School Software Affecting Millions
Author: Andy Greenberg
Andy Greenberg
Most Recent
LOL
Today's Cartoon: August 19, 2019
Author: WIRED Cartoons
WIRED Cartoons
Opinion
Alt-Meat Trounces Animal Meat's Massive Inefficiencies
Author: Liz Specht
Liz Specht
Roundup
Uber’s Big Loss, Boeing’s 787 Trouble, and More Car News
Author: Aarian Marshall
Aarian Marshall
Colossus
To Power AI, This Startup Built a
Really, Really
Big Chip
Author: Tom Simonite
Tom Simonite
Food
A Fungus Could Wipe Out the Banana Forever
Author: Matt Reynolds, WIRED UK
Matt Reynolds, WIRED UK
Read More
imessage
Hackers Can Break Into an iPhone Just by Sending a Text
Author: Lily Hay Newman
Lily Hay Newman
rsa
13-Year-Old Encryption Bugs Still Haunt Apps and IoT
Author: Lily Hay Newman
Lily Hay Newman
defcon
A Model Hospital Where the Devices Get Hacked—on Purpose
Author: Lily Hay Newman
Lily Hay Newman
standards
5G Is Here—and Still Vulnerable to Stingray Surveillance
Author: Lily Hay Newman
Lily Hay Newman
trinity
Trump's Cyber Czar Is Back—and Wants to Make Hackers Suffer
Author: Andy Greenberg
Andy Greenberg
malware
Why Microsoft’s BlueKeep Bug Hasn’t Wreaked Havoc—Yet
Author: Andy Greenberg
Andy Greenberg
security roundup
Palantir Manual Shows How Law Enforcement Tracks Suspects
Author: Emily Dreyfuss
Emily Dreyfuss
An Apple Watch bug, a hackable hair straightener, and more security news this week.
Load More Results