Google details Coruna, an exploit kit used to hijack iPhones via malicious websites; iVerify suggests it may have been originally built for the US government
A highly sophisticated set of iPhone hijacking techniques has likely infected tens of thousands of phones or more.
The US CBP signs a one-year Clearview AI deal to use facial recognition on 60B+ public images for “tactical targeting” and “strategic counter-network analysis”
US Border Patrol intelligence units will gain access to a face recognition tool built on billions of images scraped from the internet.
The US DHS confirms NEC is the vendor that sold Mobile Fortify, a facial recognition app used by federal immigration agents to identify people, to CBP and ICE
Immigration agents have used Mobile Fortify to scan the faces of countless people in the US—including many citizens.
DHS reveals that NEC is the vendor that sold Mobile Fortify, a facial recognition app used by federal immigration agents to identify people in the field, to CBP
Immigration agents have used Mobile Fortify to scan the faces of countless people in the US—including many citizens.
Documents: a whistleblower details the Boshang scam compound in Laos that defrauded victims of ~$2.2M over 11 weeks and utilized a system of worker debt bondage
A whistleblower trapped inside a “pig butchering” scam compound gave WIRED a vast trove of its internal materials …
Documents: a whistleblower details the Boshang scam compound in Laos that defrauded victims of ~$2.2M over 11 weeks and utilized a system of worker debt bondage
A whistleblower trapped inside a “pig butchering” scam compound gave WIRED a vast trove of its internal materials …
Researchers detail WhisperPair, vulnerabilities in Google's Fast Pair protocol affecting 17 audio device models from 10 brands; Google rolled out updates
Researchers detail WhisperPair, vulnerabilities in Google's Fast Pair protocol affecting 17 audio device models from 10 brands; Google rolled out updates
Flaws in how 17 models of headphones and speakers use Google's one-tap Fast Pair Bluetooth protocol have left devices open to eavesdroppers and stalkers.
Researchers demonstrated a major WhatsApp flaw that exposed 3.5B users' phone numbers, with 57% also showing a profile photo; Meta fixed the enumeration problem
By plugging tens of billions of phone numbers into WhatsApp's contact discovery tool, researchers found “the most extensive exposure …
A former L3Harris executive pleads guilty in a US district court to selling eight zero-day exploits to a Russian broker in exchange for millions of dollars
* “at least eight sensitive and protected cyber-exploit components” illegally sold to “a Russian cyber-tools broker” (for ~$1.3m). Obviously at a huge discount, bc super illegal ...
The US DOJ's rigged-poker-game indictment involved hacking DeckMate, a casino-standard, suitcase-sized, $10K+ card shuffling machine, to reveal players' hands
The rigged-poker-game indictment unveiled on Thursday reads like a Hollywood heist film, featuring NBA stars and famous Mafia crime families.
Q&A with NYC mayoral front-runner Zohran Mamdani on social media, tech leaders, Trump, fame, Apple's and Google's “wrong decision” to remove ICEBlock, and more
Mere months ago, New York's mayoral front-runner was polling right next to “Someone Else.”
How facial recognition software rejects people with facial differences, who number an estimated 100M+ worldwide, blocking them from accessing essential services
An estimated 100 million people live with facial differences. As face recognition tech becomes widespread … Bluesky: @brbarrett , @lhn , @mattburgess1 , and @couts . Forums: r/tec...
Researchers used $800 of off-the-shelf hardware to collect data sent by satellites unencrypted, like T-Mobile users' calls and texts and some US military comms
With just $800 in basic equipment, researchers found a stunning variety of data—including thousands of T-Mobile users' calls …
Apple announces a “major evolution” of the Apple Security Bounty program, doubling its top award to $2M for exploit chains that could be abused for spyware
$2M Top Payout Usman Qureshi / iPhone in Canada : Apple Doubles Security Bounty Rewards to $2 Million Bill Toulas / BleepingComputer : Apple now offers $2 million for zero-click RC...
Apple announces a “major evolution” of the Apple Security Bounty program, doubling its top award to $2M for exploit chains that could be abused for spyware
With the mercenary spyware industry booming, Apple VP Ivan Krstić tells WIRED that the company is also offering bonuses …
US federal contracting records show that US ICE is planning to hire nearly 30 private analysts to monitor social media content for enforcement operation leads
Documents show that ICE plans to hire dozens of contractors to scan X, Facebook, TikTok, and other platforms to target people for deportation.
Atlantic Council: the number of US-based investors in spyware companies nearly tripled in 2024 to 31, compared to just 11 in 2023, topping Israel's 26 investors
A new report warns that the number of US investors in powerful commercial spyware rose sharply in 2024 and names new countries linked to the dangerous technology.
Leaked docs: Chinese network-monitoring provider Geedge Networks has sold Great Firewall-style censorship systems to at least four countries, including Pakistan
Zeyi Yang / Wired :
Amnesty: Pakistan is spying on millions via phone tapping and a Chinese-built internet firewall, in one of the broadest surveillance programs outside China
Pakistan is spying on millions of its citizens using a phone-tapping system and a Chinese-built internet firewall that censors social media …