A Hacker Is Threatening to Leak Patients’ Therapy Notes

An extortionist has turned a breach of Finland’s Vastaamo mental health services provider into a nightmare for victims. Powered by...

Read More

The Unsinkable Maddie Stone, Google’s Bug-Hunting Badass

The Project Zero reverse engineer shuts down some of the world’s most dangerous exploits—along with antiquated hacker stereotypes. Powered by WPeMatico

Read More

How to Clean Up Your Digital History

There are plenty of reasons to declutter your online traces. Here’s how to tidy up. Powered by WPeMatico

Read More

Did a Security Researcher Guess Trump’s Twitter Password?

Plus: An Among Us spam attack, China’s favorite vulnerabilities, and more of the week’s top security news. Powered by WPeMatico

Read More

How Police Can Crack Locked Phones—and Extract Information

A report finds 50,000 cases where law enforcement agencies turned to outside firms to bypass the encryption on a mobile device. Powered by WPeMatico

Read More

How 30 Lines of Code Blew Up a 27-Ton Generator

A secret experiment in 2007 proved that hackers could devastate power grid equipment beyond repair—with a file no bigger than a gif. Powered by WPeMatico

Read More