After years of targeted hacks, epic heists, and run of the mill data breaches you might think that institutions would be getting wise to the importance of strong cybersecurity. But it seems 2018 was not the year. Here’s WIRED’s look back at the … Read More

The 21 scariest data breaches of 2018

Data breaches in 2018 compromised the personal information of millions of people around the world. Some of the biggest victims in 2018 include T-Mobile, Quora, Google, and Orbitz. Facebook dealt with a slew of major breaches and incidents that affected … Read More

As Facebook Raised a Privacy Wall, It Carved an Opening for Tech Giants

“personal data has become the most prized commodity of the digital age, traded on a vast scale by some of the most powerful companies in Silicon Valley and beyond.” Internal documents show that the social network gave Microsoft, Amazon, Spotify … Read More

The Future of Cybersecurity Is the Quantum Random Number Generator

In 1882, a banker in Sacramento, Calif., named Frank Miller developed an absolutely unbreakable encryption method. Nearly 140 years later, cryptographers have yet to come up with something better. Miller had learned about cryptography while serving as a military investigator during the U.S. … Read More

Tomorrow’s Quantum Computers Are Already Threatening Today’s Data

Large-scale quantum computing could be just five years away. It may seem like the plot of a new Terminator movie, but quantum computers from the future are threatening government data today. But before you accuse me of wearing my tinfoil hat … Read More

Hackers find new way of stealing passwords through body heat

Hackers have found a new way to sneak into computers and it’s through our own body heat. Researchers at University of California found a new way of hacking, which is through a person’s own heat left by their fingers. When … Read More

Targeting power grid is too easy, Energy Department says

Energy Secretary Rick Perry warned Monday that the electric grid is easier to attack than ever as he issued a comprehensive cybersecurity strategy. “The frequency, scale and sophistication of cyber threats have increased, and attacks have become easier to launch,” … Read More

Hackers take veterinary office’s phone system hostage

CONCORD, N.H. — Investigators are trying to track down whoever has taken a Concord business’ phone lines hostage. The owner of AVC Emergency Veterinary of Manchester and Concord said she is refusing to give in to the hackers, saying that … Read More

Proposed ENCRYPT Bill to Create National Data Encryption Rules

NEWS ANALYSIS: U.S. Rep. Ted Lieu reintroduces a bill that would prohibit states and localities from creating their own rules about encryption as well as preventing them from banning encryption. Explaining that he’s concerned about a patchwork of diverse and … Read More

Is Quantum Computing Ushering in an Era of No More Secrets?

In one of my favorite movies of all time, a brilliant mathematician creates a device capable of breaking the encryption used for air traffic control, global banking, and other critical applications. His company Setec Astronomy (an anagram for Too Many Secrets) has … Read More