<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:media="http://search.yahoo.com/mrss/" version="2.0"><channel><title>Security Latest</title><description>Channel Description</description><link>https://www.wired.com</link><atom:link href="https://www.wired.com/feed/category/security/latest/rss" rel="self" type="application/atom+xml"/><copyright>© Condé Nast 2024</copyright><language>en-US</language><lastBuildDate>Thu, 27 Jun 2024 10:07:13 +0000</lastBuildDate><item><title>War Crime Prosecutions Enter a New Digital Age</title><link>https://www.wired.com/story/icc-investigation-digital-media/</link><guid isPermaLink="false">659c66fa91b81164ce68462d</guid><pubDate>Wed, 26 Jun 2024 17:35:10 +0000</pubDate><media:content/><description>A custom platform developed by SITU Research aided the International Criminal Court’s prosecution in a war crimes trial for the first time. It could change how justice is enacted on an international scale.</description><category>Security</category><category>Security / National Security</category><category>Security / Security News</category><media:keywords>war, Crime, privacy, politics, surveillance, Social Media</media:keywords><dc:creator>Vittoria Elliott</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Tried and True</dc:subject><media:thumbnail url="https://media.wired.com/photos/65ab1f6fe92022188c27b314/master/pass/011924-security-digital-evidences-war-crimes.jpg" width="2400" height="1350"/></item><item><title>The Julian Assange Saga Is Finally Over</title><link>https://www.wired.com/story/julian-assange-wikileaks-plea-deal/</link><guid isPermaLink="false">667a544e7675e4022f2f9c89</guid><pubDate>Tue, 25 Jun 2024 13:09:29 +0000</pubDate><media:content/><description>WikiLeaks founder Julian Assange has agreed to plead guilty to one count of espionage in US court on Wednesday, ending a years-long legal battle between the US government and a controversial publisher.</description><category>Security</category><category>Security / Cyberattacks and Hacks</category><category>Security / National Security</category><category>Security / Security News</category><media:keywords>Julian Assange, Wikileaks, espionage, Crime, journalism, national security</media:keywords><dc:creator>Dell Cameron</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Free Press</dc:subject><media:thumbnail url="https://media.wired.com/photos/667a891533eac7a710d6e6d9/master/pass/GettyImages-685268786.jpg" width="3000" height="2000"/></item><item><title>The Mystery of AI Gunshot-Detection Accuracy Is Finally Unraveling</title><link>https://www.wired.com/story/ai-gunshot-detection-accuracy-san-jose-nyc/</link><guid isPermaLink="false">6675acb1540ee95c9caa4c70</guid><pubDate>Tue, 25 Jun 2024 11:00:00 +0000</pubDate><media:content/><description>How accurate are gunshot detection systems, really? For years, it's been a secret, but new reports from San Jose and NYC show these systems have operated well below their advertised accuracy rates.</description><category>Security</category><category>Security / Privacy</category><category>Security / Security News</category><media:keywords>privacy, surveillance, Crime, Police, Guns, artificial intelligence</media:keywords><dc:creator>Todd Feathers</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Number Games</dc:subject><media:thumbnail url="https://media.wired.com/photos/6679e7ea5c52e2c5621a7f57/master/pass/The-Mystery-of-AI-Gunshot-Detection-Accuracy-Is-Finally-Unraveling-Security-GettyImages-77738812.jpg" width="2400" height="1600"/></item><item><title>Deepfake Creators Are Revictimizing GirlsDoPorn Sex Trafficking Survivors</title><link>https://www.wired.com/story/girlsdoporn-deepfake-victim-videos/</link><guid isPermaLink="false">667140601ad7cd2ec344cd6f</guid><pubDate>Tue, 25 Jun 2024 10:00:00 +0000</pubDate><media:content/><description>The most notorious deepfake sexual abuse website is hosting altered videos originally published as part of the GirlsDoPorn operation. Experts say this new low is only the beginning.</description><category>Security</category><category>Security / Security News</category><category>Security / Privacy</category><media:keywords>Crime, artificial intelligence, pornography, privacy, Copyright</media:keywords><dc:creator>Matt Burgess</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Face Swap</dc:subject><media:thumbnail url="https://media.wired.com/photos/6679ca898912e8d4dbbc079d/master/pass/062424-security-deepfakes-sex-trafficking-survivors.jpg" width="2400" height="1350"/></item><item><title>Red Tape Is Making Hospital Ransomware Attacks Worse</title><link>https://www.wired.com/story/ransomware-health-care-assurance-letters/</link><guid isPermaLink="false">667141299fc61cce2a9f255d</guid><pubDate>Mon, 24 Jun 2024 09:00:00 +0000</pubDate><media:content/><description>With cyberattacks increasingly targeting health care providers, an arduous bureaucratic process meant to address legal risk is keeping hospitals offline longer, potentially risking lives.</description><category>Security</category><category>Security / Cyberattacks and Hacks</category><category>Security / Security News</category><media:keywords>ransomware, hacking, cybersecurity, malware, vulnerabilities, security, healthcare</media:keywords><dc:creator>Matt Burgess</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Delay Tactics</dc:subject><media:thumbnail url="https://media.wired.com/photos/6675d7eaded390021eedeb6b/master/pass/GettyImages-1307656509-3.jpg" width="2400" height="1467"/></item><item><title>A Catastrophic Hospital Hack Ends in a Leak of 300M Patient Records</title><link>https://www.wired.com/story/hospital-hack-300-million-patient-records-leaked/</link><guid isPermaLink="false">6675c080043fb309f60fa6e2</guid><pubDate>Sat, 22 Jun 2024 10:30:00 +0000</pubDate><media:content/><description>Plus: Alleged Apple source code leaks online, cybercrime group Scattered Spider's alleged kingpin gets arrested, and more.</description><category>Security</category><category>Security / Cyberattacks and Hacks</category><category>Security / National Security</category><category>Security / Privacy</category><category>Security / Security News</category><media:keywords>security roundup, cybersecurity, hacking, security, malware, national security, privacy, apple</media:keywords><dc:creator>Andy Greenberg, Andrew Couts</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Security Roundup</dc:subject><media:thumbnail url="https://media.wired.com/photos/6675daeb3bc551a4200c2a97/master/pass/NHS-Patient-Record-Hack-Security-86527803.jpg" width="2400" height="2400"/></item><item><title>Perplexity Plagiarized Our Story About How Perplexity Is a Bullshit Machine</title><link>https://www.wired.com/story/perplexity-plagiarized-our-story-about-how-perplexity-is-a-bullshit-machine/</link><guid isPermaLink="false">6674299af0e43e01bf535450</guid><pubDate>Fri, 21 Jun 2024 17:22:51 +0000</pubDate><media:content/><description>Experts aren’t unanimous about whether the AI-powered search startup’s practices could expose it to legal claims ranging from infringement to defamation—but some say plaintiffs would have strong cases.</description><category>Security</category><media:keywords>Intellectual Property, Copyright, artificial intelligence</media:keywords><dc:creator>Tim Marchman</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Clone Wars</dc:subject><media:thumbnail url="https://media.wired.com/photos/6674be51bceccd49894c90bc/master/pass/security_perplexity_plagiarize_story.jpg" width="2400" height="1350"/></item><item><title>US Bans Kaspersky Software</title><link>https://www.wired.com/story/us-bans-kaspersky-software/</link><guid isPermaLink="false">66746032cf344959d1a0bf7c</guid><pubDate>Thu, 20 Jun 2024 20:15:00 +0000</pubDate><media:content/><description>Using a Trump-era authority, the US Commerce Department has banned the sale of Kaspersky’s antivirus tools to new customers in the US, citing alleged threats to national security.</description><category>Security</category><category>Security / National Security</category><category>Security / Security News</category><media:keywords>Russia, Ukraine, malware, national security, cybersecurity, Joe Biden</media:keywords><dc:creator>Eric Geller</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Threat Detection</dc:subject><media:thumbnail url="https://media.wired.com/photos/667465d2b3e085616c83f904/master/pass/GettyImages-1152546859.jpg" width="2400" height="1597"/></item><item><title>Perplexity Is a Bullshit Machine</title><link>https://www.wired.com/story/perplexity-is-a-bullshit-machine/</link><guid isPermaLink="false">667087f219f59e8686c1aaf5</guid><pubDate>Wed, 19 Jun 2024 13:00:00 +0000</pubDate><media:content/><description>A WIRED investigation shows that the AI-powered search startup Forbes has accused of stealing its content is surreptitiously scraping—and making things up out of thin air.</description><category>Security</category><media:keywords>Innovation, artificial intelligence, search engines</media:keywords><dc:creator>Dhruv Mehrotra, Tim Marchman</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Machine Learning</dc:subject><media:thumbnail url="https://media.wired.com/photos/6670da2fed41833c92886401/master/pass/business_perplexity_ai_plagiarism.jpg" width="2400" height="1350"/></item><item><title>This Is What Would Happen if China Invaded Taiwan</title><link>https://www.wired.com/story/this-is-what-would-happen-if-china-invaded-taiwan/</link><guid isPermaLink="false">6660d36251e70775068bb36a</guid><pubDate>Wed, 19 Jun 2024 10:00:00 +0000</pubDate><media:content/><description>The new book World on the Brink: How America Can Beat China in the Race for the 21st Century lays out what might actually happen if China were to invade Taiwan in 2028.</description><category>Security</category><category>Security / National Security</category><media:keywords>China, nukes</media:keywords><dc:creator>Dmitri Alperovitch</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Nightmare scenario</dc:subject><media:thumbnail url="https://media.wired.com/photos/66720c1262bd9b6ea9c23ec6/master/pass/Taiwan-Invasion-Excerpt-Security.jpg" width="2400" height="1350"/></item><item><title>Hackers Detail How They Allegedly Stole Ticketmaster Data From Snowflake</title><link>https://www.wired.com/story/epam-snowflake-ticketmaster-breach-shinyhunters/</link><guid isPermaLink="false">666731417718ee8981f0c377</guid><pubDate>Mon, 17 Jun 2024 09:30:00 +0000</pubDate><media:content/><description>A ShinyHunters hacker tells WIRED that they gained access to Ticketmaster’s Snowflake cloud account—and others—by first breaching a third-party contractor.</description><category>Security</category><category>Security / Cyberattacks and Hacks</category><category>Security / Security News</category><media:keywords>cyberattacks, malware, hackers, cybersecurity, security</media:keywords><dc:creator>Kim Zetter</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Weak Point</dc:subject><media:thumbnail url="https://media.wired.com/photos/66674090b476d817dc719ae7/master/pass/Contractor-Hack-Snowflake-Security-1459969681.jpg" width="2400" height="1600"/></item><item><title>Amazon-Powered AI Cameras Used to Detect Emotions of Unwitting UK Train Passengers</title><link>https://www.wired.com/story/amazon-ai-cameras-emotions-uk-train-passengers/</link><guid isPermaLink="false">666ac8f8cfd9d7e61865b0b9</guid><pubDate>Mon, 17 Jun 2024 07:00:00 +0000</pubDate><media:content/><description>CCTV cameras and AI are being combined to monitor crowds, detect bike thefts, and spot trespassers.</description><category>Security</category><category>Security / Privacy</category><media:keywords>artificial intelligence, privacy, machine learning</media:keywords><dc:creator>Matt Burgess</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>trainspotting</dc:subject><media:thumbnail url="https://media.wired.com/photos/666c7ea52083e728578e8233/master/pass/GettyImages-1663545689.jpg" width="2400" height="1501"/></item><item><title>How to Spot a Business Email Compromise Scam</title><link>https://www.wired.com/story/how-to-spot-business-email-compromise-scam/</link><guid isPermaLink="false">666b4a61ea5b2e6f0159974f</guid><pubDate>Sun, 16 Jun 2024 12:00:00 +0000</pubDate><media:content/><description>In this common email scam, a criminal pretending to be your boss or coworker emails you asking for a favor involving money. Here’s what do to when a bad actor lands in your inbox.</description><category>Security</category><category>Security / Security Advice</category><media:keywords>phishing, email, security, how-to</media:keywords><dc:creator>Justin Pot</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Urgent</dc:subject><media:thumbnail url="https://media.wired.com/photos/666cbb59eb9db3a3e95c6533/master/pass/How-to-Spot-a-Business-Email-Compromise-Scam-Security-GettyImages-1287456786.jpg" width="2400" height="1800"/></item><item><title>Let Slip the Robot Dogs of War</title><link>https://www.wired.com/story/let-slip-the-robot-dogs-of-war/</link><guid isPermaLink="false">6668884b61d1f91eb901f5ad</guid><pubDate>Sun, 16 Jun 2024 09:00:00 +0000</pubDate><media:content/><description>The United States and China appear locked in a race to weaponize four-legged robots for military applications.</description><category>Security</category><category>Security / National Security</category><media:keywords>China, drones, artificial intelligence, robots</media:keywords><dc:creator>Jared Keller</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Arf arf</dc:subject><media:thumbnail url="https://media.wired.com/photos/666c751aec1ba26f82849e57/master/pass/Robot-Dogs-Security-6337679.jpg" width="2400" height="1600"/></item><item><title>A Guide to RCS, Why Apple’s Adopting It, and How It Makes Texting Better</title><link>https://www.wired.com/story/guide-to-rcs-why-it-makes-texting-better/</link><guid isPermaLink="false">60faff898eb98ab033ce45ad</guid><pubDate>Sat, 15 Jun 2024 12:30:00 +0000</pubDate><media:content/><description>The messaging standard promises better security and cooler features than plain old SMS. Android has had it for years, but now iPhones are getting it too.</description><category>Security</category><category>Security / Privacy</category><category>Security / Security Advice</category><media:keywords>messaging, phones, encryption, texting, sms</media:keywords><dc:creator>David Nield</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>end to end</dc:subject><media:thumbnail url="https://media.wired.com/photos/610453a57b8c62be3062fe67/master/pass/security-rcs-messaging.jpg" width="1920" height="1080"/></item><item><title>Ukrainian Sailors Are Using Telegram to Avoid Being Tricked Into Smuggling Oil for Russia</title><link>https://www.wired.com/story/shadow-fleet-shipping-russia-ukraine-climate-change/</link><guid isPermaLink="false">666b10546c9ba3df2358ded1</guid><pubDate>Sat, 15 Jun 2024 11:00:00 +0000</pubDate><media:content/><description>Contract seafarers in Ukraine are turning to online whisper networks to keep themselves from being hired into Russia’s sanctions-busting shadow fleet.</description><category>Science</category><category>Science / Environment</category><category>Security</category><media:keywords>Climate Desk, oil, Ukraine, Russia, Iran, China, shipping, climate change</media:keywords><dc:creator>Nathaniel Peutherer</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Murky Waters</dc:subject><media:thumbnail url="https://media.wired.com/photos/666c446fb4978f3d4eb1106b/master/pass/header-ukraine-oil-smuggling.jpg" width="2500" height="1200"/></item><item><title>Ransomware Attacks Are Getting Worse</title><link>https://www.wired.com/story/security-news-this-week-ransomware-attacks-are-getting-worse/</link><guid isPermaLink="false">666c76e8c0a836bd95a865f1</guid><pubDate>Sat, 15 Jun 2024 10:30:00 +0000</pubDate><media:content/><description>Plus: US lawmakers have nothing to say about an Israeli influence campaign aimed at US voters, a former LA Dodgers owner wants to fix the internet, and more.</description><category>Security</category><media:keywords>security roundup, cybersecurity</media:keywords><dc:creator>Dell Cameron</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Security Roundup</dc:subject><media:thumbnail url="https://media.wired.com/photos/666cba1ac17a33038a481cc1/master/pass/Ransomware-Attacks-Are-Getting-Worse-GettyImages-880947624.jpg" width="2400" height="1600"/></item><item><title>Medical-Targeted Ransomware Is Breaking Records After Change Healthcare’s $22M Payout</title><link>https://www.wired.com/story/change-healthcare-22-million-payment-ransomware-spike/</link><guid isPermaLink="false">666752af3ddd88fa0400ce75</guid><pubDate>Wed, 12 Jun 2024 10:30:00 +0000</pubDate><media:content/><description>Cybersecurity firm Recorded Future counted 44 health-care-related incidents in the month after Change Healthcare’s payment came to light—the most it’s ever seen in a single month.</description><category>Security</category><category>Security / Cyberattacks and Hacks</category><category>Security / Security News</category><media:keywords>ransomware, healthcare, cybersecurity, hacking, hacks, malware, vulnerabilities, security</media:keywords><dc:creator>Andy Greenberg</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Cash Cow</dc:subject><media:thumbnail url="https://media.wired.com/photos/6668cdc711ad16a3af80160e/master/pass/Screenshot%202024-06-11%20at%206.20.07%E2%80%AFPM.png" width="1772" height="1174"/></item><item><title>US Leaders Dodge Questions About Israel’s Influence Campaign</title><link>https://www.wired.com/story/israel-us-disinformation-us-lawmakers/</link><guid isPermaLink="false">666090cacac3f2d49fb21c2e</guid><pubDate>Tue, 11 Jun 2024 16:13:26 +0000</pubDate><media:content/><description>Democratic leader Hakeem Jeffries has joined US intelligence officials in ignoring repeated inquiries about Israel’s “malign” efforts to covertly influence US voters.</description><category>Politics</category><category>Politics / Disinformation</category><category>Politics / Politics News</category><category>Security / National Security</category><category>Security / Security News</category><media:keywords>Israel, Israel-Hamas War, politics, National Affairs, disinformation, national security</media:keywords><dc:creator>Dell Cameron</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Stonewalling</dc:subject><media:thumbnail url="https://media.wired.com/photos/6661f2f5c77e78096a5e0b67/master/pass/Israel-Launched-an-%E2%80%98Influence-Op%E2%80%99-Against-the-US%E2%80%94Will-It-Get-the-TikTok-Treatment--Security-GettyImages-2153283356.jpg" width="2400" height="1600"/></item><item><title>Ransomware Is ‘More Brutal’ Than Ever in 2024</title><link>https://www.wired.com/story/state-of-ransomware-2024/</link><guid isPermaLink="false">66630d844415c4fed95db93f</guid><pubDate>Mon, 10 Jun 2024 14:01:49 +0000</pubDate><media:content/><description>As the fight against ransomware slogs on, security experts warn of a potential escalation to “real-world violence.” But recent police crackdowns are successfully disrupting the cybercriminal ecosystem.</description><category>Security</category><category>Security / Cyberattacks and Hacks</category><category>Security / Security News</category><media:keywords>ransomware, Crime, Police, hacking, cybersecurity, security, malware</media:keywords><dc:creator> Jordan Pearson</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Hard to Crack</dc:subject><media:thumbnail url="https://media.wired.com/photos/66632fecdae29dd8b1100f7a/master/pass/The-State-of-Ransomware-Security.jpg" width="2400" height="1600"/></item></channel></rss>