<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:media="http://search.yahoo.com/mrss/" version="2.0"><channel><title>Security Latest</title><description>Channel Description</description><link>https://www.wired.com</link><atom:link href="https://www.wired.com/feed/category/security/latest/rss" rel="self" type="application/atom+xml"/><copyright>© Condé Nast 2026</copyright><language>en-US</language><lastBuildDate>Sun, 12 Apr 2026 06:54:34 +0000</lastBuildDate><item><title>Your Push Notifications Aren’t Safe From the FBI</title><link>https://www.wired.com/story/security-news-this-week-your-push-notifications-arent-safe-from-the-fbi/</link><guid isPermaLink="false">69d93f27642e9910cead59dd</guid><pubDate>Sat, 11 Apr 2026 10:30:00 +0000</pubDate><media:content/><description>Plus: Iran’s internet blackout hits the 1,000-hour mark, cryptocurrency scams result in a record amount of money stolen from Americans, and more.</description><category>Security</category><category>Security / Cyberattacks and Hacks</category><category>Security / National Security</category><category>Security / Privacy</category><category>Security / Security News</category><media:keywords>security roundup, cybersecurity, hacking, security, Iran, cryptocurrency, Crime, scams, Anthropic, artificial intelligence, Gmail, FBI</media:keywords><dc:creator>Matt Burgess, Maddy Varner, Lily Hay Newman, Dell Cameron</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Security Roundup</dc:subject><media:thumbnail url="https://media.wired.com/photos/69d99028b8bdc021bdac9df6/master/pass/Security-News-This-Week-Your-Push-Notifications-Arent-Safe-From-the-FBI-Security.jpg" width="1232" height="1232"/></item><item><title>How the Internet Broke Everyone’s Bullshit Detectors</title><link>https://www.wired.com/story/how-the-internet-broke-everyones-bullshit-detectors/</link><guid isPermaLink="false">69d8f8b7d65b3dba71484374</guid><pubDate>Sat, 11 Apr 2026 09:30:00 +0000</pubDate><media:content/><description>From AI-generated images to restricted satellite data, the systems used to verify what’s real online are struggling to keep up.</description><category>Security</category><category>Security / Security Advice</category><category>Politics / Disinformation</category><media:keywords>propaganda, artificial intelligence, open source, satellite images, Iran, war, politics</media:keywords><dc:creator>Gia Chaudry</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Smell Tests</dc:subject><media:thumbnail url="https://media.wired.com/clips/69d8f8b670354d7c78851625/master/pass/Fake_lead_1%20(1).mp4" width="2914" height="2000"/></item><item><title>Anthropic’s Mythos Will Force a Cybersecurity Reckoning—Just Not the One You Think</title><link>https://www.wired.com/story/anthropics-mythos-will-force-a-cybersecurity-reckoning-just-not-the-one-you-think/</link><guid isPermaLink="false">69d7d8b2591ef67c6abd904a</guid><pubDate>Fri, 10 Apr 2026 18:08:37 +0000</pubDate><media:content/><description>The new AI model is being heralded—and feared—as a hacker’s superweapon. Experts say its arrival is a wake-up call for developers who have long made security an afterthought.</description><category>Security</category><category>Security / Cyberattacks and Hacks</category><category>Security / National Security</category><category>Security / Privacy</category><category>Security / Security News</category><media:keywords>Anthropic, cybersecurity, artificial intelligence, vulnerabilities, hacking, security, privacy</media:keywords><dc:creator>Lily Hay Newman</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Doom and Gloom</dc:subject><media:thumbnail url="https://media.wired.com/photos/69d81392ce1f65d162ddb2f0/master/pass/Security_Anthropic_Getty.jpg" width="2400" height="2400"/></item><item><title>Politicians Are Spending More Money on Security as They Increasingly Become Targets</title><link>https://www.wired.com/story/political-campaign-security-spending/</link><guid isPermaLink="false">69d3d4f4d114591ebc82e584</guid><pubDate>Thu, 09 Apr 2026 10:00:00 +0000</pubDate><media:content/><description>Political candidates are purchasing more home alarms, bulletproof vests, and other protections amid rising fears of political violence.</description><category>Security</category><category>Security / Cyberattacks and Hacks</category><category>Security / Privacy</category><category>Security / Security News</category><category>Politics / Politics News</category><media:keywords>elections, politics, Policy, National Affairs, Crime, cybersecurity, security</media:keywords><dc:creator>Maddy Varner</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Life Goals</dc:subject><media:thumbnail url="https://media.wired.com/photos/69d6b7683054592a269f79e7/master/pass/Untitled-1.jpg" width="2400" height="1350"/></item><item><title>‘We Were Not Ready for This’: Lebanon's Emergency System Is Hanging by a Thread</title><link>https://www.wired.com/story/we-were-not-ready-for-this-lebanons-emergency-system-is-hanging-by-a-thread/</link><guid isPermaLink="false">69d66fdf539e5361b486f16b</guid><pubDate>Wed, 08 Apr 2026 18:43:39 +0000</pubDate><media:content/><description>In Lebanon, nearly 1 in 5 people has been displaced by Israeli attacks, leaving the government to manage a modern crisis without modern digital infrastructure.</description><category>Security</category><media:keywords>Israel, Middle East, war, identity</media:keywords><dc:creator>Carla Sertin</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>State of War</dc:subject><media:thumbnail url="https://media.wired.com/photos/69d66fdf5ed03f09403e5e8d/master/pass/Kamal%20Shehadi_WiredME,Gettyimages.jpg" width="3088" height="2316"/></item><item><title>Men Are Buying Hacking Tools to Use Against Their Wives and Friends</title><link>https://www.wired.com/story/men-are-buying-hacking-tools-to-use-against-their-wives-and-friends/</link><guid isPermaLink="false">69cfc150bd20ea771b00738e</guid><pubDate>Wed, 08 Apr 2026 07:00:00 +0000</pubDate><media:content/><description>In Telegram groups, men are sharing thousands of nonconsensual images of women and girls, buying spyware, and engaging in doxing and sexual abuse.</description><category>Security</category><category>Security / Security News</category><media:keywords>Crime, privacy, security, cybersecurity, hacking, surveillance, Telegram</media:keywords><dc:creator>Matt Burgess</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Dark Corners</dc:subject><media:thumbnail url="https://media.wired.com/photos/69d5582f2f6731ca306d1bb2/master/pass/Security_MenAreBuyingHackingTools.jpg" width="2400" height="1350"/></item><item><title>Iran-Linked Hackers Are Sabotaging US Energy and Water Infrastructure</title><link>https://www.wired.com/story/iran-linked-hackers-are-sabotaging-us-energy-and-water-infrastructure/</link><guid isPermaLink="false">69d553d3bc5f7b2dcb07cd74</guid><pubDate>Tue, 07 Apr 2026 20:13:51 +0000</pubDate><media:content/><description>As Trump threatens Iranian infrastructure, the US government warns that Iran has carried out its own digital attacks against US critical infrastructure.</description><category>Security</category><category>Security / Cyberattacks and Hacks</category><category>Security / National Security</category><category>Security / Security News</category><media:keywords>cybersecurity, Iran, hacking, hacks, national security, critical infrastructure, war, cyberwar, Donald Trump, Israel</media:keywords><dc:creator>Andy Greenberg</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Tit-for-Tat</dc:subject><media:thumbnail url="https://media.wired.com/photos/69d55a00ee39d7f1d370552d/master/pass/security_Iran_GettyImages-2265328878.jpg" width="2400" height="1800"/></item><item><title>Anthropic Teams Up With Its Rivals to Keep AI From Hacking Everything</title><link>https://www.wired.com/story/anthropic-mythos-preview-project-glasswing/</link><guid isPermaLink="false">69d4131ee23953bcdf5ddb9a</guid><pubDate>Tue, 07 Apr 2026 18:49:50 +0000</pubDate><media:content/><description>The AI lab's Project Glasswing will bring together Apple, Google, and more than 45 other organizations. They'll use the new Claude Mythos Preview model to test advancing AI cybersecurity capabilities.</description><category>Security</category><category>Security / Cyberattacks and Hacks</category><category>Security / Security News</category><category>Business / Artificial Intelligence</category><category>Business / Big Tech</category><media:keywords>cybersecurity, security, hacking, hacks, malware, vulnerabilities, Anthropic, Google, apple, Microsoft, Amazon, AWS</media:keywords><dc:creator>Lily Hay Newman</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Action Item</dc:subject><media:thumbnail url="https://media.wired.com/photos/69d4e951d8b67218cd4b81ad/master/pass/04072026_New%20Anthropic%20Industry%20Coalition%20Racing%20to%20Use%20Private%20Claude%20Mythos%20Model%20To%20Secure%20Software.jpg" width="2400" height="1352"/></item><item><title>Border Patrol Agents Sold Challenge Coins With ‘Charlotte’s Web’ Characters in Riot Gear</title><link>https://www.wired.com/story/us-border-patrol-challenge-coins-nonprofits/</link><guid isPermaLink="false">69ceda73820e33cd20e6d906</guid><pubDate>Mon, 06 Apr 2026 18:16:27 +0000</pubDate><media:content/><description>Nonprofits run out of US Border Patrol stations are also selling other “operation”-themed coins that include a phrase popularized by the Proud Boys, potentially in violation of government rules.</description><category>Security</category><category>Security / National Security</category><category>Security / Security News</category><category>Politics / Policy</category><media:keywords>Customs and Border Protection, Department of Homeland Security, immigration, politics, law enforcement</media:keywords><dc:creator>Maddy Varner</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Coin Toss</dc:subject><media:thumbnail url="https://media.wired.com/photos/69d026f114c0e7a09d412585/master/pass/Security_BorderPatrolSoldCoins_2400x1350-ezgif.com-video-to-gif-converter.gif" width="800" height="450"/></item><item><title>The Hack That Exposed Syria’s Sweeping Security Failures</title><link>https://www.wired.com/story/inside-the-hack-that-exposed-syrias-security-failures/</link><guid isPermaLink="false">69d0299db4952a3941314d23</guid><pubDate>Sun, 05 Apr 2026 09:00:00 +0000</pubDate><media:content/><description>When Syrian government accounts were hijacked in March, the breach looked chaotic. But it revealed something more troubling: a state struggling with the most basic layer of cybersecurity.</description><category>Security</category><category>Security / National Security</category><category>Security / Cyberattacks and Hacks</category><category>Security / Security News</category><media:keywords>cybersecurity, Russia, hacking, security, hacks, Syria</media:keywords><dc:creator>Danny Makki</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Facades </dc:subject><media:thumbnail url="https://media.wired.com/photos/69d0299d141ca35374af8558/master/pass/SyriaDigital_Lead%20copy.jpg" width="2320" height="2316"/></item><item><title>Hackers Are Posting the Claude Code Leak With Bonus Malware</title><link>https://www.wired.com/story/security-news-this-week-hackers-are-posting-the-claude-code-leak-with-bonus-malware/</link><guid isPermaLink="false">69d00b4d930f0c6762bef1b6</guid><pubDate>Sat, 04 Apr 2026 10:30:00 +0000</pubDate><media:content/><description>Plus: The FBI says a recent hack of its wiretap tools poses a national security risk, attackers stole Cisco source code as part of an ongoing supply chain hacking spree, and more.</description><category>Security</category><category>Security / Cyberattacks and Hacks</category><category>Security / National Security</category><category>Security / Privacy</category><category>Security / Security News</category><media:keywords>security roundup, hacking, cybersecurity, security, malware, FBI, Cisco, artificial intelligence, apple, ios</media:keywords><dc:creator>Andy Greenberg, Dell Cameron, Maddy Varner, Andrew Couts</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Security Roundup</dc:subject><media:thumbnail url="https://media.wired.com/photos/69d03b9326dd2d3a7ba902f2/master/pass/security_roundup_claude_GettyImages-2181575875.jpg" width="2400" height="2400"/></item><item><title>Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk</title><link>https://www.wired.com/story/meta-pauses-work-with-mercor-after-data-breach-puts-ai-industry-secrets-at-risk/</link><guid isPermaLink="false">69cd4760b07b1f7a1d596ed2</guid><pubDate>Fri, 03 Apr 2026 21:28:14 +0000</pubDate><media:content/><description>Major AI labs are investigating a security incident that impacted Mercor, a leading data vendor. The incident could have exposed key data about how they train AI models.</description><category>Business</category><category>Security</category><category>Business / Artificial Intelligence</category><category>Business / Startups</category><category>Security / Cyberattacks and Hacks</category><category>Security / Security News</category><media:keywords>artificial intelligence, cybersecurity, hacking, security, vulnerabilities, malware, Startups, Meta, OpenAI, data</media:keywords><dc:creator>Maxwell Zeff, Zoë Schiffer, Lily Hay Newman</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Supply Chains</dc:subject><media:thumbnail url="https://media.wired.com/photos/69d0349ce79739f75ca71863/master/pass/security_Mercor3_GettyImages-1429228638-copy-2.jpg" width="1828" height="1828"/></item><item><title>CBP Facility Codes Sure Seem to Have Leaked Via Online Flashcards</title><link>https://www.wired.com/story/cbp-facility-codes-sure-seem-to-have-leaked-via-online-flashcards/</link><guid isPermaLink="false">69c6aefdfb87f4c0124585cc</guid><pubDate>Fri, 03 Apr 2026 09:00:00 +0000</pubDate><media:content/><description>The Quizlet flashcards, which WIRED found through basic Google searches, seem to include sensitive information about gate security at Customs and Border Protection locations.</description><category>Security</category><category>Security / National Security</category><media:keywords>Customs and Border Protection, Immigration and Customs Enforcement, privacy, security, cybersecurity, immigration</media:keywords><dc:creator>Sammy Sussman</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Open Sesame</dc:subject><media:thumbnail url="https://media.wired.com/photos/69c6c4fb24f02ff7dc20961d/master/pass/security_CBP_quizlet_GettyImages-2202940645.jpg" width="2121" height="1414"/></item><item><title>‘Uncanny Valley’: Iran’s Threats on US Tech, Trump’s Plans for Midterms, and Polymarket’s Pop-up Flop</title><link>https://www.wired.com/story/uncanny-valley-podcast-iran-targets-us-tech-polymarket-pop-up-trump-midterms/</link><guid isPermaLink="false">69cac87ef016b774280490af</guid><pubDate>Thu, 02 Apr 2026 21:04:22 +0000</pubDate><media:content/><description>In this episode, we discuss Iran’s threats to target US tech firms, gear up for the midterm elections, and get a scene report from the Polymarket pop-up bar in DC.</description><category>Security</category><category>Security / Security News</category><media:keywords>Uncanny Valley Podcast, podcasts, Iran, Donald Trump, Silicon Valley, politics, elections, artificial intelligence, Polymarket</media:keywords><dc:creator>Brian Barrett, Zoë Schiffer, Leah Feiger, Makena Kelly, Kate Knibbs</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Uncanny Valley</dc:subject><media:thumbnail url="https://media.wired.com/photos/69cda03bbbb99516b24f8b5f/master/pass/Uncanny-Valley-Trump-Iran-Tech-Companies-Security-2268129741.jpg" width="1232" height="1232"/></item><item><title>What Happens When a Nuclear Site Is Hit?</title><link>https://www.wired.com/story/heres-what-can-happen-when-the-us-bombs-irans-nuclear-sites/</link><guid isPermaLink="false">69ce780c156741c71fc382eb</guid><pubDate>Thu, 02 Apr 2026 18:08:08 +0000</pubDate><media:content/><description>As strikes continue on Iran’s nuclear facilities, the real danger isn’t the explosion, but what happens if critical safety systems fail—and how that risk could spread across the Gulf.</description><category>Security</category><category>Security / National Security</category><category>Security / Security News</category><category>Science / Environment</category><category>Science / Health</category><media:keywords>Iran, nuclear, nuclear power, war, Military, weapons</media:keywords><dc:creator>Jethu Abraham</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Fallout</dc:subject><media:thumbnail url="https://media.wired.com/photos/69ce780b6ff24e6598c91ffc/master/pass/Nuclear_Lead.jpg" width="3860" height="2895"/></item><item><title>Unmasking the Paramilitary Agents Behind Trump’s Violent Immigration Crackdown</title><link>https://www.wired.com/story/border-patrol-bortac-borstar-use-of-force-midway-blitz/</link><guid isPermaLink="false">69cba2926f6778687a897eec</guid><pubDate>Thu, 02 Apr 2026 10:00:00 +0000</pubDate><media:content/><description>A WIRED analysis of DHS records identified dozens of specialized federal agents who used force against US civilians during the largest known deployment of its kind in US history.</description><category>Security</category><category>Security / National Security</category><category>Security / Security News</category><category>Politics / Policy</category><media:keywords>immigration, Immigration and Customs Enforcement, Department of Homeland Security, Donald Trump, Police, Customs and Border Protection</media:keywords><dc:creator>Ali Winston, Maddy Varner</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Use of Force</dc:subject><media:thumbnail url="https://media.wired.com/photos/69c6c6213cca8267ad98901d/master/pass/WIRED-BORTAC-Top-Art.gif" width="800" height="466"/></item><item><title>Apple Will Push Out Rare ‘Backported’ Patches to Protect iOS 18 Users From DarkSword Hacking Tool</title><link>https://www.wired.com/story/apple-will-push-out-rare-backported-patches-to-protect-ios-18-users-from-darksword-hacking-tool/</link><guid isPermaLink="false">69cad050263917a747a8110a</guid><pubDate>Wed, 01 Apr 2026 00:49:08 +0000</pubDate><media:content/><description>As DarkSword spreads, Apple tells WIRED it will enable iOS 18-specific fixes for millions of iPhone owners who remain on that iOS version rather than force them to update to iOS 26.</description><category>Security</category><category>Security / Cyberattacks and Hacks</category><category>Security / Security News</category><media:keywords>apple, ios, iPhone, hacks, malware, Russia, hacking, cybersecurity</media:keywords><dc:creator>Andy Greenberg</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Patchy Service</dc:subject><media:thumbnail url="https://media.wired.com/photos/69caec417aba9d3dd8c5d304/master/pass/GettyImages-2149574147.jpg" width="1929" height="1286"/></item><item><title>Iran Threatens to Start Attacking Major US Tech Firms on April 1</title><link>https://www.wired.com/story/iran-threatens-to-start-attacking-major-us-tech-firms-on-april-1/</link><guid isPermaLink="false">69cbf2b17c3bcf5ad8dbe7db</guid><pubDate>Tue, 31 Mar 2026 21:25:12 +0000</pubDate><media:content/><description>Tech giants like Apple, Google, and Microsoft are among those on a target list released by Iran’s Islamic Revolutionary Guard Corps.</description><category>Security</category><category>Security / Security News</category><category>Business / Big Tech</category><media:keywords>Iran, apple, Microsoft, Google, Palantir, Amazon, Intel, Tesla, boeing, Israel, war, military tech</media:keywords><dc:creator>Dell Cameron, Louise Matsakis</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Collateral Damage</dc:subject><media:thumbnail url="https://media.wired.com/photos/69cbf5d389cbdc32deb6bcdf/master/pass/Trump_Iran_Biz_GettyImages-2267975852.jpg" width="2400" height="1600"/></item><item><title>The US Military’s GPS Software Is an $8 Billion Mess</title><link>https://www.wired.com/story/the-us-militarys-gps-software-is-an-8-billion-mess/</link><guid isPermaLink="false">69cbf455955a0fbc37be3372</guid><pubDate>Tue, 31 Mar 2026 17:34:46 +0000</pubDate><media:content/><description>The GPS Next-Generation Operational Control System was due for completion in 2016. Ten years later, the software for controlling the military’s GPS satellites still doesn’t work.</description><category>Security</category><category>Security / Security News</category><category>Science / Space</category><media:keywords>Ars Technica, space, GPS, satellites, Military, military tech</media:keywords><dc:creator>Stephen Clark, Ars Technica</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Boondoggles</dc:subject><media:thumbnail url="https://media.wired.com/photos/69cbface4423e18d6fcaca64/master/pass/security_USSF_AP25151264788854.jpg" width="2400" height="1600"/></item><item><title>The Broken System That Keeps Shipping Crews Stranded in the Strait of Hormuz</title><link>https://www.wired.com/story/legal-loopholes-leave-shipping-crews-stranded-in-the-strait-of-hormuz/</link><guid isPermaLink="false">69cbbce689cbdc32deb6bab5</guid><pubDate>Tue, 31 Mar 2026 13:38:52 +0000</pubDate><media:content/><description>Vessels are increasingly being abandoned during the war on Iran, revealing a hidden failure in the global systems that keep goods—and people—moving.</description><category>Security</category><category>Security / Security News</category><media:keywords>Iran, shipping, war, supply chain, ships</media:keywords><dc:creator>Ruchi Kumar</dc:creator><dc:publisher>Condé Nast</dc:publisher><dc:subject>Abandoned Ship</dc:subject><media:thumbnail url="https://media.wired.com/photos/69cbbce5ca50bc3f79921fbd/master/pass/Stranded_Lead.jpg" width="2715" height="1866"/></item></channel></rss>