Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Hasbro detected an intrusion on March 28, prompting the company to take down some of its systems. Parts of Hasbro's website appeared down, with error messages indicating maintenance.
Three USB sticks were used, all with the correct code, but none of them worked. By the close of polling on Sunday, its e-voting system had collected 2,048 votes, but Basel-Stadt officials were not able to decrypt them with the hardware provided, despite the involvement of IT experts.
What I walked through wasn't just an immigration gate. It was a node in a rapidly expanding global infrastructure of digital identity, one being constructed at extraordinary speed, across dozens of countries, by a mix of governments, multilateral organizations, and private technology vendors. The people building it believe they are solving real problems: fraud, statelessness, inefficient public services, financial exclusion.
Mobile Fortify, now used by United States immigration agents in towns and cities across the US, is not designed to reliably identify people in the streets and was deployed without the scrutiny that has historically governed the rollout of technologies that impact people's privacy, according to records reviewed by WIRED. The Department of Homeland Security launched Mobile Fortify in the spring of 2025 to "determine or verify" the identities of individuals stopped or detained by DHS officers during federal operations, records show.
The Trump administration has since poured billions of dollars into immigration enforcement, and in March, Trump issued an executive order requiring the Department of Homeland Security to ensure that states have "access to appropriate systems for verifying the citizenship or immigration status of individuals registering to vote or who are already registered." In May, DHS began encouraging states to check their voter rolls against immigration data with the Systematic Alien Verification for Entitlements (SAVE) program, run by US Citizenship and Immigration Services (USCIS). SAVE now has access to data from across the federal government, not just on immigrants but on citizens as well.
An FBI informant helped run the Incognito dark web market and allegedly approved the sale of fentanyl-laced pills, including those from a dealer linked to a confirmed death, WIRED reported this week. Meanwhile, Jeffrey Epstein's ties to Customs and Border Protection officers sparked a Department of Justice probe. Documents say that CBP officers in the US Virgin Islands were still friendly with Epstein years after his 2008 conviction, illustrating the infamous sex offender's tactics for cultivating allies.
The concerns follow a series of election-related actions by Gabbard, including her recent appearance during an FBI raid of a Fulton County, Georgia elections office that was at the center of President Donald Trump's false claims of election fraud in 2020. Her team seized voting machines in Puerto Rico last year, per Reuters reporting, and has since said the systems contain cybersecurity vulnerabilities.
The Washington Roundtable discusses Donald Trump's threats to "nationalize" elections in fifteen states, the recent F.B.I. raid to seize 2020 voting records at an election facility in Fulton County, Georgia, and the ways in which the Administration might meddle with a free and fair vote in 2026. Their guest, Richard Hasen, is the director of the Safeguarding Democracy Project at U.C.L.A.'s School of Law.
Near-identical password reuse occurs when users make small, predictable changes to an existing password rather than creating a completely new one. While these changes satisfy formal password rules, they do little to reduce real-world exposure. Here are some classic examples: Adding or changing a number Summer2023! → Summer2024! Appending a character Swapping symbols or capitalization Welcome! → Welcome? AdminPass → adminpass Another common scenario occurs when organizations issue a standard starter password to new employees, and instead of replacing it entirely, users make incremental changes over time to remain compliant.