In Star Wars, droids serve all kinds of roles, from simple laborers to highly skilled surgeons and battlefield generals. But some droids specialize in combat and mayhem. Deadly droids have their own gradations of lethality, from regular battle droids, whose strength lie in numbers (and not their aim), to killer soldier units working in teams, […]
Tactics
Excel is still a security headache after 30 years because of this one feature

Threat researcher explains why it’s tricky to tell the difference between legitimate Excel Macros and ones that deliver malware.
On the Comlink: Has The High Republic Changed How You See the Star Wars Galaxy?

On the Comlink is a feature in which StarWars.com writers hop on a call (virtual or old fashioned) and discuss a specific Star Wars topic. In this installment to celebrate the release of even more books from Star Wars: The High Republic, Emily Shkoukani, Kelly Knox, Amy Richau, Megan Crouse, and James Floyd talk about how the […]
Meet Omega: Michelle Ang on Becoming the Heart of Star Wars: The Bad Batch

There’s a lot of Michelle Ang in Omega, the newest member of Clone Force 99, on Star Wars: The Bad Batch. The actor was invited to use her native New Zealand accent, an homage to fellow Kiwi Temuera Morrison who originated the role of Jango Fett and the clone soldiers in the prequel films. But […]
The SolarWinds Hackers Aren’t ‘Back.’ They Never Went Away


A new phishing campaign from Russian spies targeted USAID among others. But it’s less an escalation than a regression to the mean.
How to Master Google’s AI Phone Call Features

Your Android phone can do a lot of fancy tricks, from making reservations with Duplex or screening calls. Here’s how to get the most out of them.
Goodbye Internet Explorer—and Good Riddance


Microsoft will finally put the venerated, vulnerability-ridden browser out to pasture, but it’s still got a year to cause some trouble.
Ransomware’s Dangerous New Trick: Double-Encrypting Your Data


Even when you pay to get a decryption key, you may find your files are still locked up by another strain of malware.
How phishing attacks spoofing Microsoft are evading security detection

The phishing emails use a Microsoft logo within an HTML table, which is not analyzed by security programs, says Inky.
Who Are the Bad Batch?

Hunter. Tech. Crosshair. Wrecker. Echo. This is experimental unit Clone Force 99, the baddest batch of clone troopers you’ll ever meet. Each member of this elite group adds their own exceptional skill to form a team unlike any other in the Republic. The Bad Batch’s missions have a 100% success rate due to their unusual […]