cybersecuritySecurityHow to Protect Your Files From RansomwareBy David NieldSecurityRansomware Hits a Food Supply Giant—and Underscores Dire RiskBy Lily Hay NewmanSecurityUS Soldiers Exposed Nuclear Secrets on Digital Flash CcardsBy Lily Hay NewmanSecurityA Never-Before-Seen Wiper Malware Is Hitting Israeli TargetsBy Dan Goodin, Ars TechnicaSecurityThe Real Cost of Colonial Pipeline's $5 Million RansomBy Lily Hay NewmanSecurityDarkSide Hit Colonial Pipeline—and Created an Unholy MessBy Lily Hay NewmanSecurityApple Execs Chose to Keep a Hack of 128 Million iPhones QuietBy Dan Goodin, Ars TechnicaSecurityAn Ambitious Plan to Tackle Ransomware Faces Long OddsBy Lily Hay NewmanSecurityApple’s Ransomware Mess Is the Future of Online ExtortionBy Lily Hay NewmanSecurityA New Facebook Bug Exposes Millions of Email AddressesBy Dan Goodin, Ars TechnicaSecurityUS Sanctions on Russia Rewrite Cyberespionage's RulesBy Andy GreenbergSecurityThe FBI Takes a Drastic Step to Fight China’s Hacking SpreeBy Brian BarrettSecurity100M More IoT Devices Are Exposed—and They Won’t Be the LastBy Lily Hay NewmanSecurityHackers Are Exploiting Discord Links to Serve Up MalwareBy Andy GreenbergSecurityThe Opportunities—and Obstacles—for Women at NSA and Cyber CommandBy Lily Hay NewmanSecurityThe Threat to the Water Supply Is Real—and Only Getting WorseBy Brian BarrettSecurity‘Browser Isolation’ Takes On Entrenched Web ThreatsBy Lily Hay NewmanSecurityThe Peculiar Ransomware Piggybacking Off of China’s Big HackBy Brian BarrettSecurityA Homecoming Queen Was Arrested for Alleged Vote HackingBy Andy GreenbergSecurityFacebook's ‘Red Team X’ Hunts Bugs Outside the Social NetworkBy Lily Hay NewmanSecurityHackers Accessed Security Cameras Inside Tesla and BeyondBy Lily Hay NewmanIdeasThe Dire Possibility of Cyberattacks on Weapons SystemsBy Lukasz OlejnikSecurityIt’s Open Season for Microsoft Exchange Server HacksBy Lily Hay NewmanIdeasBitcoin’s Greatest Feature Is Also Its Existential ThreatBy Barath Raghavan and Bruce SchneierMore Stories