cybersecuritySecurityCocaine, Crimeware, and Cowboy HatsBy Noah ShachtmanSecurityResearcher Makes Free Phone and Text Encryption Available to EgyptBy Kim ZetterSecurityGoogle Lets Users Double-Down on Account SecurityBy Ryan SingelSecurityAnonymous Hacks Security Firm Investigating It; Releases E-mailBy Kim ZetterSecurityNo, Hackers Can't Open Hoover Dam FloodgatesBy David KravetsSecurityReport: Efforts to Secure Nation's Power Grid IneffectiveBy Kim ZetterSecurityInternet 'Kill Switch' Legislation Back in PlayBy David KravetsSecurityEgypt Shut Down Its Net With a Series of Phone CallsBy Babu-KurraSecurityAmid Street Protests, Twitter Shuttered in EgyptBy David KravetsSecurityClaim: WikiLeaks Published Documents Siphoned Over File Sharing SoftwareBy Kim ZetterSecurityDid a U.S. Government Lab Help Israel Develop Stuxnet?By Kim ZetterSecurityTSA Worker Gets 2 Years for Planting Logic Bomb in Screening SystemBy Kim ZetterSecurityA Four-Day Dive Into Stuxnet's HeartBy John BorlandSecurityReport Strengthens Suspicions That Stuxnet Sabotaged Iran's Nuclear PlantBy Kim ZetterSecurity2010: The Year the Internet Went to WarBy David KravetsSecurityGoogle DoubleClick Caught Serving Malicious AdBy Kim ZetterSecurityMilitary Bans Disks, Threatens Courts-Martial to Stop New LeaksBy Noah ShachtmanSecurityIran: Computer Malware Sabotaged Uranium CentrifugesBy Kim ZetterKids and Passwords -- What's Your Strategy?By Russ NeumeierSecurityClues Suggest Stuxnet Virus Was Built for Subtle Nuclear SabotageBy Kim ZetterSecurityReport: Banking Apps for Android, iPhone Expose Sensitive InfoBy Kim ZetterSecuritySealed Courtroom Sought in High-Speed–Trading Code-Theft CaseBy Kim ZetterSecurityDespite Scare Talk, Attacks on Pentagon Networks DropBy Noah ShachtmanSecurityReport: 'Spear-Phishing' Attacks Keep on GivingBy Kim ZetterMore Stories