DefConSecurityHow a 10-Year-Old Desk Phone Bug Came Back From the DeadBy Lily Hay NewmanSecurityA Model Hospital Where the Devices Get Hacked—on PurposeBy Lily Hay NewmanSecurityFax Machines Are Still Everywhere, and Wildly InsecureBy Lily Hay NewmanSecurityTo Identify a Hacker, Treat Them Like a BurglarBy Louise MatsakisSecurityA Clever Android Hack Takes Advantage of Sloppy StorageBy Brian BarrettSecurityHackers Found a Way to Make the Amazon Echo a Spy BugBy Andy GreenbergSecurityInvisible Mouse Clicks Let Hackers Burrow Deep Into MacOSBy Andy GreenbergSecurityPolice Bodycams Can Be Hacked to Doctor FootageBy Lily Hay NewmanSecurityAt DefCon, the Biggest Election Threat Is Lack of FundingBy Lily Hay NewmanSecurityA Tweet About Hacking Gets a Google Engineer in TroubleBy Louise MatsakisSecurityMillions of Android Devices Are Vulnerable Out of the BoxBy Brian BarrettSecurityEven Anonymous Coders Leave FingerprintsBy Louise MatsakisSecurityBugs in Mobile Credit Card Readers Could Expose BuyersBy Lily Hay NewmanSecurityHacking a Brand New Mac Remotely, Right Out of the BoxBy Lily Hay NewmanSecurityA New Pacemaker Hack Puts Malware Directly on the DeviceBy Lily Hay NewmanSecurityThe Sensors That Power Smart Cities Are a Hacker's DreamBy Lily Hay NewmanSecurityThe DNC Enlists Kids in Its Fight Against HackersBy Issie LapowskySecurityWatch a Homemade Robot Crack a Safe in Just 15 MinutesBy Andy GreenbergSecurityDNC Breach Rallies Hackers To Clinton's Side in VegasBy Andy GreenbergSecurityHackers Fool Tesla S's Autopilot to Hide and Spoof ObstaclesBy Andy GreenbergSecurityImploding Barrels and Other Highlights From Hackfest DefConBy Kim ZetterSecurityInternet-Connected Gas Pumps Are a Lure for HackersBy Kim ZetterSecurityThis Hacker's Tiny Device Unlocks Cars And Opens GaragesBy Andy GreenbergSecurityHackers Can Seize Control of Electric Skateboards and Toss RidersBy Kim ZetterMore Stories