hacksDesignWatch: Mobile Recycling Center Turns Soda Cans Into Trendy StoolsBy Joseph FlahertyOpinionThe Darkest Place on the Internet Isn't Just for CriminalsBy Clive ThompsonSecurityResearchers Uncover Holes That Open Power Stations to HackingBy Kim ZetterOpinionHow to Design — And Defend Against — The Perfect Security BackdoorBy Bruce SchneierGearHackers Are Exploiting Baby Monitors, But We Know How to Stop ThemBy Mat HonanGearHow to Get Unlimited Talk, Text, and Data on an iPhone for $30 a MonthBy Abdel IbrahimBusinessOut in the Open: The Free Tools That Let You Hack Your Whole LifeBy Klint FinleyOpinionWant to Evade NSA Spying? Don't Connect to the InternetBy Bruce SchneierSecurityAlleged Silk Road Mastermind Appears in CourtBy Kim ZetterScienceBypassing US GPS Limits for Active Guided RocketsBy Kristian von BengtsonOpinionWhy Free Software Is More Important Now Than Ever BeforeBy Angela WatercutterBusinessTake the Exclusive Tour of GitHub's New Hacker HeavenBy Robert McMillanOpinionForget Foreign Languages and Music. Teach Our Kids to CodeBy Brendan I. KoernerSecurityGerman Hackers Say They Cracked iPhone's New Fingerprint ScannerBy Kim ZetterGearSilence Is Golden: A Guide to Blocking Calls and Texts in iOS 7By Kif LeswingSecurityState-Sponsored Hacker Gang Has a Side Gig in FraudBy Kim ZetterDesignWatch: Obsolete Game Consoles Become Instruments for a Rock SongBy Joseph FlahertyGearKeep Your Overworked Laptop Processor Cool With This Colorful Silicone StripBy Kif LeswingOpinionApple's Fingerprint ID May Mean You Can't 'Take the Fifth'By Marcia HofmannOpinionIf Apple's iPhone Has Fingerprint Authentication, Can It Be Hacked?By Bruce SchneierSecurityNSA Revelations Cast Doubt on the Entire Tech IndustryBy DAVID KRAVETS AND ROBERT MCMILLANOpinionWhat Exactly Are the NSA's 'Groundbreaking Cryptanalytic Capabilities'?By Bruce SchneierSecurityNSA Laughs at PCs, Prefers Hacking Routers and SwitchesBy Kim ZetterGearUse Smart Playlists to Keep Your iPhone Filled With Your Newest MusicBy Bryan GardinerMore Stories