Threat LevelSecurityHacker Lexicon: What Counts as a Nation's Critical Infrastructure?By Kim ZetterSecurityEvidence Suggests the Sony Hackers Are Alive and Well and Still HackingBy Kim ZetterSecurityHow to Hack the Power Grid Through Home Air ConditionersBy Kim ZetterSecurityDonate Your Old USB Drives to Fight North Korean BrainwashingBy Andy GreenbergSecurityIt’s Been 20 Years Since This Man Declared Cyberspace IndependenceBy Andy GreenbergSecurityJulian Assange's 3.5-Year Detainment in Embassy Ruled UnlawfulBy Kim ZetterSecuritySnowden's Chronicler Reveals Her Own Life Under SurveillanceBy Andy GreenbergSecuritySomeone (Mostly) 3-D Printed a Working Semi-Automatic GunBy Andy GreenbergSecurityCorrupt Silk Road Investigator Re-Arrested for Allegedly Trying to Flee the USBy Andy GreenbergSecurityNSA Hacker Chief Explains How to Keep Him Out of Your SystemBy Kim ZetterSecurityCalifornia Police Used Stingrays in Planes to Spy on PhonesBy Kim ZetterSecurityNYC Launches Investigation Into Hackable Baby MonitorsBy Andy GreenbergSecurityHow to Make Your Own NSA Bulk Surveillance SystemBy Kim ZetterSecurityProposed State Bans on Phone Encryption Make Zero SenseBy Andy GreenbergSecurityHack Brief: Don't Be Trolled by This iPhone-Crashing Link MemeBy Andy GreenbergSecuritySecurity News This Week: Now California Wants to Ban Encrypted Phones, TooBy Yael Grauer Security5 Things Congress Should Learn From New State Privacy BillsBy Andy GreenbergSecurityZcash, an Untraceable Bitcoin Alternative, Launches in AlphaBy Andy GreenbergSecurityEverything We Know About Ukraine's Power Plant HackBy Kim ZetterSecurityHere's What Tor's Data Looks Like as It Flows Around the WorldBy Andy GreenbergSecurityHacker Lexicon: What Are DoS and DDoS Attacks?By Kim ZetterSecurityFeds Prod Automakers to Play Nice With HackersBy Andy GreenbergSecurityThe Silk Road's Dark-Web Dream Is DeadBy Andy GreenbergSecurityHacking Team's Leak Helped Researchers Hunt Down a Zero-DayBy Kim ZetterMore Stories