Threat LevelSecurityThe 5 Most Dangerous Software Bugs of 2014By Andy GreenbergSecurity8 Free Privacy Programs Worth Your Year-End DonationsBy Andy GreenbergSecurityHow Laws Restricting Tech Actually Expose Us to Greater HarmBy Cory DoctorowSecurityExperts Are Still Divided on Whether North Korea Is Behind Sony AttackBy Kim ZetterSecurityThe Year's Worst Hacks, From Sony to Celebrity Nude PicsBy Kim ZetterSecurityThe Sneakiest Way Prosecutors Get a Guilty Verdict: PowerPointBy Ken ArmstrongSecurityObama's Bold Sony Statement: Canceling The Interview Was a 'Mistake'By Kim ZetterSecurityThe Evidence That North Korea Hacked Sony Is FlimsyBy Kim ZetterSecurityFormer Employees Are Suing Sony Over 'Epic Nightmare' HackBy Kim ZetterBusinessThe FBI Used the Web's Favorite Hacking Tool to Unmask Tor UsersBy Kevin PoulsenSecurityTech Giants Rally Around Microsoft to Protect Your Data OverseasBy Kim ZetterSecuritySony Hackers Threaten to Release a Huge 'Christmas Gift' of SecretsBy Kim ZetterSecuritySilk Road Judge: I Won't Reveal Witnesses Because Ulbricht Could Have Them KilledBy Andy GreenbergSecurityThe War Over the US Government's Unreleased Torture PicturesBy Pete BrookSecurityHacker Lexicon: What Is a Backdoor?By Kim ZetterSecurityPirate Bay Has Been Raided and Taken Down: Here's What We KnowBy Kim ZetterPhotoSatellites and Zeppelins: Serious Tech Helps Europe Lock Down Its BordersBy Jakob SchillerSecurityHacker Lexicon: What Is an Air Gap?By Kim ZetterSecurityThe International Competition Where Master Lock-Pickers Do BattleBy Charles GraeberGear8 Tools to Help You Unleash Your Lock-Picking PotentialBy Kevin PoulsenSecurityAn Interview With Darkside, Russia's Favorite Dark Web Drug LordBy Andy GreenbergSecuritySony Got Hacked Hard: What We Know and Don't Know So FarBy Kim ZetterBusinessGoogle Can Now Tell You're Not a Robot With Just One ClickBy Andy GreenbergSecurityThe 10 Biggest Bank Card HacksBy Kim ZetterMore Stories