Latest Security Stories
The 6 Most Important Things We Learned From Edward Snowden’s Guardian Q&A
What Can We Learn From Spying On Our Own Metadata?
A Concise History Of The NSA’s Online Spying Program PRISM
Is This Mysterious Silicon Valley Company Helping The NSA Spy On Americans?
Why Government Phone Spying Is Really About Big Data
What High-Frequency Trading Looks Like Every Millisecond [Infographic]
What Information Can The Justice Department Get From Your Phone Records?
Los Alamos Lab Has Had A Secret Quantum Internet For Two Years
This Company Dares You To Crack Its Encryption Software
Your Rented Computer Can No Longer Legally Spy On You
4 Things You Need To Know About The Future Of Defense Technology
FBI Wants To Spy On Your Online Chats As They Happen
Can You Crack The NSA’s Top-Secret Crossword Puzzles?
Location Data Can Uniquely Identify Cellphone Users
The Biggest DDoS Cyber Attack In History Just Happened, And I Feel Fine
Researcher Says Radar Tech Could Detect Guns At School
The Reason All Your Favorite Companies Are Being Hacked? Dumb Employees
A Glimpse At Raytheon’s Terrifying People-Tracking Software
These Terrifying Handcuffs Can Shock And Drug Prisoners
Dear Mystery Algorithm That Hogged Global Financial Trading Last Week: What Do You Want?
Watch Cyberattacks Spread Across The Globe In Real Time [Infographic]
The Fastest Way To Crack A 4-Digit PIN Number [Infographic]
A Buoy-Based Security System For Our Ports
Smart Carpet Detects Your Gait, Knows if You’ve Fallen
How to Steal Personal Data From Someone’s Brain, Using a $300 Off-the-Shelf Brain Scanner
Seeing Through Walls With a Wireless Router
FYI: How Can I Protect My Cell Phone Data Records From Law Enforcement Subpoenas?
A Fingerprint Scanner That Can Capture Prints From 20 Feet Away
Those Nigerian Scam Emails Spin an Outrageous Yarn for a Reason
Obama Ordered Stuxnet Virus, Part of Organized Cyberattacks Against Iran
Video: Touch-Sensitive Doorknobs Could Lock or Unlock With the Curl of a Finger
Video: Face-Recognition System Can Sort Through 36 Million Faces Per Second
Crime-Reporting App Lets You Officially Rat Out Your Neighbors Right From Your Smartphone
In the Last Year, Hackers Gained ‘Full Functional Control’ of NASA Networks, Stole the Control Codes for the ISS
Russian Hackers Breach Springfield, Illinois (?) Water Utility and Destroy Pump
Nearly a Century After We Started Drooling Over Them, America Gets Its First Police Auto-Gyro
How a College Class Tracked Down Osama Bin Laden
Heat Hacking: Criminals Can Steal Your ATM PIN Code Via the Heat Your Fingers Leave Behind
TSA Begins Rolling Out Less-Invasive “Gingerbread Man” Body Scanners to U.S. Airports
Spy vs. Spy: Casinos Can’t See The Cameras Hidden Up Gamblers’ Sleeves
Facial Recognition Software Takes One Glance at You and Brings Up Your Facebook Profile
Anti-Fraud Facial Recognition System Revokes the Wrong Person’s License
Point/Counterpoint: Internet IDs Are a Terrible Idea
Point/Counterpoint: We Need a System of Internet IDs
Every Six Hours, the NSA Gathers as Much Data as Is Stored in the Entire Library of Congress
New Washable RFID Chips Track Hotel Towels and Bathrobes
New Tracking System Can Pin Any Internet User’s Location to Within a Few Hundred Meters
Video: Android App Hacks Into Cardkey-Protected Doors With One Click
Trojan-Horse MP3s Could Let Hackers Break Into Your Car Remotely, Researchers Find
Printing Ultra-Thin Circuits Into Banknotes Could Give Electronic Security to Paper Currency
How Secure Is Julian Assange’s “Thermonuclear” Insurance File?
Bring the TSA Home With This DIY Handheld Body Imager
New Biometric Software Tracks Unique Eye Movements For Identification
Microscopic Worms Could Sniff Out Explosives
An Order of Seven Global Cyber-Guardians Now Hold Keys to the Internet
Texas Congressmen Call for Electromagnetic Pulse Guns on the Border
UK School Replaces Library Cards for Kids with Fingerprint Scans
Tattooing Patients With UV Ink Could Protect Pacemakers From Hackers
Augmented Identity App Helps You Identify Strangers on the Street
This Week, Cybersecurity Efforts Advance on Several Fronts
New Digital Protocol Lets You Sign Secure, Legally Binding Contracts Over the Phone
Chinese Woman Surgically Switches Fingerprints To Evade Japanese Immigration Officers
The Dangers of Rogue Household Robots
Open-source homeland security: the $250 DIY Bedazzler induces nausea via LEDs