DefConSecurityHow a 10-Year-Old Desk Phone Bug Came Back From the DeadSecurityA Model Hospital Where the Devices Get Hacked—on PurposeSecurityFax Machines Are Still Everywhere, and Wildly InsecureSecurityTo Identify a Hacker, Treat Them Like a BurglarSecurityA Clever Android Hack Takes Advantage of Sloppy StorageSecurityHackers Found a Way to Make the Amazon Echo a Spy BugSecurityInvisible Mouse Clicks Let Hackers Burrow Deep Into MacOSSecurityPolice Bodycams Can Be Hacked to Doctor FootageSecurityAt DefCon, the Biggest Election Threat Is Lack of FundingSecurityA Tweet About Hacking Gets a Google Engineer in TroubleSecurityMillions of Android Devices Are Vulnerable Out of the BoxSecurityEven Anonymous Coders Leave FingerprintsSecurityBugs in Mobile Credit Card Readers Could Expose BuyersSecurityHacking a Brand New Mac Remotely, Right Out of the BoxSecurityA New Pacemaker Hack Puts Malware Directly on the DeviceSecurityThe Sensors That Power Smart Cities Are a Hacker's DreamSecurityThe DNC Enlists Kids in Its Fight Against HackersSecurityWatch a Homemade Robot Crack a Safe in Just 15 MinutesSecurityDNC Breach Rallies Hackers To Clinton's Side in VegasSecurityHackers Fool Tesla S's Autopilot to Hide and Spoof ObstaclesSecurityImploding Barrels and Other Highlights From Hackfest DefConSecurityInternet-Connected Gas Pumps Are a Lure for HackersSecurityThis Hacker's Tiny Device Unlocks Cars And Opens GaragesSecurityHackers Can Seize Control of Electric Skateboards and Toss RidersMore Stories