Threat LevelSecurityA Texas Jury's Guilty Verdict Should Worry IT AdminsSecurityAn Interview With the Hacker Probably Selling Your Password Right NowSecurityHacker Lexicon: What Is Password Hashing?SecurityTor Developer Jacob Appelbaum Resigns Amid Sex Abuse ClaimsSecurityHacker Lexicon: What Is the Digital Millennium Copyright Act?SecuritySecurity News This Week: A Deluge of Mega-Breaches Dumps on the Dark WebSecurityIT Admin Faces Felony for Deleting Files Under Flawed Hacking LawSecurityHacker Lexicon: What Is Fuzzing?SecurityYahoo Publishes National Security Letters After FBI Drops Gag OrdersSecurityThis 'Demonically Clever' Backdoor Hides In a Tiny Slice of a Computer ChipSecurityHow the Top 5 PC Makers Open Your Laptop to HackersSecuritySecurity News This Week: Apple Hires a Crypto Guru for Future Battles With the FedsSecurityThis Map Tracks Where Governments Hack Activists and ReportersSecurityA Car's Computer Can 'Fingerprint' You in Minutes Based on How You DriveSecurityGay Dating Apps Promise Privacy, But Leak Your Exact LocationSecurityChelsea Manning's Appeal Took Three Years to File. Here's WhySecurityWith Allo and Duo, Google Finally Encrypts Conversations End-to-EndSecurityThat Insane, $81M Bangladesh Bank Heist? Here's What We KnowSecurityEverything We Know About How the FBI Hacks PeopleSecuritySecurity News This Week: It's Tech Versus the Government, Yet AgainSecurity4 Ways to Protect Against the Very Real Threat of RansomwareSecurityHacker Lexicon: SQL Injections, an Everyday Hacker's Favorite AttackSecurityHacker Lexicon: Stingrays, the Spy Tool the Government Tried, and Failed, to HideSecuritySo … Now the Government Wants to Hack Cybercrime VictimsMore Stories