Cody Wilson Leaves Defense Distributed, But 3-D Printed Guns Roll On

Even after the DIY gunsmith's arrest on ****** assault charges, the fight for and against 3-D…

Hackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob

Weak encryption in the cars' key fobs allows all-too-easy theft, but you can set a PIN…

The Untold Story of NotPetya, the Most Devastating Cyberattack in History

Crippled ports. Paralyzed corporations. Frozen government agencies. How a single piece of code crashed the world.

Hacked Water Heaters Could Trigger Mass Blackouts Someday

A new study found that just 42,000 of those hacked home devices could be enough to…

Hackers Turned an Amazon Echo Into a Spy Bug

Researchers found they could turn the smart speakers into surveillance devices—if they could get their own…

Invisible Mouse Clicks Let Hackers Burrow Deep into MacOS

A former NSA hacker finds a new way malware can take control of a Mac's mouse…