Threat LevelSecurityOur Algorithms Can Predict Future Disasters — Now What?By Annalee NewitzSecurityBiometric Database of All Adult Americans Hidden in Immigration ReformBy David KravetsSecurity$45M Bank Hack Suspect Was Shot Dead While Playing DominoesBy Kim ZetterSecurityFeds Charge 8 Alleged Mules in $45 Million Global Cyber Bank HeistBy Kim ZetterSecurityFirst Legal U.S. Gambling Site Will Comp You Windows 7By David KravetsSecurityJudge Allows Evidence Gathered From FBI's Spoofed Cell TowerBy Kim ZetterSecurityUse These Secret NSA Google Search Tips to Become Your Own Spy AgencyBy Kim ZetterSecurityFeds Drop Hacking Charges in Video-Poker Glitching CaseBy Kevin PoulsenSecurityJudge Asks IRS, Feds to Investigate Copyright-Trolling AttorneysBy David KravetsSecurityResearchers Hack Building Control System at Google Australia OfficeBy Kim ZetterSecurityAlleged 'SpyEye' Botmaster Ends Up in America, HandcuffsBy Kim ZetterSecuritySecretive Spy Court Approved Nearly 2,000 Surveillance Requests in 2012By David KravetsSecurityHacker Breached U.S. Army Database Containing Sensitive Information on DamsBy Kim ZetterSecurityUse a Software Bug to Win Video Poker? That’s a Federal Hacking CaseBy Kevin PoulsenSecurityGovernment Seeks to Fine Companies for Not Complying With Wiretap OrdersBy Kim ZetterSecurityHow a Serial-Killing Night Nurse Hacked Hospital Drug ProtocolBy Charles GraeberSecurityWatch Aaron Swartz Get Interviewed Months Before His SuicideBy David KravetsSecurityLaw Requiring Warrants for E-Mail Wins Senate Committee ApprovalBy David KravetsSecurityDoJ Secretly Granted Immunity to Companies that Participated in Monitoring ProgramBy Kim ZetterSecurityMan Convicted of Hacking Despite Not HackingBy David KravetsSecurityCaught in the System, Ex-Hacker Is Stalked by His PastBy Kim ZetterSecurityTwitter Now Has a Two-Step SolutionBy Mat HonanSecurityHere's a Good Reason to Encrypt Your DataBy David KravetsSecurityTSA Tables Plan to Allow Knives on PlanesBy David KravetsMore Stories