Threat LevelSecurityGoogle Says the FBI Is Secretly Spying on Some of Its CustomersBy David KravetsSecurityFBI Investigating Unidentified Drone Spotted Near JFK AirportBy David KravetsSecurityAlleged Drug Dealer at Center of Supreme Court GPS Case Wins MistrialBy David KravetsSecurityWhite House, FCC Chairman Support Legalizing Unlocking of Mobile PhonesBy David KravetsSecurityEvernote Hack Exposes User Data, Forces Extensive Password ResetsBy Daniela HernandezSecurityFeds Say Man Deserved Arrest Because Jacket Said 'Occupy Everything'By David KravetsSecurityFlame Windows Update Attack Could Have Been Repeated in 3 Days, Says MicrosoftBy Kim ZetterSecurityCablevision to Suspend Repeat Copyright Scofflaws, Comcast to Hijack BrowsersBy David KravetsSecurityBradley Manning Takes 'Full Responsibility' for Giving WikiLeaks Huge Government Data TroveBy Spencer AckermanSecuritySupreme Court Thwarts Challenge to Warrantless SurveillanceBy David KravetsSecurityStuxnet Missing Link Found, Resolves Some Mysteries Around the CyberweaponBy Kim ZetterSecurityISPs Now Monitoring for Copyright InfringementBy David KravetsSecurityLegalized Online Gambling Coming to a Computer Near YouBy David KravetsSecurityFeds Used Aaron Swartz's Political Manifesto Against HimBy David KravetsSecurityZendesk Security Breach Affects Twitter, Tumblr and PinterestBy Mat HonanSecurityRIAA Says Google's Anti-Piracy Search Algorithm Is BogusBy David KravetsSecurityWhite House Must Respond Publicly to Ban on Mobile-Phone UnlockingBy David KravetsSecurityDrug-Dog Alerts Are 'Up to Snuff,' Supreme Court SaysBy David KravetsSecuritySign Now: White House Petition to Legalize Mobile-Phone UnlockingBy David KravetsSecurityChinese Military Group Linked to Hacks of More Than 100 CompaniesBy Kim ZetterSecurityPirate Bay Accuses Anti-Piracy Group of PiracyBy David KravetsSecurityFeds Say Megaupload Entrapment Claim Is 'Sensationalist Rhetoric'By David KravetsSecurityCalifornia County Inching Toward Drone Deployment?By David KravetsSecurityExecutive Order Aims to Facilitate Sharing of Information on ThreatsBy Kim ZetterMore Stories