Threat LevelSecuritySupreme Court Terminates Warrantless Electronic Spying CaseBy David KravetsSecurityMonkeys Explain Why Anonymous and Occupy ExistBy Ryan SingelSecurityFacebook Agrees to Pay $10 to Each 'Sponsored Stories' VictimBy David KravetsSecurityChild Porn in P2P Share Folder Is Smut Distribution, Appeals Court SaysBy David KravetsSecurityCopyright Scofflaws Beware: ISPs to Begin Monitoring Illicit File SharingBy David KravetsSecurityHacker Goes on Massive WoW Killing Spree; World SurvivesBy Kim ZetterSecurityReport: Chinese Tech Firms Should Be Viewed With Suspicion, Barred From U.S. NetworksBy Kim ZetterSecurityFend Off Trolls, Bots and Jerks With 'Empathy' TestBy Ryan SingelSecurityGoogle Says It Won't 'Manually' Review YouTube Vids for InfringementBy David KravetsSecurityGoogle Gives Up Fair-Use Defense, Settles Book-Scanning Lawsuit With PublishersBy David KravetsSecurityJuking Your Facebook 'Like' Stats Is as Easy as Sending a MessageBy Ryan SingelSecurityOuch: Romney Calls Tesla a 'Loser'By Ryan SingelSecurityYouTube Alters Copyright Algorithms, Will 'Manually' Review Some ClaimsBy David KravetsSecurityLifeLock's IPO Is Unimpressive, But Not as Bad as Its Checkered PastBy Ryan SingelSecurityMPAA Chief Says SOPA, PIPA 'Are Dead,' But ISP Warning Scheme Lives OnBy David KravetsSecurityDHS Issued False 'Water Pump Hack' Report; Called It a 'Success'By Kim ZetterSecurityCalifornia Governor Vetoes Landmark Location-Privacy LawBy David KravetsSecurityPayment Processor Stripe Buys Into Transparency and User RightsBy Ryan SingelSecurityJustice Department's Warrantless Spying Increased 600 Percent in DecadeBy David KravetsSecurityHackers Breached Adobe Server in Order to Sign Their MalwareBy Kim ZetterSecurityActress in Anti-Islam Film Sues YouTube on Copyright GroundsBy David KravetsSecurityInside N.Z. Police Megaupload Files: U.S. Investigation Began in 2010By Juha SaarinenSecurityIn U.N. Speech, Assange Demands U.S. End Persecution of WikiLeaks and Bradley ManningBy Kim ZetterSecurityMaker of Smart-Grid Control Software HackedBy Kim ZetterMore Stories