How ‘radioactive data’ could help reveal malicious AIs

Kidnapping, assassination and a London shoot-out

the-fbi-is-secretly-breaking-into-encrypted-devices-were-suing
lockdown.html

The Big Hack

Utopian Hacks
Why So Many Top Hackers Hail from Russia – Krebs on Security

If Everything Can Be ‘Weaponized,’ What Should We Fear?

Russians Engineer a Brilliant Slot Machine Cheat---And Casinos Have No Fix

The Perfect Weapon

A New Era of Internet Attacks Powered by Everyday Devices
Why Friday's Massive DDoS Attack Should be Terrifying

Why Security Experts Think Russia Was Behind the D.N.C. Breach
Envisioning the Hack That Could Take Down New York City

The Ukrainian Hacker Who Became the FBI’s Best Weapon—And Worst Nightmare

Why Apple and the FBI are fighting over an iCloud account

the-serial-swatter.html
A Back Door to Encryption Won't Stop Terrorists
A Gentle Primer on Reverse Engineering
How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last

How Spies Stole the Keys to the Encryption Castle
China Appears to Attack GitHub by Diverting Web Traffic

Hacked emails reveal China’s elaborate and absurd internet propaganda machine

The Secret Life of Passwords
The Dark Market for Personal Data
Out in the Open

Jesse Willms, the Dark Lord of the Internet
headroom-hacker
In Hours, Thieves Took $45 Million in A.T.M. Scheme

Chinese Army Unit Is Seen as Tied to Hacking Against U.S.
Hackers in China Attacked The Times for Last 4 Months

Transcript-Meeting-Assange-Schmidt
Secrets, Schemes, and Lots of Guns


Interface

