Threat LevelSecurityReddit Hints—Without Saying Anything—That It Got a National Security LetterBy Kim ZetterSecurityWhy Do the Feds Usually Try to Unlock Phones? It's Drugs, Not TerrorismBy Andy GreenbergSecurityWhy Hospitals Are the Perfect Targets for RansomwareBy Kim ZetterSecurityDark Web's Got a Bad Rep: 7 in 10 People Want It Shut Down, Study ShowsBy Andy GreenbergSecurityThe FBI Drops Its Case Against Apple After Finding a Way Into That iPhoneBy Kim ZetterSecurityTurning Live Surveillance Feeds Into Unsettling Works of ArtBy Andy GreenbergSecurityHype Around the Mysterious 'Badlock' Bug Raises CriticismBy Kim ZetterSecurityUber Will Pay $10,000 'Bug Bounties' to Friendly HackersBy Andy GreenbergSecurityThe FBI Now Says It May Crack That iPhone Without Apple's HelpBy Andy GreenbergSecurityHack Brief: Update iOS Now to Fix a Serious iMessage Crypto FlawBy Andy GreenbergSecuritySecurity News This Week: The NSA Denied Hillary a Secure BlackBerryBy Andy GreenbergSecurityLong Before the Apple-FBI Battle, Lavabit Sounded a WarningBy Kim ZetterSecurityThe FBI Warns That Car Hacking Is a Real RiskBy Andy GreenbergSecurityA Government Error Just Revealed Snowden Was the Target in the Lavabit CaseBy Kim ZetterSecurityHack Brief: No Need to Freak Out Over That Chinese iPhone MalwareBy Andy GreenbergSecurityApple's Brief Hits the FBI With a Withering Fact CheckBy Kim ZetterSecurityApple Lambasts the FBI for Not Asking the NSA to Help Hack That iPhoneBy Kim ZetterSecurityJohn Oliver Makes The Clearest Case Yet for iPhone CryptoBy WIRED SecuritySecurityIn the FBI's Crypto War, Apps May Be the Next TargetBy Andy GreenbergSecuritySecurity News This Week: Hackers Spoil Their $1 Billion Bank Heist With a TypoBy WIRED StaffSecurityNew Documents Solve a Few Mysteries in the Apple-FBI SagaBy Kim ZetterSecurityGovernment Calls Apple's iPhone Arguments in San Bernardino Case a 'Diversion'By Kim ZetterSecurityHack Brief: ISIS Data Breach Identifies 22,000 MembersBy Andy GreenbergSecurityThousands of Trucks, Buses, and Ambulances May Be Open to HackersBy Andy GreenbergMore Stories