security researchBusinessA New Trick Could Block the Misuse of Open Source AIBy Will KnightSecurityHow the Top 5 PC Makers Open Your Laptop to HackersBy Kim ZetterSecurityThe Romanian Teen Hacker Who Hunts Bugs to Resist the Dark SideBy Andrada FiscuteanSecurityGay Dating Apps Promise Privacy, But Leak Your Exact LocationBy Andy GreenbergSecurity4 Ways to Protect Against the Very Real Threat of RansomwareBy Kim ZetterSecurityThat 'Badlock' Bug Is More Hype Than HurtBy Kim ZetterSecurityBug Bounty Guru Katie Moussouris Will Help Hackers and Companies Play NiceBy Kim ZetterSecurityOnly One in 4 Americans Remembers Last Year's Epic Jeep HackBy Andy GreenbergSecurityThe Sony Hackers Were Causing Mayhem Years Before They Hit the CompanyBy Kim ZetterSecurityHow to Make Your Own NSA Bulk Surveillance SystemBy Kim ZetterSecurityResearchers Solve Juniper Backdoor Mystery; Signs Point to NSABy Kim ZetterSecurityA $10 Tool Can Guess (And Steal) Your Next Credit Card NumberBy Andy GreenbergBusinessLibrary of Congress Says It's OK to Hack Your CarBy Klint FinleySecurityCars That Talk to Each Other Are Much Easier to Spy OnBy Andy GreenbergSecuritySecurity News This Week: The US Won't Force Companies to Build It Backdoors—For NowBy Yael Grauer SecurityWhen Security Experts Gather to Talk Consensus, Chaos EnsuesBy Kim ZetterSecurityHackers Could Heist Semis by Exploiting This Satellite FlawBy Kim ZetterSecurityHacker's Tweet Reignites Ugly Battle Over Security HolesBy Kim Zetter