Just as fake news circulated around the web ahead of the presidential election, bogus ads are spreading on Facebook and Twitter as a vehicle for delivering malicious software.
The scope of the breach is a harsh reminder how everyone on the web needs to be vigilant about protecting their data in an era of widespread criminal and government hacking.
One striking theme from Passcode's profile of 15 hackers under 15 years old: The kids all had a strong sense of ethics – and a desire to create a safer digital future for their peers – rather than create chaos online for pranks.
A new generation of cybersecurity prodigies breaks into networks – just to make them safer. Meet the young hackers trying to keep the web from tilting to the dark side.
After last week's cyberattack leveraged insecure internet-connected devices to wage a denial of service attack, many experts urged consumers to change passwords. But that alone won't solve the problem.
Israeli researchers have developed a method that accurately gauges sobriety using smartphones, smartwatches, and fitness trackers. While the technology may push the bounds of digital privacy, it could also save lives.
University of Toronto professor Ron Deibert launched The Citizen Lab in 2001 to become the 'CSI of the internet.' Since then, it has become one of the leading watchdogs for digital censorship and online suppression.
Experts have been trying for years to forge norms for how militaries around the world should operate in cyberspace. Now, tensions between Moscow and Washington over recent political breaches may energize that effort.
A congressional report says encryption makes America safer. Why are these two Representatives refusing to sign on?
Internet of Things devices — from Web routers to smart refrigerators — can be overcome by malware and used to affect an Internet we all rely on if simple changes aren’t made
Baltimore is at the leading edge of deploying surveillance technologies. Even though its practices have raised questions about civil liberties and privacy, law enforcement agencies around the world see it as a test bed for the future of policing.
Headhunters well-known for helping US spies find jobs in the private sector say intelligence analysts and officials, including those who specialize in cybersecurity, aren't running for the exits even though President-elect Trump has openly dismissed their findings.
Just as fake news circulated around the web ahead of the presidential election, bogus ads are spreading on Facebook and Twitter as a vehicle for delivering malicious software.
Despite diverse threats and difficulty managing networks in an age of millions of connected devices, cyberdefenders are optimistic about the future, according to Tenable Network Security’s Cybersecurity Assurance Report Card.
While experts say the attack isn’t connected to recent political hacks, it highlights a troubling lack of digital security within US government organizations.
Can you hack a Gibson? Are you interested in SETEC Astronomy? Shall we play a game?
At a Passcode event in Washington, Carnegie Mellon University cybersecurity expert David Brumley said digital defenders need to attack their own systems to discover the flaws.
Lawmakers and cybersecurity experts say the Obama administration should have acted faster to retaliate against Moscow once it learned that Russian hackers tampered with the US presidential election. President Obama defended his response so far, and promises more is coming.
Perhaps the greatest power high-level executives and board members have is the ability to change the culture of security in their organizations
The scope of the breach is a harsh reminder how everyone on the web needs to be vigilant about protecting their data in an era of widespread criminal and government hacking.
Since the president-elect has rejected intelligence analysis that Russian hackers meddled in the presidential election, where is he getting advice on issues of digital security and espionage?
How can the US defend itself from cyberthreats in the next ten years? Watch a discussion with some of the authors of a cybersecurity report delivered to President Obama earlier this month.
Now that law enforcement has more leeway to hack computers and surveil suspects due to changes in criminal procedure, Congress needs oversee these powers to protect Americans' civil liberties and privacy.
In order to beat malicious hackers, the cybersecurity community must develop innovative approaches for deploying – and automating – offensive strategies to find and fix software vulnerabilities.
2016 has been a year of unprecedented cyberattacks. It also laid bare the need for the international community to join forces in confronting these growing global threats.
The Cybersecurity Podcast crew interviews the primary author of the US House Oversight and Government Reform Committee report looking into last year's Office of Personnel Management cyberattack.
Passcode Editor | Michael is an editor and writer based in Boston.
Passcode Deputy Editor | Sara covers security and privacy policy from DC.
Staff writer | Jack is the Mark Clayton Fellow in Cybersecurity
Correspondent | Paul covers critical infrastructure and the Internet of Things.
Correspondent | Jaikumar is an award-winning technology reporter.
Columnist | Nadya directs the Global Security Initiative at Arizona State Uni...
Columnist | Lorrie is chief technologist at the Federal Trade Commission
Columnist | Dan is chief information security officer for In-Q-Tel.
Columnist | Senior Research Scholar, Columbia University SIPA
Columnist | Sascha founded the Open Technology Institute.
Columnist | Lysa Myers is a security researcher at ESET.
Columnist | Bruce is a noted cryptographer and security expert.
Columnist | Evan is a philosophy professor at Rochester Institute of Technology.
Columnist | Melanie teaches information privacy law at American University.
Columnist | Nicole served as deputy chief technology officer at the White House.