All Security Culture
- Watch: Kids & the connected homeJoin us on Wednesday, July 20 from 10 a.m. to 12 p.m. for a discussion that will cover kids, connected toys and devices, and privacy.
- Stuxnet ushered in era of government hacking, say expertsIn the new documentary "Zero Days," director Alex Gibney chronicles the rise of Stuxnet and the widespread use of cyberweapons that followed.
- The hacker who makes sure 'Mr. Robot' gets it rightCybersecurity researcher Marc Rogers is the principal hacking consultant on the hit TV show "Mr. Robot," which debuts its second season on the USA Network Wednesday.
- Meet David Dworken, the teenager who hacked the PentagonThe 18-year-old who just graduated high school was one of the youngest hackers participating in the Pentagon's bug bounty program to root out security flaws in military websites.
- How to keep criminal hackers from ruining your vacationFollowing basic security measures, like leaving extra devices at home and avoiding public Wi-Fi, could be enough to protect your information while you're traveling.
- Fake fingerprints: The latest tactic for protecting privacyThe Identity pad – a project to create artificial and reusable fingerprints – addresses the security and privacy risks associated with the growing use of biometric technology.
- Opinion: How we can finally kill the passwordInnovative biometric technology that relies on human traits as security measures is the answer to beating back threats from malicious hackers.
- Opinion: Your data needs more protection from shady debt collectorsHBO's John Oliver shined a light on tricky debt collection practices. How agencies often mishandle debtors' sensitive personal information – and the lax standards for how this information should be treated – is equally troubling.
- Artist's campaign targets biometric surveillanceArtist and researcher Adam Harvey has set out to raise awareness about the increasing pervasiveness of biometric tracking on the web and in everyday life.
- How technology, talent and teamwork drive cybersecurity that worksA gathering of top security minds points to collaboration as a key to driving change in federal cybersecurity.
- How to keep thieves from hijacking your cellphone accountNo one is completely safe from identity thieves. I should know since I was a victim. But here's how to better protect yourself against scammers, and how to lessen the damage of identity fraud.
- I was hacked just like Mark Zuckerberg. Learn from my mistakesFacebook friends don't let friends reuse passwords.
- Are you safe from ransomware? Take our quiz to find out
Criminals deploy ransomware to infect computers until victims cough up money – and scores of people are paying. In 2015, victims spent an estimated $24 million on ransomware scams. But there are easy ways of defending yourself before you get into that situation. How protected are you against digital fraudsters?
- The hacker’s guide to selling the LinkedIn wayYou may have heard that a hacker is trying to sell more than 100 million LinkedIn passwords and usernames for around $2,000. It's troubling news, but is that all they are really worth?
- Facebook's plan to train a new generation of cybersecurity prosThe social media giant is making its 'Capture the Flag' security challenge publicly available to encourage high schools and colleges to use gaming as a way of training hackers.
- How much is a security flaw worth? An inside look into Yahoo’s bug bounty programAs companies try to balance the need to be transparent with outside researchers while protecting their own sensitive business information, the often opaque bug valuation process can be controversial.
- Turning information security pros into cybersecurity change agentsThe backbone of the information security industry can be unleashed to help solve cybersecurity’s toughest problems.
- Can White House, tech startups overcome gun lobby resistance to 'smart guns'?Despite fierce resistance from groups such as the National Rifle Association – and safety and privacy concerns about the technology – many gun owners appear open to technology the Obama administration and many tech entrepreneurs say will reduce firearm deaths.
- Dutch art project exposes extent of surveillance, tests limits of lawThe arts collective known as SETUP built a detailed catalog of the population in the Netherlands based on open data sources. The information it collected proved so revealing that making it public would violate privacy laws.
- How to raise a white hat hackerMany of today's tech-savvy kids demonstrate the sort of curiosity that makes them ideally suited to become tomorrow's ethical hackers. The trick is teaching them how to use those instincts for good, and steering them away from the darker corners of the Internet.