All Passcode
- How Google aims to disrupt the Islamic State propaganda machine
A pilot program launched by Google’s technology incubator created software that pairs searches for the militant's slogans and recruitment material with antiextremist messages.
- Opinion: How the South China Sea fight could go digital
China's growing technological prowess gives it many opportunities to use cybercapabilities to press territorial claims. That's why the US needs sharper policies to counter digital provocations.
- Watch: The art of cyberwar
Join the Atlantic Council's Cyber Statecraft Initiative and Passcode on Tuesday, September 6 for a panel discussion on the evolving cyberthreats facing the Asia-Pacific.
- Cybersecurity firm stirs controversy in alleging medical device flaws
The firm MedSec went to an investment advisory firm instead of medical device maker St. Jude to disclose potential security vulnerabilities.
- Zero-days: Why these security flaws are so dangerous and expensive
Hackers hunt for them and governments around the world use them to carry out spy operations. What are zero-days and why are they increasingly valuable?
- How the DNC hack is boosting anti-US sentiment in Russia
Russian state-supported media is using the Democratic National Committee leaked emails to portray the American presidential elections as a corrupt spectacle akin to 'House of Cards.'
- For journalists in Russia, fighting off hackers is part of the job
Reports that unknown hackers targeted the Moscow bureau of The New York Times is part of a worrying trend of alleged Kremlin spying against journalists in Russia.
- As terror hits closer to home, Germany reconsiders privacy
Following European terror attacks, German officials have suggested legislation that would force tech companies to decrypt private messages and other measures to increase digital surveillance.
- What Teddy Roosevelt can teach us about cybersecurity
Why wait years to grow new cybersecurity talent when you can take advantage of the talented federal workforce today?
- Watch: Tools to teach privacy
Join us on Tuesday, August 30 for a Privacy Lab talk that will look at two tools created to teach users about digital privacy.
- Can hackers sway public opinion with DNC and NSA leaks?
Many cybersecurity experts say the Kremlin is attempting to manipulate debate in the US by leaking secret information on politicians and secret government operations.
- NSA leak rattles cybersecurity industry
The National Security Agency stockpiled sophisticated tools designed to penetrate commonly used security software. Now that hackers have revealed some of those techniques, companies are left scrambling to secure their systems.
- Opinion: Cracking the cybersecurity gender code
Attracting more women into the male-dominated cybersecurity field means ditching the bro pipeline of computer science, military, and intelligence recruits and drawing from disciplines such as law and public policy.
- Opinion: NSA hack reveals flaws in White House zero-day process
A potentially damaging hacking tool revealed in the apparent National Security Agency breach includes a zero-day vulnerability – or previously unknown security hole – in Cisco software. The government should have already disclosed that flaw.
- Russia emerges as prime suspect in apparent NSA hack
A previously unknown group dumped a cache of hacking tools on the web that appear to be from the National Security Agency. Now, cybersecurity experts say Moscow is once again behind a cyberattack on the US.
- Opinion: Why political campaigns need chief information security officers
The Democratic and Republican parties – and their presidential candidates – should immediately put someone in charge of safeguarding their data. It's for the good of voter privacy and American democracy.
- Why hackers are so obsessed with picking locks
It's the physical manifestation of what they often try and accomplish in the digital world, say lock-picking enthusiasts.
- Podcast: How the University of Central Florida built a hacking dynasty
In this episode of The Cybersecurity Podcast, a team of student hackers from the University of Central Florida explain how they've managed to win three consecutive titles in the National Collegiate Cyber Defense Competition.
- In an age of digital insecurity, paying bug bounties becomes the norm
From Apple to Airbnb, companies are increasingly turning to outside hackers to find – and eventually fix – their software security vulnerabilities.
- Microsoft mishaps apparently exposed 'golden keys' to mobile security
Microsoft apparently released a set of security protocols for unlocking security protections that could allow attackers to install malicious software on the company's smartphones and tablets.