All Passcode
- FTC: Bridging the divide between hackers and the ‘flip phone caucus’
Ashkan Soltani, chief technologist of the Federal Trade Commission, and commissioner Terrell McSweeny spoke with Passcode while in Las Vegas for the Black Hat and DEF CON hacker conferences.
- How this hacker can virtually 'kill' you, and what to do about it
At the DEF CON hacker conference, Kustodian CEO Chris Rock demonstrated how fraudsters could artificially ‘kill’ someone for a profit or prank due to vulnerabilities in most countries’ death registration processes.
- Problematic protocol that directs all Web traffic finally gets attention
Security professionals have long overlooked Border Gateway Protocol, one of the most insecure parts of Internet infrastructure. But this year it was the subject of three talks at the Black Hat security conference in Las Vegas.
- OPM breach a shadow over Homeland Security's appeals to security pros
The Deputy Homeland Security Secretary urged attendees of the Black Hat conference not to let the massive government breach foil plans for improving information sharing about cybersecurity threats between the private sector and the government.
- Ello ads pan online targeting. Here's what experts say about its privacy practices
The upstart social media site launched an ad campaign on Facebook this summer to draw attention to online targeting and promote itself as an ad-free network. Yet, experts have questions about Ello's own privacy practices and safeguards.
- Jeep hackers: Only a dramatic stunt could force a Chrysler recall
At this week’s Black Hat security conference, researchers Charlie Miller and Chris Valasek said hacking a reporter’s car on a highway – which some called needlessly reckless – was the only real way to effect change.
- Hackable satellite signals may be impossible to patch
Security researcher Colby Moore plans to demonstrate this week at the Black Hat security conference how to intercept and even fake location-tracking satellite signals. The vulnerability could give thieves new ways to steal valuable cargo.
- Opinion: Retaliation against China is the wrong reaction to OPM hack
Even if Beijing was responsible for breaches that exposed sensitive data on millions of Americans, a diplomatic or economic response only distracts from the US government's most pressing problem: bolstering security measures to foil the next attack.
- In Snowden's wake, crypto-startups take root in Germany
Tech entrepreneurs are seizing on the new attention to digital privacy and finding customers around the world in search of more secure tools for online communication.
- Chris Hadnagy on the Def Con hackers posing as your coworkers
At a conference famous for its hackers, one of the most popular events requires no technical skill whatsoever. Rather than breaking into computers, contestants try to trick companies' well-meaning employees to give out valuable information.
- Should the US engage in espionage for economic gain?
Passcode was the exclusive media partner at an event on economic espionage hosted by the Atlantic Council think tank. Here’s what we learned.
- Michael Schrenk on stealing data your company gives away for free
In advance of his presentation at the Def Con conference in Las Vegas, Passcode spoke with Schrenk about the insider information he's paid to glean from the open Internet – and how companies can better protect themselves from having their inside plans exposed or used against them by competitors.
- Watch live: Rethinking commercial cyber espionage
Join Passcode and the Atlantic Council's Cyber Statecraft Initiative for a discussion on new ideas on commercial cyber espionage and intellectual property theft on Wednesday, June 29 from 4 to 5:30 pm.
- Podcast: Katie Moussouris on bug bounties and stunt hacking
On the Cybersecurity Podcast, HackerOne's Chief Policy Officer Katie Moussouris discusses ways to incentivize hackers to report security problems and Brunswick Group's Siobhan Gorman reveals the "golden rule" of breach disclosures.
- Researchers: We can crack a smart safe in less than 60 seconds
Bishop Fox researcher Dan Petro and senior security associate Oscar Salazar plan to demonstrate how an attacker can break into the CompuSafe Galileo next week at the Def Con security conference.
- The freedom to innovate: keeping the US ahead of the national security curve
Through partnerships and commitment to R&D, we can help secure America's innovative advantage.
- Widespread Android vulnerability could turn phones into spycams
The newly discovered flaw affects software found in Android devices dating back to 2010. Even though Google has released a fix, that won't help Android users who still rely on operating systems the company no longer supports.
- Flash back, Flash forward
The life and uncertain future of Adobe’s troubled Flash Player.
- Opinion: Why the US government must lose cryptowars 2.0
Law enforcement’s argument today is just as flawed now as it was in the 1990s. We cannot bend software or cryptography to our will – technology is science, not magic.
- The security industry files formal objections to Wassenaar proposal
Export restrictions classifying certain cybersecurity technology as arms caused industry outrage.