All Passcode
- If cyberwar erupts, America's electric grid is a prime target
Cybersecurity experts say that targets in a cyberwar wouldn't be Hollywood studios but instead the nation's critical infrastructure, which is already under attack by hackers trying to infiltrate, study, and potentially cripple US utilities.
- Evidence of 'stingray' phone surveillance by police mounts in Chicago
Privacy advocates working to expose cellphone surveillance by law enforcement point to a recording of a Chicago officer as the 'smoking gun' that reveals police are monitoring activists.
- Security experts: FBI report light on evidence linking North Korea to Sony hack
The FBI statement that linked the Sony hack to North Korea relied on previously released and inconclusive evidence, said many cybersecurity insiders.
- Opinion: In response to Sony hack, US should focus on China not North Korea
President Obama has few good options from deterring North Korea from attacking – but he might be able to convince Beijing.
- US officials blame North Korea, but absolute attribution in Sony hack may be elusive
Investigators can take weeks and even months to piece together an attack, especially a major one of the kind that hit Sony. Even then, it's often impossible to assign blame with 100 percent accuracy.
- Venture capitalist Ted Schlein anoints the next hot cybersecurity startups
Schlein talks about his latest investments, some of the myths about cybersecurity, and what it will take for the new crop of security startups to keep up with sophisticated hackers.
- Did North Korea really hack Sony? Cybersecurity pros at odds
Industry experts weigh in on whether they believe North Korea is behind the massive Sony Pictures hack, which prompted the studio to pull 'The Interview' from theaters.
- How Microsoft’s battle with the Justice Department could reshape privacy laws
For Microsoft and other US tech companies, a lawsuit over e-mails stored in Dublin is an important test case to demonstrate their willingness and ability to guard customer data from government prying in a post Snowden-era.
- Opinion: The case against publishing hacked Sony e-mails
Since the hacked Sony e-mails have nothing to do with whistleblowing or matters of political and national importance, publishing them is nothing more than privacy evisceration courtesy of media opportunism.
- Anonymous hits Mexican websites to protest kidnapping of 43 students
The hacktivist collective aimed a digital attack at Mexico that took down and defaced at least eight websites in response to the government's handling of the abduction and possible murder of 43 trainee teachers.
- Target ruling raises stakes for cybersecurity vigilance
A Minnesota judge ruled that a lawsuit against Target over last year's breach could proceed because the retailer 'played a key role in allowing the harm to occur.'
- Molly Sauter’s quest to make political DDoS legitimate
In 'The Coming Swarm,' Sauter argues that denial of service should be no more controversial than sit-ins.
- Nicole Wong on how big data could change the way we live
After stints at the White House, Google and Twitter, Wong understands the promise and peril of big data.
- Kenyan raid exposes hive of cybercrime
The discovery of what police dub a cybercrime command center comes as Kenya experiences a wave of computer crime.
- Experts: Secure the Internet of Things, but don't let privacy 'hysteria' limit benefits
Passcode partnered with the Center for Data Innovation for an event in Washington. Here are some key takeaways.
- Cybersecurity unit drives Israeli Internet economy
Israel's Unit 8200 is technically tasked with the cybersecurity of the nation. But it serves a second purpose: training Israel's next generation of Internet entrepreneurs.
- Why it's harder than ever to remain anonymous on the Web
Even with apps and services such as Whisper and Tor, many obstacles hinder the new quest for online anonymity.
- Sony hack fits pattern of recent destructive attacks
The ferocity of the Sony Pictures attack took the technology world by surprise. But it has similarities to other destructive hacks. Among other things, the Sony malware relied on the same commercial software to access and erase Sony hard drives as was used in a destructive attack on oil giant Saudi Aramco in 2012.
- Watch live: How can policymakers help build the Internet of Things?
The Center for Data Innovation brings together lawmakers and industry leaders to discuss the role Washington should play in the rapid rise of connected cars, appliances, and everyday objects.
- How Washington should think about the Internet of Things
In an Op-Ed from Passcode partner Center for Data Innovation, Daniel Castro and Joshua New argue that policymakers can help foster the Internet of Things without crippling 'it with unnecessary or overbearing regulations.'