All Passcode
- How Google aims to disrupt the Islamic State propaganda machineA pilot program launched by Google鈥檚 technology incubator created software that pairs searches for the militant's slogans and recruitment material with antiextremist messages.
- Opinion: How the South China Sea fight could go digitalChina's聽growing聽technological prowess gives it many opportunities to use聽cybercapabilities聽to press territorial claims. That's why the US needs sharper policies to counter聽digital provocations. 聽聽
- Watch: The art of cyberwarJoin the Atlantic Council's Cyber Statecraft Initiative and Passcode on Tuesday,聽September 6聽for a panel discussion on the evolving cyberthreats facing the Asia-Pacific.
- Cybersecurity firm stirs controversy in alleging medical device flawsThe firm MedSec went to an investment advisory firm instead of medical device maker St. Jude to disclose potential security vulnerabilities.
- Zero-days: Why these security flaws are so dangerous and expensiveHackers hunt for them and governments around the world use them to carry out spy operations. What are zero-days and why are they increasingly valuable?聽
- How the DNC hack is boosting anti-US sentiment in RussiaRussian state-supported media is using the聽Democratic National Committee leaked emails to portray the American presidential elections as a corrupt spectacle akin to 'House of Cards.'
- For journalists in Russia, fighting off hackers is part of the jobReports that unknown hackers targeted the Moscow bureau of The New York Times is part of a worrying trend of alleged Kremlin spying against journalists in Russia.
- As terror hits closer to home, Germany reconsiders privacyFollowing European terror attacks, German officials have suggested legislation that would force tech companies to decrypt private messages and other measures to increase digital surveillance.
- What Teddy Roosevelt can teach us about cybersecurityWhy wait years to grow new cybersecurity talent when you can take advantage of the聽talented federal workforce today?
- Watch: Tools to teach privacyJoin us on Tuesday, August 30 for a Privacy Lab talk that will look at two tools created to teach users about digital privacy.聽
- Can hackers sway public opinion with DNC and NSA leaks?Many cybersecurity experts say the Kremlin is attempting to manipulate debate in the US by leaking secret information on politicians and secret government operations.
- NSA leak rattles cybersecurity industryThe National Security Agency stockpiled sophisticated tools designed to penetrate commonly used security software. Now that hackers have revealed some of those techniques, companies are left scrambling to secure their systems.
- Opinion: Cracking the cybersecurity gender codeAttracting more women into the male-dominated cybersecurity field means ditching the bro pipeline聽of computer science, military, and intelligence recruits聽and drawing from disciplines such as law and public policy.
- Opinion: NSA hack reveals flaws in White House zero-day processA potentially damaging hacking tool revealed in the apparent National Security Agency breach includes a zero-day vulnerability 鈥 or previously unknown security hole 鈥 in Cisco software. The government should have already disclosed that flaw.
- Russia emerges as prime suspect in apparent NSA hackA previously unknown group dumped a cache of hacking tools on the web that appear to be from the National Security Agency. Now, cybersecurity experts say Moscow is once again behind a cyberattack on the US.
- Opinion: Why political campaigns need chief information security officersThe Democratic and Republican parties 鈥 and their presidential candidates 鈥 should immediately put someone in charge of safeguarding their data. It's for the good of voter privacy and American democracy.聽
- Why hackers are so obsessed with picking locksIt's the physical manifestation of what they often try and accomplish in the digital world, say lock-picking聽enthusiasts.聽
- Podcast: How the University of Central Florida built a hacking dynastyIn this episode of The Cybersecurity Podcast,聽a team of student hackers from the University of Central Florida explain how they've managed to win聽three consecutive titles in the National Collegiate Cyber Defense Competition.
- In an age of digital insecurity, paying bug bounties becomes the normFrom Apple to Airbnb, companies are increasingly turning to outside hackers to find 鈥 and eventually fix 鈥 their software security vulnerabilities.
- Microsoft mishaps apparently exposed 'golden keys' to mobile securityMicrosoft apparently released a set of security protocols for unlocking security protections that could allow attackers to install malicious software on the company's smartphones and tablets.