All Passcode
- Researcher gives baby monitors an 'F' in cybersecurityA new report by a Rapid7 security consultant claims a slew of baby monitors can be hacked 鈥 which could offer potential attackers a way to snoop on people鈥檚 homes.
- Why industry groups are wary of stronger FTC cybersecurity oversightWith a court ruling reaffirming the Federal Trade Commission's ability to police corporate cybersecurity practices, and Congress considering giving the agency more power, industry groups are now concerned about overregulation.
- Researchers unveil tool for dodging countries with Internet surveillanceThe project known as 'Alibi routing' is a promising development聽for activists, journalists, or anyone else who has a vested interest in protecting sensitive information from prying eyes.
- Ashley Madison hack raises Digital Era questions of media ethicsThe breach has exposed users of the adultery site to public scrutiny, but should news organizations put limits on how reporters use the leaked private information?
- Opinion: How digital voyeurism is destroying privacyOur inability to turn away when hackers and digital eavesdroppers聽publish someone's intimate details online encourages others to do the same, chipping聽away at everyone's ability to keep secrets.
- The new, stealthy threats to the Internet of Things 鈥 and how to stop themThe emergence of the Internet of Things has provided unconventional ways for criminals to get inside corporate networks. No organization is immune to a breach, but there are ways they can begin safeguarding infrastructure while maintaining the convenience and power of the IoT.
- Have US laws created an online haven for Islamic State propaganda?Arab hacktivists dedicated to 'taking down' the jihadists' sites say US laws and bureaucracy impede their work, making US-hosted sites attractive to the Islamic State.
- How developing and disguising software bugs can help cybersecurityThe decade-old Underhanded C competition rewards contestants who can camouflage the most malicious software vulnerability. And it鈥檚 meant to make all software more secure.
- US retaliation for OPM hack could set precedent in global cyberconflictPasscode was the exclusive media partner for an event with the Atlantic Council exploring how the US should respond to attacks such as the Office of Personnel Management breach.
- US government not invited to Facebook鈥檚 ThreatExchange partyEven though the Obama administration has been pushing for more information sharing between Washington and tech companies about digital threats, the government is excluded from Facebook's cybersecurity project.
- Podcast: Half-life of secrets, golden age of surveillance, and the US military's Starship EnterpriseOn The Cybersecurity Podcast, Passcode's Sara Sorcher and New America's Peter Singer interview leading privacy and Internet scholar Peter Swire and Palo Alto Networks' Chief Security Officer Rick Howard.聽
- The troubling ripple effect of the Ashley Madison data dumpAn analysis of the leaked Ashley Madison data trove reveals thousands of military and government e-mail addresses along with individuals' security questions and answers used to protect passwords.
- Watch live: What can America do about hacks like the OPM breach?Join Passcode and聽the Atlantic Council's Cyber Statecraft Initiative聽for a discussion on appropriate responses to recent intrusions into sensitive US government systems like the Office of Personnel Management (OPM) on Wednesday, August 19 from 4 to 5:30 pm.
- Whistleblower's dilemmaBefore Snowden, Robert MacLean鈥檚 leak ruined his career. Now, he鈥檚 calling for stronger whistleblower protection.
- Michigan's battalion of digital defenders raises bar for states' cybersecurityOther states are now looking to replicate the Michigan Civilian Cyber Corps, something of a volunteer fire department and National Guard that bands together experts to fight cyberattacks.
- Why Lockheed Martin is giving away one of its best cybersecurity toolsCyber attacks come from human adversaries, which means they need human defenses. But network defenders don鈥檛 work at machine speed. 聽Laika BOSS, the now-open source tool that detects malware in the wild by drilling down to the file level of all data crossing into a network, empowers security analysts to focus on analyzing and defeating threats rather than just identifying them.聽
- How Google's icon experiment could improve online securityChanging the way icons indicate safe website connections may seem small, but it could have a profound impact on users' understanding of secure online communications.
- Opinion: Why bug hunting security researchers are Digital Age heroesComments from an Oracle executive聽disparaging the work of security researchers misunderstands their value and ethic. While hackers poking around in code may irritate software companies, their work has made computers safer for everyone.
- Help Passcode get to SXSWCheck out the security and privacy panels that Passcode proposed for the upcoming South By Southwest Interactive festival 鈥 and vote!
- Opinion: Twitter's privacy blunderTwitter's decision to give companies instant access to every public post means that users' comments will be tracked, mined, and analyzed more than ever before. Perhaps it's time to think twice before you tweet.