All Passcode
- FTC: Bridging the divide between hackers and the 鈥榝lip phone caucus鈥Ashkan Soltani, chief technologist of the Federal Trade Commission, and commissioner Terrell McSweeny spoke with Passcode while in Las Vegas for the Black Hat and DEF CON hacker conferences.
- How this hacker can virtually 'kill' you, and what to do about itAt the DEF CON hacker conference, Kustodian CEO Chris Rock demonstrated how聽fraudsters could artificially 鈥榢ill鈥 someone for a profit or prank due to vulnerabilities in most聽countries鈥 death registration processes.
- Problematic protocol that directs all Web traffic finally gets attentionSecurity professionals have long overlooked聽Border Gateway Protocol, one of the most insecure parts of Internet infrastructure. But this year it was the聽subject of three talks at the Black Hat security conference in Las Vegas.
- OPM breach a shadow over Homeland Security's appeals to security prosThe Deputy Homeland Security Secretary urged attendees of聽the Black Hat conference not to let the massive government聽breach foil plans for improving information sharing about cybersecurity threats between the private sector and the government.聽
- Ello ads pan online targeting. Here's what experts say about its privacy practicesThe upstart social media site launched an ad campaign on Facebook this summer to draw attention to online targeting and promote itself as an ad-free network. Yet,聽experts have questions about Ello's own privacy practices and safeguards.
- Jeep hackers: Only a dramatic stunt could force a Chrysler recallAt this week鈥檚 Black Hat security conference, researchers Charlie Miller and Chris Valasek said hacking a reporter鈥檚 car on a highway 鈥 which some called needlessly reckless 鈥 was the only real way to effect change.
- Hackable satellite signals may be impossible to patchSecurity researcher Colby Moore plans to demonstrate this week at the Black Hat security conference how to intercept and even fake location-tracking satellite signals. The vulnerability could give thieves new ways to steal valuable cargo.
- Opinion: Retaliation against China is the wrong reaction to OPM hackEven if Beijing was responsible for breaches that exposed sensitive data on millions of Americans, a diplomatic or economic response only distracts from the US government's most pressing problem: bolstering security measures to foil the next attack.
- In Snowden's wake, crypto-startups take root in GermanyTech entrepreneurs are seizing on the new attention to digital privacy and finding customers around the world in search of more secure tools for online communication.
- Chris Hadnagy on the Def Con hackers posing as your coworkersAt a conference famous for its hackers, one of the most popular events requires no technical skill whatsoever. Rather than breaking into computers, contestants try to trick companies' well-meaning employees to give out valuable information.聽
- Should the US engage in espionage for economic gain?Passcode was the exclusive media partner at an event on economic espionage hosted by the Atlantic Council think tank. Here鈥檚 what we learned.
- Michael Schrenk on stealing data your company gives away for freeIn advance of his presentation at the Def Con conference in Las Vegas, Passcode spoke with Schrenk about the insider information he's paid to glean from the open Internet 鈥 and how companies can better protect themselves from having their inside plans exposed or used against them by competitors.
- Watch live: Rethinking commercial cyber espionageJoin Passcode and聽the Atlantic Council's Cyber Statecraft Initiative聽for a discussion on new ideas on commercial cyber espionage and intellectual property theft on Wednesday, June 29 from 4 to 5:30 pm.
- Podcast: Katie Moussouris on bug bounties and stunt hackingOn the Cybersecurity Podcast, HackerOne's Chief Policy Officer Katie Moussouris discusses ways to incentivize hackers to report security problems and Brunswick Group's Siobhan Gorman reveals the "golden rule" of breach disclosures.聽
- Researchers: We can crack a smart safe in less than 60 secondsBishop Fox researcher Dan Petro and senior security associate Oscar Salazar plan to聽demonstrate how an attacker can break into the CompuSafe Galileo聽next week at the Def Con security conference.聽
- The freedom to innovate: keeping the US ahead of the national security curveThrough partnerships and commitment to R&D, we can help secure America's innovative advantage.
- Widespread Android vulnerability could turn phones into spycamsThe newly discovered flaw affects software found in Android devices dating back to 2010. Even though Google has released a fix, that won't help Android users who still rely on operating systems the company no longer supports.聽
- Flash back, Flash forwardThe life and uncertain future of Adobe鈥檚 troubled Flash Player.
- Opinion: Why the US government must lose cryptowars 2.0Law enforcement鈥檚 argument today is just as flawed now as it was in the 1990s. We cannot bend software or cryptography to our will 鈥 technology is science, not magic.聽
- The security industry files formal objections to Wassenaar proposalExport restrictions classifying certain cybersecurity technology as arms caused industry outrage.