All Passcode
- Influencers: OPM chief should be held responsible for breachThe White House backs聽Katherine Archuleta聽after the data聽breach, but a whopping 84 percent of Passcode鈥檚 pool of聽security and privacy experts say she should be held accountable.聽
- Mercenary hackers: an elusive, challenging foeFor-hire criminal hackers are a plentiful resource for nation-states and militant groups to carry out digital attacks. They are also expert at covering up their tracks, making it difficult to pinpoint true culprits.
- Shuddle offers Uber for kids, but may put young riders' data at riskA new smartphone app promising a safe travel option for kids as young as 8 may be a relief for busy parents, but digital privacy experts warn聽that Shuddle鈥檚 young customers鈥 data may be less secure.
- OPM hack may finally end overuse of 'privileged' user accessOffice of Personnel Management attackers entered the agency's network with a聽username and password belonging to an external contractor. As a result, security experts are renewing calls for stricter limits on this kind of privileged access.聽
- Industry warns proposed arms export rule will thwart basic cyberdefensesA Department of Commerce proposal that aims to keep聽surveillance software out of the hands of repressive regimes may inadvertently聽harm the security industry and chill security research efforts.
- 'Mr. Robot' a hit with actual hackersExperienced hackers praise the accuracy of USA Network's dark and gritty drama that premieres Wednesday. Because of that, they say, it stands apart from other Hollywood portrayals.聽
- Peter Singer: How a future World War III could be a cyberconflictPeter Singer, strategist at New America think tank, is coauthor of forthcoming novel 'Ghost Fleet,' which explores聽what would happen if digital warfare erupts between nations.聽
- Price tag for OPM breach at least $19 millionThe beleaguered聽head of the Office of Personnel Management returned to Capitol Hill on Tuesday for the first in a trio of hearings this week over the hack that exposed millions of personal files.聽
- Opinion: It's time for an about-face on facial recognitionThe breakdown in talks between advocacy groups and industry over facial recognition guidelines should alarm anyone who doesn't want to be recorded, identified, and cataloged聽everywhere they go.
- Opinion: Paper, the least terrible password management toolWith password management app LastPass possibly compromised, a stowed away pad of paper seems more secure than storing sensitive credentials in the cloud.
- Podcast: Cory Doctorow on science fiction, surveillance and World War IIIOn The Cybersecurity Podcast, Passcode's Sara Sorcher and New America's Peter Singer interview science fiction author Doctorow and DARPA's Dan Kaufman about the surveillance state and futuristic new technology in anticipation of future cyberconflicts.聽
- Opinion: #CyberDeflategate and the beginning of sports hackingIt was only a matter of time before American sports added hacking to its tricks for gaining the upper hand. But聽unlike other cheating scandals that have led to suspensions and fines, computer crimes can lead to prison time.
- What does it mean to 'win' a cyberwar?What we learned from an Atlantic Council event discussing聽the dynamics of global cyberconflict.
- Watch live: Thinking big on cyberconflictJoin a panel discussion with Passcode and聽the Atlantic Council's Cyber Statecraft Initiative聽on the dynamics of cyberconflict,聽Wednesday, June 17 from 4:00 - 5:30 p.m.
- Opinion: The reasonable expectation fallacyThe ability to delete yourself from the Web doesn't really matter.聽What really matters in the age of advanced surveillance is the right聽to not be correlated. Technology is always watching and capturing聽you, but the correlation is where the danger lies. Laws can change聽that, but only if enacted soon.
- Opinion: Is Surespot the latest cryptowar victim?The encrypted chat app has been mum since suggesting it was about to receive a government subpoena. Its silence implies that the government may be snooping on its users, which have included Islamic State militants.
- 鈥楥yberArabia鈥 Inspires Saudi students toward careers in cybersecurityCyberArabia was two-day聽cybersecurity awareness and training session hosted by Northrop Grumman for students at King Saud University aimed at building interest and attracting future cybersecurity talent.
- Lawmakers slam OPM for 'grossly negligent' approach to data securityAt a Congressional hearing Tuesday, Office of Personnel Management officials testified about plans to bolster digital defenses in the wake of hacks that exposed millions of sensitive records about government officials.
- Opinion: Beware that fake smartwatch. It's a malware magnetWith the rise of Internet-connected wearables such as the Fitbit and Apple Watch, fakes are proliferating, too. They are cheap but can also carry malicious software designed to steal personal information and infect other machines.聽
- Security pros: Cyberthreat info-sharing won鈥檛 be as effective as Congress thinksThough there's renewed momentum in Congress to finally pass a cybersecurity information-sharing bill, technology industry professionals say the proposals聽will primarily help government and won鈥檛 aid the private sector.聽