All Passcode
- Court ruling against NSA practice could reverberate far beyond phone spyingThe federal court decision Thursday that found it illegal for the National Security Agency to collect massive amounts of phone data may have broader implications when it comes to privacy in the Digital Age.
- What it's like to have your identity stolenVictims rarely know anything about their predators. Yet the thieves know absolutely everything about them.
- The burgeoning business of identity protectionServices that monitor credit reports and help protect consumers from fraud are proliferating. But are the fees they charge worth it, and can they really guard against identity theft?聽
- The identity underworld: How criminals sell your data on the Dark WebCriminals can buy and sell your Social Security Number and the most intimate details of your personal life on sophisticated Internet forums.
- Influencers: Congress should end NSA bulk data collectionIn a Passcode survey, a group of more than 90 experts from across government, the private sector and privacy advocacy community call for surveillance reforms.聽
- 'Father of the Internet' Vint Cerf advocates for stronger encryption technology'Your laptop should be encrypted, your disk drive should be encrypted, your mobile should be encrypted,' said Cerf,聽Google鈥檚 chief Internet evangelist, at a talk in Washington this week.聽
- Opinion: The Pentagon's risky offensive cyberstrategyWhile the Pentagon's new cybersecurity strategy puts more weight on striking back against criminal or nation-state hackers, a more effective way to deter attacks may be through聽diplomacy, law enforcement, and sanctions.
- Both sides of data encryption debate face off in CongressCongress hears from technologists who favor stronger encryption on consumer devices and those who say such technology could hamper law enforcement efforts.聽
- Warnings of hackers on planes all too familiar to airline security researchersFresh government reports and alerts about the hacking threat to airplane avionics systems underscores the challenges facing industry and government as more critical infrastructure becomes Internet connected.
- Opinion: Egypt鈥檚 cybercrime bill poses threat to freedom of expressionThe draft law gives Egyptian authorities more power to control the Internet under the pretext of national security, leading the way to censorship of online news, cultural and political sites, and controversial views on the Web.
- Opinion: If predictive algorithms craft the best e-mails, we're all in big troubleThe new Crystal app creates profiles 'for every person with an online presence' so its users can craft the ideal e-mail for every recipient.聽That's not only troubling for privacy, but also threatens to strip individuality out of our digital dialogue.
- Lawmakers revive support for Aaron's Law to reform anti-hacking statuteThe bill named for late Internet activist Aaron Swartz, who committed suicide while facing charges under the聽Computer Fraud and Abuse Act, aims to restrict聽prosecutorial actions for crimes related to hacking.
- At cybersecurity gathering, the White House steps up charm offensiveUS government officials ventured to the West Coast to win over the security community and business leaders as聽Internet security proposals make their way through Congress.
- How cybersecurity competitions build tomorrow's workforce in the US and abroadNorthrop Grumman continues commitment to cyber STEM education through innovative cyber challenges, including the most recent in the UK.
- Pentagon cybersecurity strategy comes with olive branch to Silicon ValleyIn the first visit to Silicon Valley by a Defense secretary in nearly 20 years, Pentagon chief Ashton Carter rolled out the national cybersecurity defense strategy on Thursday during a trip meant to repair ties with the technology industry.
- Once a field of self-taught hackers, cybersecurity education shifts to universitiesOver the past year, colleges and universities across the country have received millions in funding from the government and foundations to launch cybersecurity initiatives. The result is a stark change for an industry made up of programmers who have often learned by trial and error.
- The drone debate: Does the coming swarm of flying gadgets require new privacy laws?While the Federal Aviation Administration is being sued because its proposed drone policy doesn't address privacy, others argue that聽unmanned aerial vehicles don't require new privacy standards, saying that existing laws are enough.
- Scaling the firewall: Ways around government censorship onlineAs countries such as Turkey, China, Ethiopia, and Bahrain block online content, people are discovering ways to get around Internet censors. Their methods depend on the kind of censorship they face and what they are doing online.
- Endpoint security is dead. Long live endpoint security!A solution to countering enterprise threats and advanced attacks? Invincea believes the right strategy is Contain, Identify, and Control.
- Senator Wyden: Congress may block government access to encrypted consumer devicesIt is going to be hard for members of Congress to defend the federal government鈥檚 position on this issue, particularly after the NSA 'overreach' on surveillance, said the Senate聽Intelligence Committee member.