All Passcode
- Opinion: Security firm鈥檚 Iran report mostly hypeA new report from the security firm Norse that claims growing Iranian cyberattacks on critical infrastructure relies on questionable data. It's the latest in a string of cybersecurity vendor reports that grab headlines but erode trust in the industry. 聽
- Hacker challenge helps NSA develop future cyberwarriorsThe National Security Agency hosted its annual Cyber Defense Exercise this week for students at聽military academies to hone tech skills 鈥 and build next generation leaders to fight its cyberwars.
- Bounty programs could swat more bugs with better toolsBug bounty聽programs to spot software flaws聽have been effective, but there are still bugs remaining. A new study suggests the best improvement to bounty programs could be focusing some attention somewhere else: Bug finding tools.
- Meet DB Networks, a next-generation cyber startupDB Networks is the fifth graduate of Cync, a partnership between Northrop Grumman and the bwtech@UMBC Cyber Incubator created聽to support global cyber startups with an eye toward commercializing innovations for the federal marketplace.
- Cybersecurity pros slam threat information-sharing billsSixty-five聽cybersecurity professionals and academics have asked Congress to reject three versions of information-sharing bills over privacy concerns.
- Burner promotion shows how much phone numbers revealThe聽Burner Challenge from app maker聽Ad Hoc Labs lets anyone see how much data can be gleaned from their digits.聽It's a lot.聽
- Opinion: Threat intelligence is the judo move needed to take down hackersAdvanced techniques for quickly tracking and analyzing the behavior and tactics of criminal hackers gives companies the tools to defend against emerging cyberthreats.
- Why you have the right to obscurityFederal Trade Commissioner Julie Brill says that obscurity means that聽personal information isn鈥檛 readily available to just anyone. In our age of aggressive data collection, she says safeguarding obscurity should be a key component of consumer protections.
- Podcast: Yahoo's Alex Stamos on e-mail encryption and keeping 1 billion customers secureYahoo's chief information security officer joins Passcode and New America for their monthly podcast about cybersecurity.
- White House hacking reports highlight digital cold war between US, RussiaThe Obama administration hasn't confirmed reports that Russians hacked into the聽White House last year. But the news comes amid growing Russian cyberattacks on American interests and US efforts to arrest and extradite the alleged culprits.聽
- How an Iranian nuclear deal could trigger cyberconflictWhat we learned from a panel discussion at the Atlantic Council about Iran鈥檚 growing cybercapabilities.
- Watch live: The future of the Iranian cyberthreatJoin a panel discussion with the Atlantic Council聽analyzing the latest developments in Iranian cybercapabilities and discussing the chances of larger cyberconflict involving Iran.
- A year after its exposure, Heartbleed bug remains a serious threatA new study shows that most large corporations haven't done enough to protect themselves against the flaw that can give hackers access to sensitive data.
- Why security pros don't like Obama's proposal for antihacking lawThe tech community has long called for reforming the聽1986聽Computer Fraud and Abuse Act for its overly broad language. But now many worry a White House plan to toughen the law will have a chilling effect on work to expose software weaknesses.
- How exposing more digital flaws could actually be harming securityJeff Schmidt, whose firm discovered a widespread Microsoft bug, worries that businesses are suffering from vulnerability fatigue. As a result, he says, they aren't doing enough to protect themselves from digital assaults.
- Obama's cyber sanctions order adds punch to fight against foreign hackersThe president's executive order paves the way for economic action against criminal hackers and foreign entities that finance corporate spying operations.
- Opinion: Sanctions may be Obama's best idea yet to battle cyberattacksObama signed an executive order today authorizing a聽program of sanctions to battle聽digital assaults coming from overseas. While the order seems aimed at the Chinese, it might also be the president's聽most successful tool for thwarting cyberattacks.聽
- Will privacy survive a Digital Age of corporate surveillance?Author Jacob Silverman argues that it's time for consumers to begin asking harder questions about whether companies such as Google should be trusted with so much personal data.
- Influencers: Companies should not be allowed to hack backThe vast majority of Passcode Influencers don't think private companies should respond to cyberattacks by聽chasing down digital intruders to recover stolen data or retaliating against hackers.聽
- The great Anonymous divideWhile the Guy Fawkes masks associated with Anonymous are seen at youthful protests around the world, the hacktivist collective is far from being a unified global movement.