All Passcode
- If cyberwar erupts, America's electric grid is a prime targetCybersecurity experts say that targets in a cyberwar wouldn't be Hollywood studios but instead the nation's critical infrastructure, which is already under attack by hackers trying to infiltrate, study, and potentially cripple US utilities.
- Evidence of 'stingray' phone surveillance by police mounts in ChicagoPrivacy advocates working to expose cellphone surveillance by law enforcement聽point to a recording of a Chicago officer as the 'smoking gun' that reveals police are monitoring activists.
- Security experts: FBI report light on evidence linking North Korea to Sony hackThe FBI statement that linked the Sony hack to North Korea relied on previously released and聽inconclusive evidence, said many cybersecurity insiders.
- Opinion: In response to Sony hack, US should focus on China not North KoreaPresident Obama has few good options from deterring North Korea from attacking 鈥 but he might be able to convince Beijing.聽
- US officials blame North Korea, but absolute attribution in Sony hack may be elusiveInvestigators can take weeks and even months to piece together an attack, especially a major one of the kind that hit Sony. Even then, it's often聽impossible to assign blame with 100 percent accuracy.
- Venture capitalist Ted Schlein anoints the next hot cybersecurity startupsSchlein talks about his latest investments, some of the myths about cybersecurity, and what it will take for the new crop of security startups to keep up with sophisticated hackers.聽
- Did North Korea really hack Sony? Cybersecurity pros at oddsIndustry experts weigh in on whether they believe North Korea is behind the massive Sony Pictures hack, which prompted the studio to pull 'The Interview' from theaters.聽
- How Microsoft鈥檚 battle with the Justice Department could reshape privacy lawsFor Microsoft and other US tech companies, a lawsuit over e-mails stored in Dublin is an important test case to demonstrate their willingness and ability to guard customer data from government prying in a post Snowden-era.
- Opinion: The case against publishing hacked Sony e-mailsSince the hacked Sony e-mails have nothing to do with whistleblowing or matters of political and national importance, publishing them is nothing more than privacy evisceration courtesy of media opportunism.
- Anonymous hits Mexican websites to protest kidnapping of 43 studentsThe hacktivist collective aimed a digital attack at Mexico that took down and defaced at least eight websites in response to the government's handling of the abduction and possible murder of 43 trainee teachers.
- Target ruling raises stakes for cybersecurity vigilanceA Minnesota judge ruled that a lawsuit against Target over last year's breach could proceed because the retailer 'played a key role in allowing the harm to occur.'
- Molly Sauter鈥檚 quest to make political DDoS legitimateIn 'The Coming Swarm,' Sauter argues that denial of service should be no more controversial than sit-ins.
- Nicole Wong on how big data could change the way we liveAfter stints at the White House, Google and Twitter, Wong understands the promise and peril of big data.
- Kenyan raid exposes hive of cybercrimeThe discovery of what police dub a cybercrime command center comes as Kenya experiences a wave of computer crime.
- Experts: Secure the Internet of Things, but don't let privacy 'hysteria' limit benefitsPasscode partnered with the Center for Data Innovation for an event in Washington. Here are some key takeaways.
- Cybersecurity unit drives Israeli Internet economyIsrael's Unit 8200 is technically tasked with the cybersecurity of the nation. But it serves a second purpose: training Israel's next generation of Internet entrepreneurs.
- Why it's harder than ever to remain anonymous on the WebEven with apps and services such as Whisper and Tor, many obstacles hinder the new quest for online anonymity.
- Sony hack fits pattern of recent destructive attacksThe ferocity of the Sony Pictures attack took the technology world by surprise.聽But it has similarities to other destructive hacks. Among other things, the Sony malware relied on the same commercial software to access and erase Sony hard drives as was used in a destructive attack on oil giant Saudi Aramco in 2012.
- Watch live: How can policymakers help build the Internet of Things?The Center for Data Innovation brings together lawmakers and industry leaders to discuss the role Washington should play in the rapid rise of connected cars, appliances, and everyday objects.
- How Washington should think about the Internet of ThingsIn an Op-Ed from Passcode partner Center for Data Innovation, Daniel Castro and Joshua New argue that policymakers can help foster the Internet of Things without crippling 'it with unnecessary or overbearing regulations.'