It’s no secret that few Wi-Fi routers have strong security. It might be alarming, however, to hear that many of today’s high-rated routers have fewer protections than those of 15 years ago, says the CITL research lab at ShmooCon.
At the CyberMed Summit in Arizona, simulated hospital emergencies highlight today’s medical-cybersecurity challenges. At their heart: education, collaboration, and advocacy.
Google CEO Sundar Pichai’s first congressional hearing—a milestone he probably wished he could have postponed for a few more years—did not lack drama. As he de... Read More...
The new Gmail feature Confidential Mode gives senders several ways to protect their messages, including timed deletion, passcode-required opening, and blocked forwarding. But experts are wary.
At the Context Conversations event on election security, veteran software engineer Ben Adida explains how he plans to “build open-source voting machines on commodity hardware.”
A small group of cybersecurity experts get together to ‘Hack the Capitol’ and raise awareness among lawmakers of the digital risks to industrial-control systems.
The Tel Aviv-based company Karamba explains how its technology protects a car’s CAN bus, or nervous system, from common hacks. There are caveats, of course, and “really bold” claims.
Cryptographer and security technologist Bruce Schneier coined the term "security theater" in 2004. How has the term been appropriated since then—and is it ever appropriate? We asked Schneier.
A notorious cyberthief turned security consultant walks us through the “synthetic identity fraud” process, from searching the Dark Web to pulling credit reports to opening accounts.
It’s not just Be’ersheba’s interdisciplinary approach. Israel’s unique politics, geography, and economics have played major roles in its transformation into a cybersecurity power player.
At Cyber Week in Tel Aviv, Dr. Tony Bleetman recalls how he, his colleagues, and patients were forced to deal with the network- and computer-crippling ransomware attack that wreaked havoc on the British NHS.
Is the latest data-handling revelation driving you away from Facebook? Here’s how to remove yourself from the social network while keeping your valuable data (and friendships).
Security researchers at Recorded Future say China goes to great lengths to obscure truths in its software vulnerability disclosures, in part to conceal the inner-workings of its own cyberattacks.
Once inside a gas station’s connected management system, researchers say, hackers could manipulate fuel tanks or pumps, steal gas, hack security cameras, or skim payments.
Google’s dominant browser will now filter notoriously intrusive ad types. While enforcing Better Ad Standards doesn’t directly address security, experts say it’ll benefit the whole Web.
Chaos Communication Congress’ keynote speaker Charlie Stross sits down with The Parallax to discuss what drives dictatorships, space exploration, cryptography—and science fiction itself.
The new EU law, which comes with stiff penalties, is set to enforce consumer privacy standards exceeding those of the United States in several key ways.
We drill through 2017's cybersecurity news, from election hacks to rampant ransomware attacks, massive data breaches to decried surveillance overreaches, IoT manipulation to cryptocurrency mania causation.
As some lawmakers push for the extension of FISA Section 702, an expiring law that allows programs like Prism and Upstream, others push for new privacy protections.
The tech in Google’s Advanced Protection Program for high-profile targets is widely available. Here’s how to use a YubiKey to better resist account hacks.
Exploits for vulnerabilities in Wi-Fi, Microsoft Office, and encryption keys are making waves. One is called KRACK. Here’s what security experts say we should make of them.
Would a 'gun registry,' a national database of gun ownership help prevent mass shootings like the one in Las Vegas? Or would it violate privacy rights?
In the wake of the Equifax breaches, consumers should get real “control of their credentials,” one privacy expert argues. In the meantime, they can push for incremental changes.
While experts acknowledge that pacemaker hacks aren’t likely, the risk underscores a need for better communication among security researchers, doctors, the FDA, and medical-device manufacturers.
During their 75-minute Enigma Interviews talk, moderated by The Parallax, Alex Stamos of Facebook and Eva Galperin of EFF debated how online services should protect groups with varying vulnerabilities.
Boundaries between the physical and digital worlds are rapidly evaporating, especially with augmented reality. This raises a host of privacy and security threats, some of them familiar, others brand-new.
Because organizations running critical infrastructure, from power plants to hospitals, often hold off on system updates, they are more vulnerable to ransomware like WannaCry.
The 3-section order, which builds largely on initiatives the Obama administration set in motion, outlines federal guidance to “create more cohesion and consolidation between agencies.”
As regulation of Internet-connected devices inches forward, public officials and security experts disagree on how best to keep consumers safe without stifling industry innovation.
As tech vendors downplay the risk to consumers, security experts explain why the “Vault 7” tranche is “increasing the amount of cyberinsecurity in the world, not decreasing it.”
In a keynote speech at the ShmooCon hacker conference, computer security pioneer Gary McGraw relates seven quotes from the rock and literary icons to people working in his industry.
Bitcoin transactions are protected by a built-in “proof of work” system supported by economic incentives. Private record systems based on bitcoin’s public ledger need a similar setup, experts argue.
Experienced hackers are using the Dark Web to sell exploits, malware, and access to botnets or consumer data. Welcome to the latest hacker black-market twist: cybercrime as a service.
Avast CEO Vince Steckler shares his vision for how the two security software makers will combine efforts while staying separate. Confusion between them, he notes, “doesn’t matter anymore.”
Web ads are notoriously dangerous, and many see them as pollutants. JavaScript creator Brendan Eich is presenting his new browser as a viable solution for publishers, marketers, and consumers alike.
With “flexibility and freedom” comes “multifaceted” threats to consumer safety. Here’s how browser developers ranging from Google to Mozilla are approaching today’s challenges.
New models offer voice control, integrated cameras, and improved security sensors. They’re more capable and connected than ever. So what are their challenges?
A raft of new smartphones, computers, and Wi-Fi routers offers extra protection from snoopers. Naturally, a higher level of security comes at a higher cost. Here’s a rundown.
Add the Pentagon to the growing list of nontech organizations looking to improve their tech security by paying independent security researchers to hack them.
By deploying hundreds of Tor nodes, and mixing machine and human analysis, security company IntelliAgg is tracking and cataloging the Dark Web more accurately than ever.
A hacker equipped with a $15 dongle and 15 lines of code can exploit the vulnerability to connect to, spy on, and control a computer using it, a Bastille security researcher says.
Apple is defying a court order to circumvent its mobile encryption. The use of a cheap remote-management app—including Apple’s own MDM—could have rendered the issue moot.
Tech issues may be too complex—and too lacking of simple populist messages—to argue about on stage. But the candidates have their opinions. Here’s an overview.
They are questioning whether new privacy regulations specifically governing personal or commercial drone use are necessary and pushing instead to develop best practices.
Law enforcement wants access to encrypted communications. Creating so-called backdoors could bring with it unintended consequences, including threats to personal privacy.
Security researcher Marie Moe has a personal and potentially dangerous connection to the Internet: Following a medical emergency, Moe was outfitted with a pacemaker, in which she has discovered cybersecurity vulnerabilities, she reveals at hacker conference CCC.
Research presented for the first time at the Chaos Communication Congress in Hamburg, Germany, details new insight into the inner workings of China’s Internet censorship firewall.
Internet-connected toys are just as vulnerable to hacks as the rest of the Internet of Things. Experts worry that toymakers aren’t taking their claims seriously.
The Data Security and Breach Notification Act and the Data Security Act would pre-empt arguably stronger state laws and strip the FCC of authority over data security enforcement.
While Adobe Systems is making changes to better support HTML5, the animation standard isn’t about to replace its security hole-hampered software, as long predicted would happen.
Some lawmakers want social-media providers, ISPs, and other businesses to report suspected terrorist activity, but critics say additional requirements may be counterproductive.
The USA Freedom Act may have hampered the agency’s program for bulk collection of U.S. phone records, but “there are a lot of unknowns” about how it might be interpreted or sidestepped.
Makers of the Internet of Things devices say they’re now taking security seriously, but researchers say that’s just not true—and it’s going to be a while before it is.
The personalized "About me" page, closely resembling Google+, is the search giant’s latest shot at making privacy simple for users to understand and control.
Illinois ruling addresses several of privacy advocates’ issues with law enforcement agencies’ use of secretive “stingray” tracking technology to collect cell phone data.
Opponents of the cyberthreat information-sharing bill, designed to protect companies that share cyberattack data with federal agencies from customer lawsuits, face tough odds.
Some security and policy experts see the agreement as a potential model for new treaties—or, at the very least, a sign of progress. Others see a whole lot of problems.
Some legal experts embrace the idea of targeted police hacking as an alternative to potentially government-mandated encryption backdoors. Others call it a terrible idea.
A proposed law to make it easier for government agencies to share information also would allow businesses to deliver personal data to the NSA or FBI, critics contend.