What if someone threw a hacker conference, and nobody showed up?As I boarded a United flight at SFO on March 17, the first day of San Francisco’... Read More...
EVRY’s Monica Verma charts her path from curious kid to hacker to CISO. Improving cybersecurity, she writes, means treating it as an investment rather than a brake on innovation.
Earlier this week, Marcus Hutchins, the man who helped stop the WannaCry global ransomware attack, admitted in court to developing the Kronos banking malware as... Read More...
Consumers have long adopted military terms to describe their many civilian challenges. They can also use military tactics to tackle those challenges. Here is a sampling of each.
Biometric locks have the same function—albeit more secure and convenient—to a consumer as a PIN or passcode. But they don’t have the same legal protections under the 5th Amendment. Here’s why.
To address the great talent dearth in good cyberthreat analysts, hiring managers need to move the focus of their searches from technical skills to less teachable soft skills, Simone Petrella writes.
The next self-driving car death easily could result from a hack. If companies investing in the technology aren’t prioritizing cybersecurity, they aren’t prioritizing safety—or their business.
Adrián Lamo followed his conscience turning in Chelsea Manning and paid a terrible personal cost. Jonathan Hirshon remembers the humanity of the “homeless hacker,” a longtime friend.
The punishment for allowing a breach is usually a light slap on the wrist, if anything. And in the case of credit-reporting agencies, the standard punishment can even turn into profit. It's time to hold companies accountable for breaches.
Is there a viable platform model that monetizes data and also meets data autonomy standards? Columnist Nathan Parker writes about the approach he’s taking with MakerNet.
Barlow, the recently departed Grateful Dead lyricist and EFF co-founder, motivated Internet usage protections from abuses of government—but not corporations.
In order to reduce damage, security teams need to change their approach to vulnerability assessment, Bryson Bort writes. This starts with recognizing that nobody is safe from a cybersecurity threat.
Dismantling FCC Open Internet rules might allow ISPs to mess with privacy and security. But doing so today simply wouldn’t be practical or even profitable, Rob Graham argues.
Eliminating Net neutrality laws would likely make online privacy more expensive, attorney Ryan E. Long argues. But CALE requirements have already handicapped them.
Good security relies on trust, which doesn’t scale well. So writes Internet pioneer Paul Vixie, as he reflects on the indictment of the man who stopped WannaCry on charges related to Kronos.
A recent Intelligence Squared podcast event set up to debate whether companies have the right to shield customer data from government agencies dives headlong into talk about encryption.
As proposed, the act sounds like it could protect consumers while allowing businesses to thrive. But it risks becoming an IoT industry rubber stamp.
Our vital systems and seemingly frivolous daily communications are in need of technological scrutiny. And yet we often fail to see ourselves as targets and take action.
Is there a difference between computer security in your home versus in a small business? Absolutely, says the founder of Townsquared. But it’s not as big as you might think.
The notorious Internet entrepreneur’s previewed service is poised to enable storage of encrypted media and Bitcoin payments. But how can Dotcom launch a relevant service when his assets are frozen, and he's under indictment?
During World War II, the U.S. Office of War Information launched a “Loose Lips Sink Ships” campaign to reduce the chance that someone might inadvertently give u... Read More...
Tools developed to create, acquire, and distribute data can also be used to gain influence, monitor, and persecute. These uses are two sides of the same coin.
Far beyond Yahoo's services, it’s time to delete your archived email, private messages, contacts, files, photos—anything you can’t afford to find its way into a hacker’s hands and beyond.
Responding to a court order, Yahoo reportedly made custom software to scan billions of emails for terrorist ties. Beyond constitutionality, the legality of compulsory tool development remains an open question.
Data mining is increasingly effective and relevant to brands. But to customers and marketers alike, there are real dangers to consider.
To any software engineer with an imagination, the resulting possibilities are horrifying. A favorable precedent would let the government turn us into unwilling surveillance assistants.
Even in assured defeat, competing in chess against the longstanding top player in the world is a privilege. It is also an experience in learning the value of adaptability.
With customers worldwide who would be negatively impacted by weakened encryption, Silicon Valley has an obvious interest in uniting together against a very dumb idea.
The documentary, of two filmmakers who traveled to Tibet before the 2008 Olympics, shows how China uses technology to control information and people far beyond its borders.
The political establishment and the tech industry aren’t clashing for the first or last time over the government’s proper role in safeguarding privacy and cybersecurity.
No more articles