After the Senate Judiciary Committee pushes the EARN IT Act closer to ratification, privacy advocates fear it and the LAED Act could gut online encryption.
So far, government-mandated Internet shutdowns have yet to mar Black Lives Matter protests. But they do occur far more regularly than you might expect.
Besides putting people’s lives at risk, Trump’s promotion of anti-malarials for Covid-19 patients could pave the way for a coordinated disinformation campaign to take root, experts say.
At Chaos Communication Congress, election security expert J. Alex Halderman describes the United States’ rough yet vital road toward securing its many vulnerable voting systems.
Google CEO Sundar Pichai’s first congressional hearing—a milestone he probably wished he could have postponed for a few more years—did not lack drama. As he de... Read More...
At the Web Summit, CrowdStrike CEO George Kurtz shares his sharp perspectives on political-hacking topics ranging from chatbot-seeking AI to security-inept campaign volunteers.
Tech firms would like one privacy law to cover all U.S. communications—as long as it’s not as strict as the GDPR and also supersedes any pesky state regulations like the CCPA.
Without regulatory pressure to enforce a federal health care cybersecurity task force’s recommendations, involved experts acknowledge, industry progress will remain slow.
It’s not just Be’ersheba’s interdisciplinary approach. Israel’s unique politics, geography, and economics have played major roles in its transformation into a cybersecurity power player.
“A CERT is like FEMA for cyber,” one expert says. Post-WannaCry, Israel is following the Netherlands, England, and Norway in creating a health care CERT.
Biometric locks have the same function—albeit more secure and convenient—to a consumer as a PIN or passcode. But they don’t have the same legal protections under the 5th Amendment. Here’s why.
Two decades after presenting at the Senate’s first cybersecurity hearing, veteran L0pht hackers Kingpin, Mudge, Weld Pond, and Space Rogue reflect on progress and urge for much more.
The so-called Cloud Act would allow U.S. law enforcement agencies to obtain customer data stored on foreign servers—in many cases with a subpoena rather than a warrant.
Some privacy advocates say it calls for a resurrected debate over FISA practices. But Nunes himself is a steadfast surveillance supporter of the existing process.
Georgia Senate Bill 315 includes vague language reflective of the CFAA antihacking law that experts and advocates fear would be used to unfairly punish security researchers.
As some lawmakers push for the extension of FISA Section 702, an expiring law that allows programs like Prism and Upstream, others push for new privacy protections.
Privacy and online-rights advocates say Spain’s recent heavy-handed Internet control is unprecedented for a Western democracy—and it could return with this week’s snap election.
The vast majority of anti-Net neutrality public comments made to the FCC were sent from stolen email addresses, according to study results. And the implications are serious.
Dismantling FCC Open Internet rules might allow ISPs to mess with privacy and security. But doing so today simply wouldn’t be practical or even profitable, Rob Graham argues.
Eliminating Net neutrality laws would likely make online privacy more expensive, attorney Ryan E. Long argues. But CALE requirements have already handicapped them.
The USA Liberty Act, designed to revamp and reauthorize FISA Section 702, would still allow the FBI and other agencies to query the NSA database of U.S. communications sans warrant.
While a passed House bill doesn’t directly address autonomous-vehicle hacking dangers, some experts maintain that broad regulatory language is better for rapidly developing technology.
After President Trump fires James Comey, a leading U.S. backer of encryption backdoor mandates, officials in Europe and Australia renew arguments for the “technically infeasible.”
During a fireside chat in Las Vegas, Reps. Will Hurd of Texas and Jim Langevin of Rhode Island plead for proactive hacker-lawmaker collaboration and voice concerns about election security.
The longtime world chess champion and Putin foe, now a human rights activist, says we should be fostering a deepening human-computer partnership rather than trying to fight the inevitable.
The social-networking giant’s chief security officer sounds off on why and how political campaigns should work together to fight attacks on their critical infrastructure and information.
The 3-section order, which builds largely on initiatives the Obama administration set in motion, outlines federal guidance to “create more cohesion and consolidation between agencies.”
As regulation of Internet-connected devices inches forward, public officials and security experts disagree on how best to keep consumers safe without stifling industry innovation.
Attributing cyberattacks to specific people or organizations is far from an exact science. And a misattribution today runs a high risk of increasing military tensions.
Revision proposals for the international agreement to control weapons exports aim to address language that could have severe consequences for security researchers.
Granick, the director of civil liberties at Stanford Law School and recent author of “American Spies,” sounds off on the nature, effectiveness, and justness of U.S. surveillance today.
Trump’s travel ban accompanied increased scrutiny of travelers’ electronic devices and social-media activity. Here are a few steps you can take to minimize your exposure at country borders.
As the new president establishes his cabinet, and issues (and holds back on) security-focused executive orders, questions abound about his cybersecurity intentions—and how he might follow through on them.
After a presidential election marked by hacks and leaks and claims of “bleak” urban streets, those of the nation’s capital were filled—quite literally—with anger and worry. And hope.
Information “starvation” under closed regimes prevents informed decision making. A flood of disinformation has similarly harmful effects, Garry Kasparov argues. And the antidote isn’t easy to swallow.
In the wake of stunted recounts in three closely contested states, security researchers argue that to ward off hacker manipulation of elections, municipalities must maintain and audit paper ballots.
Email is the most important communication means for garnering campaign awareness, funds, and participation. Here’s how campaign data scientists and marketers are using it to entice you.
Empower the individual. Keep private information private. Make the complex simple. And detect an intruder in milliseconds. McAfee and hacker Eijah say these ideas are driving their new business.
“No. 1: Fire or massively retrain every employee in the U.S. government responsible for implementing cybersecurity,” advises the software entrepreneur, a former presidential candidate.
Properly protected vote databases are tough to hack, security experts say. But in places lacking up-to-date software, proper IT training, or a paper trail, hackers have an advantage.
From a plea for an “NIH for cyber” to a plan for “software supply chain transparency,” Black Hat and DefCon insiders say it’s time for the U.S. government to ensure software safety.
Counterterrorism expert John D. Cohen tells The Parallax that to tackle terrorists’ effective Internet recruitment efforts, we need to first understand the underlying issues.
The “notoriously inaccurate” tech has spread from government databases to popular apps. And although it’s improving (and spreading) constantly, it’s not ready for prime time, privacy advocates say.
As you install any app, be cautious about the data you share with its publishers and might expose to eavesdroppers. Here’s what to look out for this election season and beyond.
To any software engineer with an imagination, the resulting possibilities are horrifying. A favorable precedent would let the government turn us into unwilling surveillance assistants.
In the 30 years since President Reagan signed the Computer Fraud and Abuse Act into law, it’s been the subject of heated controversy and undergone many alterations. What’s next?
Tech issues may be too complex—and too lacking of simple populist messages—to argue about on stage. But the candidates have their opinions. Here’s an overview.
The Data Security and Breach Notification Act and the Data Security Act would pre-empt arguably stronger state laws and strip the FCC of authority over data security enforcement.
Some lawmakers want social-media providers, ISPs, and other businesses to report suspected terrorist activity, but critics say additional requirements may be counterproductive.
The USA Freedom Act may have hampered the agency’s program for bulk collection of U.S. phone records, but “there are a lot of unknowns” about how it might be interpreted or sidestepped.
While several tech titans require warrants to give police and prosecutors access to customers’ older stored communications, countless Internet companies with fewer legal resources likely are complying with agency-issued subpoenas.
What’s a bigger threat: government surveillance or data collection? The Parallax asks representatives of three prominent groups to explain (or refute) some of consumers’ biggest privacy concerns.
The political establishment and the tech industry aren’t clashing for the first or last time over the government’s proper role in safeguarding privacy and cybersecurity.
Opponents of the cyberthreat information-sharing bill, designed to protect companies that share cyberattack data with federal agencies from customer lawsuits, face tough odds.
Some security and policy experts see the agreement as a potential model for new treaties—or, at the very least, a sign of progress. Others see a whole lot of problems.
A proposed law to make it easier for government agencies to share information also would allow businesses to deliver personal data to the NSA or FBI, critics contend.