Besides putting people’s lives at risk, Trump’s promotion of anti-malarials for Covid-19 patients could pave the way for a coordinated disinformation campaign to take root, experts say.
At Chaos Communication Congress, election security expert J. Alex Halderman describes the United States’ rough yet vital road toward securing its many vulnerable voting systems.
Google CEO Sundar Pichai’s first congressional hearing—a milestone he probably wished he could have postponed for a few more years—did not lack drama. As he de... Read More...
At the Web Summit, CrowdStrike CEO George Kurtz shares his sharp perspectives on political-hacking topics ranging from chatbot-seeking AI to security-inept campaign volunteers.
Tech firms would like one privacy law to cover all U.S. communications—as long as it’s not as strict as the GDPR and also supersedes any pesky state regulations like the CCPA.
Without regulatory pressure to enforce a federal health care cybersecurity task force’s recommendations, involved experts acknowledge, industry progress will remain slow.
It’s not just Be’ersheba’s interdisciplinary approach. Israel’s unique politics, geography, and economics have played major roles in its transformation into a cybersecurity power player.
“A CERT is like FEMA for cyber,” one expert says. Post-WannaCry, Israel is following the Netherlands, England, and Norway in creating a health care CERT.
Biometric locks have the same function—albeit more secure and convenient—to a consumer as a PIN or passcode. But they don’t have the same legal protections under the 5th Amendment. Here’s why.
Two decades after presenting at the Senate’s first cybersecurity hearing, veteran L0pht hackers Kingpin, Mudge, Weld Pond, and Space Rogue reflect on progress and urge for much more.
The so-called Cloud Act would allow U.S. law enforcement agencies to obtain customer data stored on foreign servers—in many cases with a subpoena rather than a warrant.
Some privacy advocates say it calls for a resurrected debate over FISA practices. But Nunes himself is a steadfast surveillance supporter of the existing process.
Georgia Senate Bill 315 includes vague language reflective of the CFAA antihacking law that experts and advocates fear would be used to unfairly punish security researchers.
As some lawmakers push for the extension of FISA Section 702, an expiring law that allows programs like Prism and Upstream, others push for new privacy protections.
Privacy and online-rights advocates say Spain’s recent heavy-handed Internet control is unprecedented for a Western democracy—and it could return with this week’s snap election.
The vast majority of anti-Net neutrality public comments made to the FCC were sent from stolen email addresses, according to study results. And the implications are serious.
Dismantling FCC Open Internet rules might allow ISPs to mess with privacy and security. But doing so today simply wouldn’t be practical or even profitable, Rob Graham argues.
Eliminating Net neutrality laws would likely make online privacy more expensive, attorney Ryan E. Long argues. But CALE requirements have already handicapped them.
While a passed House bill doesn’t directly address autonomous-vehicle hacking dangers, some experts maintain that broad regulatory language is better for rapidly developing technology.
Since Congress repealed the FCC’s rules, ISPs have no federal privacy regulations.
After President Trump fires James Comey, a leading U.S. backer of encryption backdoor mandates, officials in Europe and Australia renew arguments for the “technically infeasible.”
The longtime world chess champion and Putin foe, now a human rights activist, says we should be fostering a deepening human-computer partnership rather than trying to fight the inevitable.
The social-networking giant’s chief security officer sounds off on why and how political campaigns should work together to fight attacks on their critical infrastructure and information.
As proposed, the act sounds like it could protect consumers while allowing businesses to thrive. But it risks becoming an IoT industry rubber stamp.
The 3-section order, which builds largely on initiatives the Obama administration set in motion, outlines federal guidance to “create more cohesion and consolidation between agencies.”
Revision proposals for the international agreement to control weapons exports aim to address language that could have severe consequences for security researchers.
Granick, the director of civil liberties at Stanford Law School and recent author of “American Spies,” sounds off on the nature, effectiveness, and justness of U.S. surveillance today.
Trump’s travel ban accompanied increased scrutiny of travelers’ electronic devices and social-media activity. Here are a few steps you can take to minimize your exposure at country borders.
After a presidential election marked by hacks and leaks and claims of “bleak” urban streets, those of the nation’s capital were filled—quite literally—with anger and worry. And hope.
In the wake of stunted recounts in three closely contested states, security researchers argue that to ward off hacker manipulation of elections, municipalities must maintain and audit paper ballots.
Empower the individual. Keep private information private. Make the complex simple. And detect an intruder in milliseconds. McAfee and hacker Eijah say these ideas are driving their new business.
“No. 1: Fire or massively retrain every employee in the U.S. government responsible for implementing cybersecurity,” advises the software entrepreneur, a former presidential candidate.
From a plea for an “NIH for cyber” to a plan for “software supply chain transparency,” Black Hat and DefCon insiders say it’s time for the U.S. government to ensure software safety.
Did the Republican nominee for U.S. president just encourage hackers in Russia to break into his opponent’s private email server? Here’s how several experts interpreted his comments.
Counterterrorism expert John D. Cohen tells The Parallax that to tackle terrorists’ effective Internet recruitment efforts, we need to first understand the underlying issues.
As you install any app, be cautious about the data you share with its publishers and might expose to eavesdroppers. Here’s what to look out for this election season and beyond.
To any software engineer with an imagination, the resulting possibilities are horrifying. A favorable precedent would let the government turn us into unwilling surveillance assistants.
In the 30 years since President Reagan signed the Computer Fraud and Abuse Act into law, it’s been the subject of heated controversy and undergone many alterations. What’s next?
Tech issues may be too complex—and too lacking of simple populist messages—to argue about on stage. But the candidates have their opinions. Here’s an overview.
Tech companies could offer alternatives to end-to-end encryption, but it would make their users less safe, privacy advocates say.
The Data Security and Breach Notification Act and the Data Security Act would pre-empt arguably stronger state laws and strip the FCC of authority over data security enforcement.
Privacy advocates split on how to proceed, after the controversial cybersecurity law gets tacked on to a massive government spending bill.
Some lawmakers want social-media providers, ISPs, and other businesses to report suspected terrorist activity, but critics say additional requirements may be counterproductive.
While several tech titans require warrants to give police and prosecutors access to customers’ older stored communications, countless Internet companies with fewer legal resources likely are complying with agency-issued subpoenas.
What’s a bigger threat: government surveillance or data collection? The Parallax asks representatives of three prominent groups to explain (or refute) some of consumers’ biggest privacy concerns.
The political establishment and the tech industry aren’t clashing for the first or last time over the government’s proper role in safeguarding privacy and cybersecurity.
Some security and policy experts see the agreement as a potential model for new treaties—or, at the very least, a sign of progress. Others see a whole lot of problems.
A proposed law to make it easier for government agencies to share information also would allow businesses to deliver personal data to the NSA or FBI, critics contend.