Tech firms would like one privacy law to cover all U.S. communications—as long as it’s not as strict as the GDPR and also supersedes any pesky state regulations like the CCPA.
Biometric locks have the same function—albeit more secure and convenient—to a consumer as a PIN or passcode. But they don’t have the same legal protections under the 5th Amendment. Here’s why.
U.S. agencies, in recent years, have crafted plans that allow cybersecurity workers to remain on the job, even if there's a government shutdown.
The new EU law, which comes with stiff penalties, is set to enforce consumer privacy standards exceeding those of the United States in several key ways.
As some lawmakers push for the extension of FISA Section 702, an expiring law that allows programs like Prism and Upstream, others push for new privacy protections.
A recent Intelligence Squared podcast event set up to debate whether companies have the right to shield customer data from government agencies dives headlong into talk about encryption.
As proposed, the act sounds like it could protect consumers while allowing businesses to thrive. But it risks becoming an IoT industry rubber stamp.
The notorious Internet entrepreneur’s previewed service is poised to enable storage of encrypted media and Bitcoin payments. But how can Dotcom launch a relevant service when his assets are frozen, and he's under indictment?
In the wake of stunted recounts in three closely contested states, security researchers argue that to ward off hacker manipulation of elections, municipalities must maintain and audit paper ballots.
Questions regarding the veracity and transparency of evidence lie at the center of the debate over whether to trust government accusations of culpability for cyberattacks and computer hacking.
Responding to a court order, Yahoo reportedly made custom software to scan billions of emails for terrorist ties. Beyond constitutionality, the legality of compulsory tool development remains an open question.
Empower the individual. Keep private information private. Make the complex simple. And detect an intruder in milliseconds. McAfee and hacker Eijah say these ideas are driving their new business.
“No. 1: Fire or massively retrain every employee in the U.S. government responsible for implementing cybersecurity,” advises the software entrepreneur, a former presidential candidate.
Counterterrorism expert John D. Cohen tells The Parallax that to tackle terrorists’ effective Internet recruitment efforts, we need to first understand the underlying issues.
Itzhak “Zuk” Avraham, founder of Zimperium, has been confident that his Israeli colleagues at Cellebrite would successfully help the FBI unlock the iPhone 5C of Syed Farook. Here’s why.
To any software engineer with an imagination, the resulting possibilities are horrifying. A favorable precedent would let the government turn us into unwilling surveillance assistants.
In the 30 years since President Reagan signed the Computer Fraud and Abuse Act into law, it’s been the subject of heated controversy and undergone many alterations. What’s next?
Tech issues may be too complex—and too lacking of simple populist messages—to argue about on stage. But the candidates have their opinions. Here’s an overview.
Privacy advocates split on how to proceed, after the controversial cybersecurity law gets tacked on to a massive government spending bill.
Some lawmakers want social-media providers, ISPs, and other businesses to report suspected terrorist activity, but critics say additional requirements may be counterproductive.
The documentary, of two filmmakers who traveled to Tibet before the 2008 Olympics, shows how China uses technology to control information and people far beyond its borders.
The political establishment and the tech industry aren’t clashing for the first or last time over the government’s proper role in safeguarding privacy and cybersecurity.
Some security and policy experts see the agreement as a potential model for new treaties—or, at the very least, a sign of progress. Others see a whole lot of problems.
A proposed law to make it easier for government agencies to share information also would allow businesses to deliver personal data to the NSA or FBI, critics contend.