Passcode caught up with some of the kids at r00tz Asylum to get their advice: What's the first step other kids – or anyone, really – should take if they want to be a hacker?
DARPA staged the world's first live computer-versus-computer hacking competition in which teams battled for a multimillion dollar purse in front of thousands of cheering fans in Las Vegas.
Cybersecurity researcher Marc Rogers is the principal hacking consultant on the hit TV show "Mr. Robot," which debuts its second season on the USA Network Wednesday.
Artist and researcher Adam Harvey has set out to raise awareness about the increasing pervasiveness of biometric tracking on the web and in everyday life.
As companies try to balance the need to be transparent with outside researchers while protecting their own sensitive business information, the often opaque bug valuation process can be controversial.
An unprecedented and alarming attack on the internet's core infrastructure shutdown much of the web Friday in another sign of the growing sophistication of malicious cyberattacks.
Lisa Wiswell was the driving force behind the Defense Department's first-ever bug bounty program, which rewarded outside security researchers for finding vulnerabilities in its websites. Now, the Pentagon is expanding the effort.
At an Atlantic Council event Wednesday, experts warned about myriad technical vulnerabilities at the polls but said a hack that could change the outcome of the presidential election was nearly impossible.
Voter trust is on the line unless the US increases cybersecurity at the polls.
More than 40 rights groups asked the Department of Justice to launch a probe examining whether systems used by police to investigate crimes disproportionately identify blacks as criminal suspects.
The US intelligence community still appears to be violating Americans' privacy with domestic spying operations. But to reform these actions, Congress first needs to know how spies really operate.
Can you hack a Gibson? Are you interested in SETEC Astronomy? Shall we play a game?
The Obama administration is planning to respond to Russia's suspected cyberattacks on US political organizations. What are its options?
News that Yahoo and Apple collect information that can assist with government surveillance highlights a privacy tug-of-war between tech firms and law enforcement.
The tech advocacy group Fight for the Future is calling on Yahoo users to delete accounts after reports alleged the company let US officials scan millions of emails.
While consumers and industry experts worry about cybersecurity in autonomous vehicles, government regulators are still struggling to respond to digital risks in driverless cars.
Consumers have many questions about safety, cybersecurity, and privacy in the coming fleets of autonomous vehicles. And they want a say in shaping the future of transportation.
On this episode of The Cybersecurity Podcast, New America's Peter Singer and Passcode's Sara Sorcher interview Thomas Rid, a war studies professor at King's College, about his new book, "Rise of the Machines: A Cybernetic History."
During the last two presidential debates, Donald Trump cast doubt on US claims that Russia carried out cyberattacks on political organizations. But without clear evidence from the government, how can the public really be sure it was Moscow?
Now that the Homeland Security and the Office of the Director of National Intelligence officially accused the Russian government of conducting cyberattacks on US political targets, will the administration retaliate?