As companies try to balance the need to be transparent with outside researchers while protecting their own sensitive business information, the often opaque bug valuation process can be controversial.
Don't understand encryption or the policy debates around it? Let us walk you through the basics.
The encryption issue has become indelibly linked to the broader debate in Europe, the US, and South America over how to balance individual liberties with matters of national security and law enforcement.
Can aggressive espionage fuel the innovation that Beijing needs to reinvent its global role?
Following basic security measures, like leaving extra devices at home and avoiding public Wi-Fi, could be enough to protect your information while you're traveling.
Almost a year after a historic deal between Beijing and Washington to curtail cyberespionage, reports indicate digital attacks from China are fewer but more sophisticated.
The Identity pad – a project to create artificial and reusable fingerprints – addresses the security and privacy risks associated with the growing use of biometric technology.
The Home Depot and Walmart are suing MasterCard and Visa in separate lawsuits over what the retailers claim is lax security on chip-enabled card readers that puts consumers at risk of fraud.
The tech giant has suggested a set of rules that include proactive security disclosures and establishing global regimes to stop the spread of digital weapons.
US diplomats are trying to revise how a global arms pact known as the Wassenaar Agreement applies to digital weapons. Despite misgivings from the tech sector, there’s an opportunity for Washington to help forge a deal that keeps hacking tools out of the wrong hands.
After the Senate beat back a proposal to expand FBI surveillance powers in the wake of the Orlando shooting, the Oregon Democrat told Passcode 'the public is picking up that you don’t fight terror by eroding our freedoms for policies that don’t leave them safer.'
A change to federal criminal procedure would allow judges to approve searches on computers outside their jurisdiction, a move that could have vast 'unintended consequences' for innocent people, civil liberties groups say.
A report indicates that Chinese cyberattacks on US companies are declining. But other experts say hackers are simply changing tack.
Rob Lee, cofounder of cybersecurity company Dragos Security, who personally investigated the Ukraine hack, downplays the imminent risk of a major, isolated attack on the US power grid.
Can you hack a Gibson? Are you interested in SETEC Astronomy? Shall we play a game?
Innovative biometric technology that relies on human traits as security measures is the answer to beating back threats from malicious hackers.
Tech companies and privacy advocates are strongly opposed to proposals by the FBI and others to mandate government access to encrypted communications. But one expert says there may be another way to solve the feud.
For the first time, a foreign national pleaded guilty to committing computer crimes in support of the terrorists' aims at a time when the US government is increasing efforts to confront the group online.
Experts say both hacker crews have been spying on Western military and political targets for years, but only recently tied them to Russian intelligence agencies.
At its annual developer conference in San Francisco this week, privacy-enhancing technologies underpin many of the software updates that Apple announced to its operating systems.
Security researchers are developing new tools for consumers to protect themselves against the scourge of malware designed to encrypt files until victims pay fees.
HBO's John Oliver shined a light on tricky debt collection practices. How agencies often mishandle debtors' sensitive personal information – and the lax standards for how this information should be treated – is equally troubling.
No one is completely safe from identity thieves. I should know since I was a victim. But here's how to better protect yourself against scammers, and how to lessen the damage of identity fraud.