Modern field guide to security and privacy


  • A more connected military means new battlefield glitches, too

    With its $52 million initiative to vastly expand connectivity and technology on the front lines, the US Army knows it may also give enemies new digital targets to hack or manipulate. Is it up for the challenge? 

  • 15 under 15: Rising stars in cybersecurity

    The Christian Science Monitor's Passcode traveled across the country to meet these hacker kids who are hunting software bugs, protecting school networks, and helping to safeguard electrical grids.

  • How US and Iraqi forces plan to stop Islamic State drones

    As the Islamic State begins deploying off-the-shelf drones to surveil or attack Iraqi and western forces, defense companies race to find a technical solution. 

  • Passcode Voices Opinion: It's time for us geeks to stand up and be heard

    Too often computer scientists are left out of public debates about computer science.

  • Podcast: How to hack the Pentagon

    The Cybersecurity Podcast crew interviews Chris Lynch, the director of the Defense Digital Service, and Lisa Wiswell, the group’s digital security lead, about the Pentagon's bug bounty programs. 

  • Passcode at SXSW: Ad blockers, spies, hackers, and Hollywood

    From biometric tracking to smart cities to hackers on film, bookmark our four panels on digital security and privacy at this year's South by Southwest festival in Austin. 

  • Hunting for evidence, Secret Service unlocks phone data with force or finesse

    At a dedicated phone forensics facility in Tulsa, Okla., the Secret Service breaks into about 40 phones a year that could contain valuable information related to criminal investigations.

  • Can cybersecurity boot camps fill the workforce gap?

    A startup in Denver and an initiative in Chicago are using cybersecurity boot camps to quickly prepare workers to fend off digital attacks. 

  • Are software updates key to stopping criminal car hacks?

    Security researchers at New York University have developed a system that aims provide secure software updates for computerized vehicles.

  • Fake or for real? An app exposes forgeries

    Israeli researchers have developed a method for authenticating handwritten signatures using sensors in smartwatches and fitness trackers.

  • How smartphones could prevent drunk driving

    Israeli researchers have developed a method that accurately gauges sobriety using smartphones, smartwatches, and fitness trackers. While the technology may push the bounds of digital privacy, it could also save lives.

  • Passcode Voices Opinion: Cybersecurity needs an offensive playbook

    In order to beat malicious hackers, the cybersecurity community must develop innovative approaches for deploying – and automating – offensive strategies to find and fix software vulnerabilities.  

  • Podcast: What it takes to succeed in the cybersecurity business

    This episode of the Cybersecurity Podcast features Sunil James, a Silicon Valley venture capitalist who invests in information security companies for Bessemer Venture Partners. 

  • If hackers cause a blackout, what happens next?

    An effort is underway to map potential fallout from damaging cyberattacks on US critical infrastructure to aid first responders in the case of a major assault.

  • Video: More kids are becoming 'white hat' hackers

    One striking theme from Passcode's profile of 15 hackers under 15 years old: The kids all had a strong sense of ethics – and a desire to create a safer digital future for their peers – rather than create chaos online for pranks. 

  • Passcode Voices Opinion: How to fix an internet of broken things

    The recent cyberattack that crippled much of the web last week took advantage of vulnerabilities in home products connected to the internet. Fixing those flaws is possible but it requires public action and industry cooperation.  

  • In cybersecurity contest, hackers target critical infrastructure

    At the inaugural Passcode Cup capture the flag challenge, competitors raced through hacking challenges that ranged from password-cracking to compromising a mock water treatment facility.

  • The technologist convincing the Pentagon to love hackers

    Lisa Wiswell was the driving force behind the Defense Department's first-ever bug bounty program, which rewarded outside security researchers for finding vulnerabilities in its websites. Now, the Pentagon is expanding the effort.

  • Passcode Voices Opinion: The real cost of election insecurity

    Voter trust is on the line unless the US increases cybersecurity at the polls.

  • As self-driving cars hit the road, cybersecurity takes a back seat

    While consumers and industry experts worry about cybersecurity in autonomous vehicles, government regulators are still struggling to respond to digital risks in driverless cars.

Load More