This journalism empowers people to understand the bigger picture of cybersecurity as it connects to some of the most personal parts of their lives: their job, their education, the evolving digital culture around them, and the technology they use on a day-to-day basis. As part of the Monitor’s overarching commitment to chronicling human progress, we see these very human issues within cybersecurity to be critical and overlooked parts of the conversation.
This initiative is generously supported by
So-called 'bug bounty' programs, which pay ethical hackers anywhere in the world for reporting security flaws, are the ticket for one Indian security researcher to study in the US.
Designers, artists, and students around the world are creating accessories and clothing meant to hide wearers' identities from mass surveillance.
The federal government is finally beginning to embrace hackers, but it should do more put their talents to work fixing the nation's cybersecurity. Their help is sorely needed.
A young New Yorker started her own business to sell secure passwords.
A startup in Denver and an initiative in Chicago are using cybersecurity boot camps to quickly prepare workers to fend off digital attacks.
The scope of the breach is a harsh reminder how everyone on the web needs to be vigilant about protecting their data in an era of widespread criminal and government hacking.
What are the tools and tricks of internet tracking in the home, and why building a domestic surveillance state is worth it for one family.
An exemption to the Digital Millennium Copyright Act allows hackers to conduct good will research into medical devices, automobiles, and other internet-connected devices without threat of lawsuits from manufacturers.
Kryptina is one of the world's youngest users of the digital currency bitcoin. Her dad gives her a bitcoin allowance as a lesson in online security and money management.
DEF CON staffers, presenters, and contest winners also walk around with skull-shaped electronic badges that set them apart from other attendees. “Here, the more badges you have, the better you do socially,” Puddin said. “You don’t have to prove yourself by wearing a black T-shirt because you have the badges."
After the Yahoo breach exposed personal data about 500 million users, many people are looking for ways to protect themselves online. That's where password managers come in.
After an unprecedented online assault took down cybersecurity journalist Brian Krebs's influential cybersecurity blog, he was able to return to the web because of a new service that protects journalists and activists from online censorship.
Travis Goodspeed, an independent cybersecurity researcher, says tinkering leads to better cybersecurity.
If you've plugged in an eavesdropping personal assistants such as the Amazon Echo Dot, are you obligated to warn visitors, 'Be careful what you say, Alexa is listening'?
Cybersecurity experts say a White House plan to bolster numbers of professionals working to safeguard federal networks doesn't go far enough.
DARPA staged the world's first live computer-versus-computer hacking competition in which teams battled for a multimillion dollar purse in front of thousands of cheering fans in Las Vegas.
To boost the number of women in technology, first we need to treat girls interested in tech as normal, and stop forcing them to make a false choice between girliness and geekdom.
The Pentagon's research wing this week will stage an unprecedented digital battle in Las Vegas in which machines will attempt to autonomously find and fix computer security flaws.
The 18-year-old who just graduated high school was one of the youngest hackers participating in the Pentagon's bug bounty program to root out security flaws in military websites.
Following basic security measures, like leaving extra devices at home and avoiding public Wi-Fi, could be enough to protect your information while you're traveling.