The growth of black hate groups has increased by nearly 60 percent in less than a year.
The space-based navigation and timing system faces a growing risk of attack. But there is a simple solution.
The State Department aims to renegotiate an international pact designed to limit exports of surveillance software – bowing to pressure from Obama administration officials and cybersecurity experts.
Two Congressional lawmakers want Susan Rice to get involved in a dispute between the State Department and industry officials over proposed export rules for technology that could be used for malicious purposes.
Boston University researchers discovered vulnerabilities in the ubiquitous computing protocol that keeps time synched across networks, opening up critical operations such as air traffic control to attacks.
Apple was plagued by trojan-type malware until it launched Gatekeeper in 2012. It seemed to stem the tide. But new research from the firm Synack shows that it’s relatively simple to skirt Gatekeeper.
As the European Union invites comments on many of its export regulations, Dutch Member of European Parliament Marietje Schaake wants to change surveillance software trading rules many critics say are too onerous. But some security experts say those changes do not go far enough.
How a 20-year-old, mostly inaccurate flop predicted the future, reshaped sci-fi, and won over the real hacker community.
The project known as 'Alibi routing' is a promising development for activists, journalists, or anyone else who has a vested interest in protecting sensitive information from prying eyes.
The decade-old Underhanded C competition rewards contestants who can camouflage the most malicious software vulnerability. And it’s meant to make all software more secure.
Security professionals have long overlooked Border Gateway Protocol, one of the most insecure parts of Internet infrastructure. But this year it was the subject of three talks at the Black Hat security conference in Las Vegas.
Security researcher Colby Moore plans to demonstrate this week at the Black Hat security conference how to intercept and even fake location-tracking satellite signals. The vulnerability could give thieves new ways to steal valuable cargo.
At a conference famous for its hackers, one of the most popular events requires no technical skill whatsoever. Rather than breaking into computers, contestants try to trick companies' well-meaning employees to give out valuable information.
In advance of his presentation at the Def Con conference in Las Vegas, Passcode spoke with Schrenk about the insider information he's paid to glean from the open Internet – and how companies can better protect themselves from having their inside plans exposed or used against them by competitors.
The life and uncertain future of Adobe’s troubled Flash Player.
Export restrictions classifying certain cybersecurity technology as arms caused industry outrage.
Instead of the Commerce Department plan to limit the export of surveillance technology, many industry professionals and experts want entirely new proposals.
Massachusetts Institute of Technology researchers presented a system to detect bugs in programs as they run and repair them by borrowing functionality from other applications.
FBI Director James Comey testified on Capitol Hill that tech companies should find a way for government investigators to access data that is encrypted on consumer devices.
A Department of Commerce proposal that aims to keep surveillance software out of the hands of repressive regimes may inadvertently harm the security industry and chill security research efforts.
Enjoy a thoughtful evening read.
Enjoy a longer, more in-depth read.
Less noise. More insight.