As the Islamic State begins deploying off-the-shelf drones to surveil or attack Iraqi and western forces, defense companies race to find a technical solution.
From biometric tracking to smart cities to hackers on film, bookmark our four panels on digital security and privacy at this year's South by Southwest festival in Austin.
The US should retaliate more strongly against Russia for its digital attacks on American political organizations, more than three-quarters of Passcode’s Influencers said.
A young New Yorker started her own business to sell secure passwords.
With its $52 million initiative to vastly expand connectivity and technology on the front lines, the US Army knows it may also give enemies new digital targets to hack or manipulate. Is it up for the challenge?
In an age of hacking and fake news, governments and private companies must join forces to stop Russian disinformation.
Paul Vann, the 14-year-old chief executive officer of VannTechCyber, and his father, Raytheon's Paul Vann, join this episode of The Cybersecurity Podcast.
A team of Canadian security researchers is set to unveil a computer operating system called Subgraph designed to protect its users from the most common types of digital attacks.
For Passcode’s last Influencers Poll, we asked an open-ended question: What’s the most urgent cybersecurity or privacy challenge right now, and what’s one way to fix it?
Scenario thinking sketches out future cybersecurity problems and helps policymakers begin addressing tomorrow's digital dilemmas.
Regulators and utility industry leaders need to wake up to the risks that could let malicious hackers cause widespread physical damage to the grid and other critical infrastructure.
Can you hack a Gibson? Are you interested in SETEC Astronomy? Shall we play a game?
The more than 30-year-old Computer Fraud and Abuse Act carries overly harsh penalties for trivial digital transgressions – and it needs to be completely overhauled (or abolished altogether).
The Baltic nation has long had an adversarial relationship with its Russian neighbor. As a result, its press and public have become adept at recognizing and debunking Kremlin propaganda.
The Christian Science Monitor's Passcode traveled across the country to meet these hacker kids who are hunting software bugs, protecting school networks, and helping to safeguard electrical grids.
Rapid advances in biometric technology mean the public is surveilled – and their movements recorded – more than ever before. If this technology spreads without limits, it could soon impinge on basic rights.
The security researcher known for hacking a 2014 Jeep Cherokee, leading to a 1.4 million-vehicle recall, outlines how automakers can keep connected cars safe from cyberattacks.
The US government keeps some security flaws for itself. We take a look inside the secretive process to decide which ones to keep - and which ones to reveal to tech companies.
Want to control your own digital security? There’s a wide array of options for secure messaging apps, email services and browsers that help you do-it-yourself.