With the rate of digital bullying increasing, tech firms escalate efforts to build automated tools that can detect and flag online harassment.
With its $52 million initiative to vastly expand connectivity and technology on the front lines, the US Army knows it may also give enemies new digital targets to hack or manipulate. Is it up for the challenge?
In an age of hacking and fake news, governments and private companies must join forces to stop Russian disinformation.
When it comes to personal data, trustworthiness can affect a business's bottom line
Paul Vann, the 14-year-old chief executive officer of VannTechCyber, and his father, Raytheon's Paul Vann, join this episode of The Cybersecurity Podcast.
A team of Canadian security researchers is set to unveil a computer operating system called Subgraph designed to protect its users from the most common types of digital attacks.
For Passcode’s last Influencers Poll, we asked an open-ended question: What’s the most urgent cybersecurity or privacy challenge right now, and what’s one way to fix it?
Advances in communication like Franklin’s postal service and today’s Internet can help topple regimes — and also erode privacy. Tools like WhoIsGuard offer the anonymity of a Post Office Box.
Scenario thinking sketches out future cybersecurity problems and helps policymakers begin addressing tomorrow's digital dilemmas.
Regulators and utility industry leaders need to wake up to the risks that could let malicious hackers cause widespread physical damage to the grid and other critical infrastructure.
The more than 30-year-old Computer Fraud and Abuse Act carries overly harsh penalties for trivial digital transgressions – and it needs to be completely overhauled (or abolished altogether).
The Baltic nation has long had an adversarial relationship with its Russian neighbor. As a result, its press and public have become adept at recognizing and debunking Kremlin propaganda.
The Christian Science Monitor's Passcode traveled across the country to meet these hacker kids who are hunting software bugs, protecting school networks, and helping to safeguard electrical grids.
Rapid advances in biometric technology mean the public is surveilled – and their movements recorded – more than ever before. If this technology spreads without limits, it could soon impinge on basic rights.
The security researcher known for hacking a 2014 Jeep Cherokee, leading to a 1.4 million-vehicle recall, outlines how automakers can keep connected cars safe from cyberattacks.
The US government keeps some security flaws for itself. We take a look inside the secretive process to decide which ones to keep - and which ones to reveal to tech companies.
The Monitor’s cybersecurity and privacy project ends March 31.
Passcode and New America have a podcast featuring the leaders and thinkers of cybersecurity.
Want to control your own digital security? There’s a wide array of options for secure messaging apps, email services and browsers that help you do-it-yourself.
By giving employees cybersecurity training right when they’ve done a risky behavior, Wombat Security can help make real changes in user behavior.
Michael Farrell covers arts, media, and culture. Previously, he edited Passco...
Passcode Deputy Editor | Sara covers security and privacy policy from DC.
Staff writer | Jack is the Mark Clayton Fellow in Cybersecurity
Correspondent | Paul covers critical infrastructure and the Internet of Things.
Correspondent | Jaikumar is an award-winning technology reporter.
Columnist | Nadya directs the Global Security Initiative at Arizona State Uni...
Columnist | Lorrie is chief technologist at the Federal Trade Commission
Columnist | Dan is chief information security officer for In-Q-Tel.
Columnist | Senior Research Scholar, Columbia University SIPA
Columnist | Sascha founded the Open Technology Institute.
Columnist | Lysa Myers is a security researcher at ESET.
Columnist | Bruce is a noted cryptographer and security expert.
Columnist | Evan is a philosophy professor at Rochester Institute of Technology.
Columnist | Melanie teaches information privacy law at American University.
Columnist | Nicole served as deputy chief technology officer at the White House.