Passcode caught up with some of the kids at r00tz Asylum to get their advice: What's the first step other kids – or anyone, really – should take if they want to be a hacker?
DARPA staged the world's first live computer-versus-computer hacking competition in which teams battled for a multimillion dollar purse in front of thousands of cheering fans in Las Vegas.
Cybersecurity researcher Marc Rogers is the principal hacking consultant on the hit TV show "Mr. Robot," which debuts its second season on the USA Network Wednesday.
Artist and researcher Adam Harvey has set out to raise awareness about the increasing pervasiveness of biometric tracking on the web and in everyday life.
As companies try to balance the need to be transparent with outside researchers while protecting their own sensitive business information, the often opaque bug valuation process can be controversial.
Russian state-supported media is using the Democratic National Committee leaked emails to portray the American presidential elections as a corrupt spectacle akin to 'House of Cards.'
Reports that unknown hackers targeted the Moscow bureau of The New York Times is part of a worrying trend of alleged Kremlin spying against journalists in Russia.
Following European terror attacks, German officials have suggested legislation that would force tech companies to decrypt private messages and other measures to increase digital surveillance.
Why wait years to grow new cybersecurity talent when you can take advantage of the talented federal workforce today?
Join us on Tuesday, August 30 for a Privacy Lab talk that will look at two tools created to teach users about digital privacy.
Many cybersecurity experts say the Kremlin is attempting to manipulate debate in the US by leaking secret information on politicians and secret government operations.
The National Security Agency stockpiled sophisticated tools designed to penetrate commonly used security software. Now that hackers have revealed some of those techniques, companies are left scrambling to secure their systems.
Attracting more women into the male-dominated cybersecurity field means ditching the bro pipeline of computer science, military, and intelligence recruits and drawing from disciplines such as law and public policy.
A potentially damaging hacking tool revealed in the apparent National Security Agency breach includes a zero-day vulnerability – or previously unknown security hole – in Cisco software. The government should have already disclosed that flaw.
A previously unknown group dumped a cache of hacking tools on the web that appear to be from the National Security Agency. Now, cybersecurity experts say Moscow is once again behind a cyberattack on the US.
Can you hack a Gibson? Are you interested in SETEC Astronomy? Shall we play a game?
The Democratic and Republican parties – and their presidential candidates – should immediately put someone in charge of safeguarding their data. It's for the good of voter privacy and American democracy.
It's the physical manifestation of what they often try and accomplish in the digital world, say lock-picking enthusiasts.
In this episode of The Cybersecurity Podcast, a team of student hackers from the University of Central Florida explain how they've managed to win three consecutive titles in the National Collegiate Cyber Defense Competition.
From Apple to Airbnb, companies are increasingly turning to outside hackers to find – and eventually fix – their software security vulnerabilities.
Microsoft apparently released a set of security protocols for unlocking security protections that could allow attackers to install malicious software on the company's smartphones and tablets.
Passcode caught up with some of the kids at r00tz Asylum to get their advice: What's the first step other kids – or anyone, really – should take if they want to be a hacker?
At an Atlantic Council event this week, cybersecurity researchers and experts said last week's Black Hat and DEF CON conferences showed that Washington is working harder to build better relations with the hacker community.
Cybersecurity expert Chris Rock researched ways to overthrow a government using only his computer for a talk at the DEF CON hacker conference in Las Vegas – and he says there are some lessons for the US elections.
Cybersecurity experts say a White House plan to bolster numbers of professionals working to safeguard federal networks doesn't go far enough.
Last month's Democratic National Committee leaks underscore the value of data in the hands of nations, hacktivists, and terrorists.
Passcode Editor | Michael is an editor and writer based in Boston.
Passcode Deputy Editor | Sara covers security and privacy policy from DC.
Staff writer | Jack is the Mark Clayton Fellow in Cybersecurity
Correspondent | Paul covers critical infrastructure and the Internet of Things.
Correspondent | Jaikumar is an award-winning technology reporter.
Columnist | Nadya directs the Global Security Initiative at Arizona State Uni...
Columnist | Lorrie is chief technologist at the Federal Trade Commission
Columnist | Dan is chief information security officer for In-Q-Tel.
Columnist | Jason directs the Cyber Statecraft Initiative.
Columnist | Sascha founded the Open Technology Institute.
Columnist | Lysa Myers is a security researcher at ESET.
Columnist | Bruce is a noted cryptographer and security expert.
Columnist | Evan is a philosophy professor at Rochester Institute of Technology.
Columnist | Melanie teaches information privacy law at American University.
Columnist | Nicole served as deputy chief technology officer at the White House.