A potentially damaging hacking tool revealed in the apparent National Security Agency breach includes a zero-day vulnerability – or previously unknown security hole – in Cisco software. The government should have already disclosed that flaw.
Members of Congress on Wednesday launched the Fourth Amendment Caucus to defend privacy in an era of increasingly pervasive surveillance.
British Prime Minister-in-waiting Theresa May is relying on public fears of terrorist attacks to push through her Investigatory Powers Bill to expand government surveillance powers.
Hillary Clinton's tech agenda doesn't address the most pressing digital issues. The US deserves a tech platform that defends privacy, protects the public from discriminatory algorithms, and ensures that innovation doesn't just benefit the wealthy.
Almost a year after a historic deal between Beijing and Washington to curtail cyberespionage, reports indicate digital attacks from China are fewer but more sophisticated.
President Obama and other Western leaders need to send a strong and lasting message to Moscow that meddling in democratic institutions is off limits.
The 2016 Democratic Party Platform fails to offer meaningful improvements to national tech policy that would improve cybersecurity. But Americans deserve a plan that would strengthen networks, bolster security, and safeguard civil liberties.
The proposal updates an antiquated law so that countries can exchange electronic data as part of investigations while safeguarding Americans' privacy and promoting security.
Internet users on the lower end of the income scale are especially vulnerable to malicious software because public computers and cheap cell phones are the ideal place for cybercriminals to test their new hacks.
Friars gather after a funeral service for victims of the earthquake inside a gym in Ascoli Piceno, Italy, Saturday.
US diplomats are trying to revise how a global arms pact known as the Wassenaar Agreement applies to digital weapons. Despite misgivings from the tech sector, there’s an opportunity for Washington to help forge a deal that keeps hacking tools out of the wrong hands.
Innovative biometric technology that relies on human traits as security measures is the answer to beating back threats from malicious hackers.
The European privacy watchdog's rebuke of the EU-US data transfer deal known as Privacy Shield should prompt reforms on both sides of the Atlantic. In the meantime, we’d rather our data reside in the US, subject to publicly available legal frameworks, judicial oversight, and a strong tradition of civil society watchdogs.
A US appeals court ruing that the government doesn't need a warrant to track location data is a troubling development that further whittles away privacy protection in an era of pervasive data collection and tracking.
Social media companies such as Twitter need to do more to keep terrorists from using their platforms as digital mouthpieces and that means prioritizing national security matters over some users' privacy concerns.
The emergence of technologies that falsely promise to predict someone's behavior based on their facial features and expressions is a deeply troubling development.
Despite digital weapons becoming critical tools in every modern military, there's still no consensus when it comes to defining what amounts to an act of cyberwar.
The Supreme Court has changed federal criminal procedure to vastly expand the FBI's ability to break into Americans' computers. Without congressional action, this would dangerously expand US search and seizure powers.
The cybersecurity threat from Islamic State and the group's supporters requires a global, coordinated effort to decimate their entire digital and online apparatus.
The pop star said he's 'done taking pictures with fans.' While we live in a camera-ready, Instagram-obsessed society, fans should respect Bieber's request for privacy because even celebrities haven't forfeited autonomy.
Passcode Editor | Michael is an editor and writer based in Boston.
Passcode Deputy Editor | Sara covers security and privacy policy from DC.
Staff writer | Jack is the Mark Clayton Fellow in Cybersecurity
Correspondent | Paul covers critical infrastructure and the Internet of Things.
Correspondent | Jaikumar is an award-winning technology reporter.
Columnist | Nadya directs the Global Security Initiative at Arizona State Uni...
Columnist | Lorrie is chief technologist at the Federal Trade Commission
Columnist | Dan is chief information security officer for In-Q-Tel.
Columnist | Jason directs the Cyber Statecraft Initiative.
Columnist | Sascha founded the Open Technology Institute.
Columnist | Lysa Myers is a security researcher at ESET.
Columnist | Bruce is a noted cryptographer and security expert.
Columnist | Evan is a philosophy professor at Rochester Institute of Technology.
Columnist | Melanie teaches information privacy law at American University.
Columnist | Nicole served as deputy chief technology officer at the White House.