Attacks that use malware to encrypt victims' data until they pay hefty ransoms are on the rise. Individuals and organizations can stay ahead of these ransomware assaults with some added digital vigilance.
Now that the White House has released the controversial Trans-Pacific Partnership text, critics and proponents alike can have a more informed discussion about its effect on the Open Internet.
The computer virus used against the Iranian nuclear program did not help seal the nuclear deal with Tehran. It did, however, launch a global cyberarms race.
The Supreme Court hears arguments Monday in Spokeo v. Robins, a case in which a Virginia man claims he was wronged because an Internet data broker portrayed him incorrectly. If the court sides with the alleged victim, any tech company that collects and aggregates personal data could be subjected to devastating lawsuits.
The debate over encryption technology that intensified after the Paris attacks is dominated by cyberlibertarians on one side and law and order proponents on the other. But any resolution will require reframing the discussion and figuring out how to apply democratic controls to our digital infrastructure.
Instead of pushing to diminish tools that are meant to protect modern communications and safeguard speech, our leaders should work toward lasting solutions that can actually thwart terrorism.
The worst laws are those that are unenforceable, so what would we hope our lawmakers say about data collecting and sharing technologies that are not yet critical but soon will be?
While it's more expedient to advocate for backdoors into secure communications and online surveillance to spot terrorists, the real answer may be investing in more old fashioned police work.
Fatheya carried her son Abdullah while traveling with other Syrian refugees on a path near the Hungarian border in Kanjiža, Serbia, on June 2.
The Supreme Court hears arguments Monday in Spokeo v. Robins, a case in which a Virginia man claims he was wronged because an Internet data broker portrayed him incorrectly. If the court sides with the alleged victim, any tech company that collects and aggregates personal data could be subjected to devastating lawsuits.
The Islamic State militant Junaid Hussain killed in a British drone strike displayed little technical knowhow. But even though an unskilled coder, he was more effective at spreading the militants' message over social media and ultimately proved to be an effective role model.
The Cybersecurity Information Sharing Act is missing a key component needed to strengthen America's digital defenses – transparency into what the government itself is doing or not doing to protect its networks from hackers.
As soon as Congress realizes that good security and privacy practices are paramount to cultivating a thriving tech economy, it can begin working with Silicon Valley to forge a more prosperous digital future.
Rapid advances in technology could soon turn science fiction notions of effortless encryption into a reality. But ensuring that we can trust that technology will take more public vigilance against government and corporate eavesdropping.
Presidential campaigns are using sophisticated data mining and analytics software to gain the edge when it comes to courting voters. But the wholesale collection, storage, and sale of voters' political information raises serious questions over how potential supporters are targeted and how their information is exploited.
This week's European ruling striking down the transatlantic Safe Harbor deal is a stark reminder that no one's data is safe until governments around the world reform digital surveillance practices.
The demise of Safe Harbor may be a victory for privacy advocates but it leaves global tech companies in the lurch. A new version of the deal is needed so that companies can get back to work while improving privacy protections for users around the world.
If countries erect more borders and limits in the digital domain, the engine of global social and economic change that's powered by the Internet will quickly stall.
The ongoing legal dispute between Microsoft and the US government over access to information held in Irish data servers is about more than the company's European business. It's about whether users everywhere can ever trust that their information is safe on the Web.
Passcode Editor | Michael is an editor and writer based in Boston.
Passcode Deputy Editor | Sara covers security and privacy policy from DC.
Staff writer | Jack is the Mark Clayton Fellow in Cybersecurity
Staff writer | Malena covers surveillance, encryption, and law enforcement.
Correspondent | Paul covers critical infrastructure and the Internet of Things.
Correspondent | Jaikumar is an award-winning technology reporter.
Correspondent | Fruzsina covers tech culture, digital trends, and hackers.
Columnist | Christopher is chief executive officer of Recorded Future.
Columnist | Lorrie directs the CyLab Usable Privacy and Security Laboratory.
Columnist | Camille focuses on cyberwar and peace as a Berkman Center fellow.
Columnist | Dan is chief information security officer for In-Q-Tel.
Columnist | Jason directs the Cyber Statecraft Initiative.
Columnist | Sascha founded the Open Technology Institute.
Columnist | Bruce is a noted cryptographer and security expert.
Columnist | Evan is a philosophy professor at Rochester Institute of Technology.
Columnist | Melanie teaches information privacy law at American University.
Columnist | Nicole served as deputy chief technology officer at the White House.