WASHINGTON, DC – MAY 29: Demonstrators hold a protest in response to the police killing of George Floyd in Lafayette Square Park on May 29, 2020 in Washington, DC. (Photo by Tasos Katopodis/Getty Images)
As with the flaw-ridden protocol underlying 3G, the 4G protocol is susceptible to attacks that disclose mobile users’ information or impose a denial or service, according to…
The Senate Judiciary Committee is in the early stages of crafting a bill that would compel tech companies to bypass encryption on consumer devices. (Getty)
House Democrats on Tuesday introduced legislation to codify a top cybersecurity position at the White House following National Security Adviser John Bolton’s decision to eliminate the role.
A bipartisan group of House lawmakers wants to bar the federal government from mandating “backdoors,” or configurations that enable surveillance, in commercial software and hardware products.
A child watches as U.S. Secretary of State Mike Pompeo speaks to staff and families from U.S. Embassy Riyadh, in Riyadh, Saudi Arabia, on April 29, 2018. The House advanced a measure that would create a bug bounty program at the State Department. (State Department photo/ Public Domain)
A bipartisan group of House lawmakers wrote to FBI Director Christopher Wray Friday, asking for answers related to the bureau's work around encryption.
A new bill introduced on Friday aims to create a voluntary cybersecurity certification program to "independently identify, verify, and label compliant Internet-of-Things devices with strong cybersecurity standards."
Oregon Senator Ron Wyden is demanding to know how America's largest telecommunications companies plan to stop hackers from exploiting vulnerabilities in an outdated mobile-data transfer framework that…