Lawful Hacking

× Clear Filters
4 Articles
A laptop displays a message after being infected by a ransomware as part of a worldwide cyberattack on June 27, 2017 in Geldrop.

Empowering Security Researchers Will Improve Global Cybersecurity

China's response to a software vulnerability last year sparked concerns for "white hat hackers." A deep dive into the tangled regulatory world of security researchers and how improved…

Hacking Back in Black: Legal and Policy Concerns with the Updated Active Cyber Defense Certainty Act

For years now, there has been a discussion surrounding the feasibility of active cyber defense, and allowing private entities or individuals to “hack back” against hostile…
Just Security

Is the FBI Using Zero-Days in Criminal Investigations?

We have known for a while now that the FBI uses hacking techniques to conduct remote computer searches in criminal investigations — particularly those that involve the dark web.…
Just Security

Lawful Hacking After the Encryption Debate

The Obama administration has apparently decided not to support exceptional access proposals that would provide law enforcement with the means to access data on iPhones and other…
1-4 of 4 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: