Three hooded hackers hunch over their computer screens in the control room at Israel's new state-of-the-art "Cyber Gym", where IT and infrastructure company employees train to defend against cyber attacks.
Reuters - US Online Video (Dec. 19, 2014) The hacking attack on Sony Pictures has U.S. government officials weighing their response to the cyber-attack. Linda So reports.
Video provided by ... watch video
Howdini (Nov. 6, 2011) With kids on the Internet in so much of their spare time, bullying has moved from the playground to cyberspace. And some cyber-bullying is extremely hurtful. Author Rachel Simmons has some advice on ... watch video
Reuters - Business Video Online (Apr. 16, 2015) Representatives from around 160 countries gather at the Hague to discuss cyber space and cyber security, including the dilemmas and challenges regarding the evolution of the internet. Ciara Lee ... watch video
TheStreet (Mar. 17, 2014) Major banks in the U.S. and U.K. have until April 8 to update software in their ATM network or risk a pricey invoice from Microsoft. As early as 2007, the tech giant warned its support for Windows XP ... watch video
Newsy (May 14, 2014) Clive Goodman, former reporter for Rupert Murdoch's News of the World, admits to hacking the phones of royals and their staff hundreds of times.
Video provided by ... watch video
June 30, 2015 Pension funds around the world could be losing out on billions of euros and dollars of the stock market gains they would have made because they are obliged to sell part of their portfolios before the ... read more
June 30, 2015 Electrical engineers have demonstrated a new way to harness light particles, or photons, that are connected to each other and act in unison no matter how far apart they are -- a phenomenon known as ... read more
June 29, 2015 Virtual Private Networks (VPNs) are legal and increasingly popular for individuals wanting to circumvent censorship, avoid mass surveillance or access geographically limited services like Netflix. ... read more
June 29, 2015 A new ultrasonic fingerprint sensor measures 3-D image of your finger's surface and the tissue beneath it -- enhancing biometrics and information security for smartphones and ... read more
June 29, 2015 As yet another music streaming service comes online to rival the countless available outlets for so many different genres, a new approach to classifying music to make archiving, sorting and music ... read more
June 29, 2015 With the advent of video games, a frequently asked question has been whether we get as engrossed in them emotionally as we do when we see a scary movie. The answer is yes and ... read more
June 29, 2015 New research identifies the types of investors who are vigilant about corporate fraud, but finds that most of those investors are tracking the wrong red flags -- meaning the warning signs they look ... read more
June 25, 2015 A computational model that could enhance understanding, diagnosis and treatment of pressure ulcers related to spinal cord injury has been devised by investigators. The team also described results of ... read more
June 25, 2015 While transparency, openness and reproducibility are readily recognized as vital features of science and embraced by scientists as a norm and value in their work, a growing body of evidence suggests ... read more
Sep. 10, 2012 People who commit cyber-attacks against the government also tend to download music illegally and participate in physical protests. Surprisingly, however, they don't appear to be acting out of ... read more
Oct. 18, 2011 Cyber war, long considered by many experts within the defense establishment to be a significant threat, if not an ongoing one, may never take place according to one expert. He argues that cyber ... read more