TheStreet (Mar. 11, 2014) SXSW saw its fair share of Bitcoin companies trying to win over fans, but they all seem to gloss over any security concerns. Each company explained the lengths it went to in order to keep their ... watch video
TheStreet (Oct. 8, 2014) Facebook is going to start allowing advertisers to target its users based on their locations. In a blog post, the social media network announced its new local awareness ads, designed to help local ... watch video
AFP (Dec. 18, 2014) White House spokesperson Josh Earnest says cyber attacks that ultimately prompted Sony Pictures to scrap the release of a madcap comedy about North Korea are a "serious national security matter." ... watch video
Reuters - US Online Video (Aug. 6, 2014) A cybersecurity firm says a Russian gang stole 1.2 billion Internet logins and passwords in the largest known breach of online credentials. Linda So reports.
Video provided by ... watch video
Washington Post (Jan. 5, 2015) Arati Prabhakar, director of the Defense Advanced Research Projects Agency, talks with editor Mary Jordan at the Post's 2014 Cybersecurity Summit.
Video provided by Washington ... watch video
Newsy (Jan. 20, 2015) In Tuesday's State of the Union speech, the president pushed for more cooperation between the government and the private sector on cybersecurity.
Video provided by ... watch video
May 27, 2016 Our excitement with and rapid uptake of technology -- and the growing opportunities for artificial brain enhancement -- are putting humans more firmly on the path to becoming cyborgs, according to ... read more
May 27, 2016 It happens in many households. Kids are tapping on their cell phones or are preoccupied by their favorite TV show as their parents ask them a question or want them to do a chore. Unlike previous ... read more
May 26, 2016 One of the undeniable powers of social media is its ability to influence people and their behaviors. This is especially true, a study finds, when it comes to alcohol use. Researchers found that when ... read more
May 26, 2016 Black holes are still very mysterious celestial bodies which, according to the majority of physicists, do not, however, escape the laws of thermodynamics. As a result, these physical systems possess ... read more
May 25, 2016 In 1977, Princeton mathematician Paul Seymour made a conjecture about certain large graphs. Nearly 40 years later, mathematicians have come up with a proof he was right. The conjecture is 13 words ... read more
May 24, 2016 Excessive internet use contributes to the development of school burnout. School burnout, in turn, may lead to excessive internet use or digital addiction. Mind the Gap, a longitudinal research ... read more
May 25, 2016 A new study asserts that the three-parameter 'alpha-beta-gamma' (ABG) model used in the past by 3GPP for predicting signal coverage might spell trouble at frequencies above 6 gigahertz ... read more
May 23, 2016 While cholera has hardly changed over the past centuries, the tools used to study it have not ceased to evolve. Using mobile phone records of 150,000 users, a new study has shown to what extent human ... read more
Aug. 25, 2014 The best way to combat cyberattacks may be a joint public-private partnership between government and business, says a new paper. Cybersecurity is a big deal, and the protection of critical network ... read more
June 18, 2014 The nationwide shortage of cybersecurity professionals -- particularly for positions within the federal government -- creates risks for national and homeland security, according to a new study. ... read more
Nov. 7, 2013 Experts in anthropology and cybersecurity are examining the unspoken knowledge shared by cybersecurity analysts as a way to develop new automated tools that help analysts strengthen their cyber ... read more
Nov. 9, 2011 The U.S. National Initiative on Cybersecurity Education (NICE) has published for public comment a draft document that classifies the typical duties and skill requirements of cybersecurity ... read more