Streams

 

Cybersecurity

On The Media

Naming the Shooter, the Law of the Internet, and More

Friday, January 30, 2015

Naming the shooter, the law of the Internet, and more.

On The Media

Security Journalism Isn't A Crime

Friday, January 30, 2015

Journalist and activist Barrett Brown received a lengthy prison sentence for "linking to hacked material." Security journalist Quinn Norton worries her beat might now be criminalized.

Comments [2]

PRI's The World

NATO takes aim at Russia's attacks — online

Thursday, September 04, 2014

With Russia's military intervening in Ukraine, NATO has plenty to discuss at this week's summit. But one aspect of the conflict with Russia goes beyond Ukraine. It lies in cyberspace. And NATO is set to ratify a measure that would directly confront Russian and others on the virtual battlefield.

Comment

PRI's The World

A record Internet data heist can't be fixed with a password change

Wednesday, August 06, 2014

A group of Russian friends have stolen private information from 1.2 billion Internet users around the world, but the public doesn't know who was hit. We do know that it's hard to say your password is safe — and changing it probably won't help.

Comment

On The Media

The Wall Street Journal and Vice Were Hacked

Wednesday, July 23, 2014

A Russian hacker accessed the WSJ and Vice websites.

Read More

Comment

The Leonard Lopate Show

Please Explain: Cybersecurity and Cybercrime

Friday, January 17, 2014

Peter W. Singer, director of the Center for 21st Century Security and Intelligence and a senior fellow in the Foreign Policy program at the Brookings Institution, explains how security breaches like the recent ones at Target and Neiman Marcus, happen, who is behind them, and how cybersecurity works and why it matters. He’s co-author of Cybersecurity and Cyberwar: What Everyone Needs to Know, written with Allan Friedman.

We're taking your calls and questions! Leave a question below or call us at 212-433-9692 between 1:20 and 2 pm. You can also write to us on Facebook or Twitter!

Comments [7]

The Leonard Lopate Show

Jonathan Capehart Guest Hosts; Dr. Lustig on Cutting Out Sugar; Diane Schuur; Activist Nuns; Please Explain Cybersecurity

Friday, January 17, 2014

Jonathan Capehart fills in for Leonard Lopate. On today’s show: Dr. Robert Lustig explains how all the sugar in the American diet has led to chronic disease, and how to cut sugar, increase fiber, and be healthier. Grammy Award-winning Jazz vocalist and pianist Diane Schuur discusses her upcoming album, “I Remember You: With Love to Stan and Frank,” and performing at Birdland. Filmmaker Mary Fishman discusses her documentary, “Band of Sisters,” about nuns who advocate for the rights of immigrant detainees. And this week’s Please Explain is all about cyber security and how to protect your personal information online.

WNYC News

NSA Director Defends Surveillance Programs at Cybersecurity Conference

Thursday, August 08, 2013

As the privacy debate continues following revelations about the federal government's surveillance programs, the director of the National Security Agency is defending his organization's tactics.

Comments [1]

On The Media

Truman Capote's Lies, Cybersecurity and More

Friday, February 15, 2013

How Truman Capote mixed fact and fiction in In Cold Blood, the true threat of cyberwar, and software that fact-checks political speeches in real time. 

 

New Tech City

Hackers Are Vigilantes, Cybersecurity Expert Says

Tuesday, February 12, 2013

Cybersecurity expert Alan Paller says hackers and internet trolls like Andrew Auernheimer (aka Weev) are nothing more than vigilantes. 

Comment

On The Media

The New York Times Gets Hacked

Friday, February 01, 2013

As a technology reporter for The New York Times, Nicole Perlroth says it's hard to convince corporations to go on the record with the details of their cybersecurity breaches. But last October, when The Times learned that Chinese hackers had infiltrated its own computer systems, Nicole got a front-row seat to report on her own company's response to a targeted attack. Perlroth talks to Brooke about the inevitability of security breaches, and the measures that can be taken to minimize damage.

 

Andrew Pekler - Here Comes the Night

Comments [1]

On The Media

Balancing Cybersecurity and Privacy

Friday, May 04, 2012

Last week, the cybersecurity bill CISPA passed the House of Representatives. Brooke talks to Congressman Adam Schiff about why he was initially for the bill and why he decided that in its current form it did not offer enough privacy protections to American citizens.

Comments [1]

The Leonard Lopate Show

Cyberthieves, Cybercops and You

Tuesday, December 27, 2011

Misha Glenny explores the three fundamental threats facing us in the 21st century: cybercrime, cyberwarfare, and cyberindustrial espionage. Darkmarket: Cyberthieves, Cybercops and You explores the rise and fall of the criminal website DarkMarket and looks at the new, ever-changing, often invisible, breed of criminal: the hacker.

Comment

The Leonard Lopate Show

Cyberthieves, Cybercops, and You

Monday, October 10, 2011

Misha Glenny explores the three fundamental threats facing us in the 21st century: cybercrime, cyberwarfare, and cyberindustrial espionage. Darkmarket: Cyberthieves, Cybercops and You explores the rise and fall of the criminal website DarkMarket and looks at the new, ever-changing, often invisible, breed of criminal: the hacker.

Comments [4]

The Leonard Lopate Show

Cyber War

Thursday, August 11, 2011

Vanity Fair contributing editor Michael Joseph Gross looks at the scope of the raging cyber-war and gives details of what happened at Google during their 2009 attack. He also reveals information on a government-initiated program—Operation Starlight—to combat cyber-attacks. Gross was the first to report on Operation Shady RAT, which cyber-security firm McAfee has just released details of. His article “Enter the Cyber Dragon” appears in the September issue of Vanity Fair. He’s also written a Web exclusive, “Operation Shady RAT—Unprecedented Cyber-espionage Campaign and Intellectual-Property Bonanza.”

Comments [4]

The Takeaway

Global Hacking Threats Raise Concern Over U.S. Readiness

Thursday, August 04, 2011

McAfee, a leading cyber security company, issued a report on Wednesday that indirectly points to China as the source of a broad ranging cyber attack on more than 72 organizations throughout the world — including the United Nations, the Olympic movement and the U.S. government. As cyber attacks become a growing threat to the country, the National Security Agency has made a push to employ the best and brightest to combat these attacks. Often, the most qualified people to play defense are often the ones that were once on the offensive — former hackers.

Comment

The Leonard Lopate Show

A Portrait of the Hacker as a Young Man

Wednesday, August 03, 2011

In 2000, Michael Calce, known as Mafiaboy, brought down the websites of Amazon, CNN, Dell, E-TRADE, eBay, and Yahoo!, inciting panic from Silicon Valley to the White House. He served eight months in open custody for the 56 charges on which he was convicted. In Mafiaboy: A Portrait of the Hacker as a Young Man, written with Craig Silverman, he gives a tour of the fast-evolving 21st-century world of hacking—from disruptions caused by teens like Calce, to organized crime and other efforts with potentially catastrophic results—and explains how to protect yourself online.

Comments [4]

The Takeaway

On Cyber Security and Cyber War

Monday, June 06, 2011

In what is becoming an annual tradition, news of a targeted cyber-attack from China has once again made headlines.  Commenting on the attacks targeting the Google email accounts high-level US government officials, Secretary of State Hillary voiced her concern over what could have been a serious breach of security.  Compounded by the recent news of yet another attack against the user name and password information of tens of thousands of visitors to a Sony website, we wonder: what is the current state of cyber security to our nation's most vital intelligence assets? 

Comment

The Takeaway

Google Blames China for Hacking

Thursday, June 02, 2011

Accounts belonging to hundreds of Gmail users, including U.S. government officials and political activists in in China, were hacked. Google has said that the hacking originated in China. The Chinese government has categorically denied any involvement with the hacking. However, China is paying attention to "information warfare," says Jeremy Goldkorn, who works for Danwei, a site that monitors the media in China.

Comment

The Takeaway

Cyberwar's Rules of Engagement

Wednesday, June 01, 2011

The laws of war dictate that a foreign attack on American soil can be met with military retaliation. But what if that attack is comes in the form of a computer virus? The Pentagon has determined that a computer sabotage coming from another country can constitute an act of war, which opens the door for the U.S. to respond using traditional military force. Lt. Gen. Harry D. Raduege, Jr. explains what this means for military strategy.

Comments [1]