cyber security | WOSU Radio

cyber security

The Ohio House last week approved the creation of a civilian force of ‘cyber-warriors.’

The bill is now headed back to the Senate for a final vote to establish the Ohio Cyber Reserve.

Tech Tuesday: Election Cyber Security And More

Apr 23, 2019
Flickr.com

The Mueller report detailed the Trump administration’s handling of the investigation into his office and potential obstruction of justice.

It also offered insights into the hack of a Florida county government during the 2016 presidential campaign.

The hack highlights the vulnerability of election systems to cyber-attacks.

Today on Tech Tuesday, elections and cyber security, Google Earth, and more.

Guests

Updated at 4:25 p.m. ET

A day after a key lawmaker said the U.S. government was not doing enough to take election interference by foreign powers seriously, the Trump administration responded forcefully with a surprise White House briefing to emphasize the breadth and extent of its election security initiatives.

"The president has taken decisive action to defend our election systems from meddling and interference," national security adviser John Bolton said at the briefing.

Taft IT High School is launching what Cincinnati Public Schools believes is the first-in-the-country cybersecurity certificate program.

Pavel Golovkin / Associated Press

Around 60 Central Ohio students will come to Columbus State Community College for "capture the flag" on Friday. But it's not like the schoolyard game many kids are used to - rather, it's a cyber security challenge that organizers hope will energize students to join the growing field.

Tech Tuesday: Cybercrime, Online Mattress Shopping

Oct 24, 2017
Pixabay

Learn the difference between cyber crime and cyber security and how to protect yourself online. Also, get insider information on the pros and cons of shopping for a mattress outside of the showroom and on the internet. 

Updated at 11:30 a.m. ET

So it seems that it's not only Democrats who have trouble keeping their digital information secure online. An extensive database of information about 198 million Americans collected by a contractor hired by Republican groups was obtained by a security researcher, who found it on an Amazon server, with not even a single password protecting it.

Keyboard
Flickr / Creative Commons

Cyber security experts from around the country gather in Lewis Center on Friday for a conference on how to prevent and mitigate cyber attacks.

Every day businesses and governments are taking on a growing danger that isn’t playing out through physical aggression but through digital attacks. The state’s top military official explains what the state is doing to gear up in the new age of cyber warfare.

Updated 5:15 p.m. ET

WikiLeaks has released thousands of files that it identifies as CIA documents related to the agency's cyber-espionage tools and programs.

The documents published on Tuesday include instruction manuals, support documents, notes and conversations about, among other things, efforts to exploit vulnerabilities in smartphones and turn smart TVs into listening devices. The tools appear to be designed for use against individual targets, as part of the CIA's mandate to gather foreign intelligence.

Tech Tuesday: Cyber Security and a Digital Economy

Jun 21, 2016
Pixabay

Though typically "hacker" comes with a negative connotation, some hackers can actually help point out flaws in cyber security. However, sometimes reporting the flaws can have unintended consequences for them. And, a new global infrastructure is emerging that could help to keep data more private and lead to a more stable digital economy.  

Courtesy of the author

This hour we are talking with Alec Ross, former Senior Advisor for Innovation to Secretary of State Hilary Clinton. We'll discuss Ross' new book, The Industries of the Future, and what exactly those industries are and what their impact will be.