cyber security

Updated at 4:25 p.m. ET

A day after a key lawmaker said the U.S. government was not doing enough to take election interference by foreign powers seriously, the Trump administration responded forcefully with a surprise White House briefing to emphasize the breadth and extent of its election security initiatives.

"The president has taken decisive action to defend our election systems from meddling and interference," national security adviser John Bolton said at the briefing.

Taft IT High School is launching what Cincinnati Public Schools believes is the first-in-the-country cybersecurity certificate program.

WMFD/Screenshot by WOSU

The Rover Pipeline’s corporate parent came under cyber-attack this week, according to Bloomberg News, as did three other natural gas transmission companies. Energy Transfer Partners says its electronic communication system was shut down in the attack, but no data was compromised.

Pavel Golovkin / Associated Press

Around 60 Central Ohio students will come to Columbus State Community College for "capture the flag" on Friday. But it's not like the schoolyard game many kids are used to - rather, it's a cyber security challenge that organizers hope will energize students to join the growing field.

Tech Tuesday: Cybercrime, Online Mattress Shopping

Oct 24, 2017
Pixabay

Learn the difference between cyber crime and cyber security and how to protect yourself online. Also, get insider information on the pros and cons of shopping for a mattress outside of the showroom and on the internet. 

Updated at 11:30 a.m. ET

So it seems that it's not only Democrats who have trouble keeping their digital information secure online. An extensive database of information about 198 million Americans collected by a contractor hired by Republican groups was obtained by a security researcher, who found it on an Amazon server, with not even a single password protecting it.

Keyboard
Flickr / Creative Commons

Cyber security experts from around the country gather in Lewis Center on Friday for a conference on how to prevent and mitigate cyber attacks.

Every day businesses and governments are taking on a growing danger that isn’t playing out through physical aggression but through digital attacks. The state’s top military official explains what the state is doing to gear up in the new age of cyber warfare.

Updated 5:15 p.m. ET

WikiLeaks has released thousands of files that it identifies as CIA documents related to the agency's cyber-espionage tools and programs.

The documents published on Tuesday include instruction manuals, support documents, notes and conversations about, among other things, efforts to exploit vulnerabilities in smartphones and turn smart TVs into listening devices. The tools appear to be designed for use against individual targets, as part of the CIA's mandate to gather foreign intelligence.

Tech Tuesday: Cyber Security and a Digital Economy

Jun 21, 2016
Pixabay

Though typically "hacker" comes with a negative connotation, some hackers can actually help point out flaws in cyber security. However, sometimes reporting the flaws can have unintended consequences for them. And, a new global infrastructure is emerging that could help to keep data more private and lead to a more stable digital economy.  

Courtesy of the author

This hour we are talking with Alec Ross, former Senior Advisor for Innovation to Secretary of State Hilary Clinton. We'll discuss Ross' new book, The Industries of the Future, and what exactly those industries are and what their impact will be.