Bloomberg
How the C-Suite Is Fighting Against Cyber Threats
Oct.19 -- Samuel Palmisano, former IBM chief executive officer, and Ajay Banga, Mastercard's chief executive officer, discuss the fight against cyber threats with Bloomberg's Shery Ahn on "Bloomberg Markets."
Curated Video
UK: COMPUTER HACKER MAY HAVE INFILTRATED SECRET SERVICES
Eng/Nat
A mystery computer buff may have hacked his way into the confidential records of the British royal family and Britain's secret services.
A journalist who received the information says the same technique could also be used by...
Bloomberg
JPMorgan Hack Attack: How Much Damage Was Done?
Oct. 3 -- Berkeley Varitronics Systems CEO Scott Schober, TeleSign CEO Steve Jillings and Bloomberg's Keri Geiger discuss JPMorgan's data breach with Trish Regan on ""Street Smart."" (Source: Bloomberg)
Curated Video
Russian Intelligence Hacks Ukrainian Gas Company Burisma
Security firm Area 1 detected the hack. Its co-founder said this is a "cookie-cutter G.R.U. campaign."
Curated Video
Newsy's Latest Tech News
Nintendo has confirmed 160,000 accounts were hacked. Instacart plans to add 250,000 more shoppers.
Curated Video
UK analyst on Twitter hacks, Yahoo
The Turkish government probably ordered the hijacking of hundreds of high-profile Twitter accounts, a cybersecurity analyst said on Wednesday.It's not clear how many accounts were taken over altogether but a slew of them, ranging from...
Curated Video
UK Trade Minister Fox on Parliament cyber attack
RESTRICTION SUMMARY: AP CLIENTS ONLYSHOTLIST:++PLEASE NOTE THIS EDIT CONTAINS NO CUTAWAYS++UK POOL - AP CLIENTS ONLYLondon - 24 June 20171. SOUNDBITE (English) Liam Fox, UK International Trade Secretary:"Well, we know that there are...
Bloomberg
How One Man Stole Xbox Digital Gift Cards Worth Millions
Jul.01 -- A former software debugging engineer at Microsoft found a bug in the system and was able to steal more than 152,000 Xbox gift cards worth $10.1 million. Max Chafkin wrote the story for Bloomberg Businessweek and he's on...
Curated Video
Hacking of celebrity's photos sparks new questions about data privacy and security
The leaking of American celebrities' intimate photos by hackers has sparked a new debate about internet data privacy and security.
As federal investigators worked on Tuesday to determine who stole and posted nude photos of several female...
Curated Video
A police officer was reported injured after gunshots at the U.S. Capitol, police said Thursday. They locked down the entire complex, at least temporarily derailing debate over how to end a government shutdown.
HEADLINE: Raw: Security at White House
CAPTION: A police officer was reported injured after gunshots at the U.S. Capitol, police said Thursday. They locked down the entire complex, at least temporarily derailing debate over how to end a...
Bloomberg
JPMorgan Data Breach: What Information Was Taken?
Oct. 3 -- Bloomberg's Hans Nichols examines the type of information exposed in the latest data breach at JPMorgan, which affected 76 million households. He speaks on The Pulse.
PBS
Cybersecurity 101
You wouldn't hand strangers keys to your house; why wouldn't you protect yourself online? Scholars watch a short video on cybersecurity. The engaging video describes how the Internet came to be and how criminals can steal sensitive...
Crash Course
Cybersecurity: Crash Course Computer Science #31
The three most important words for cybersecurity? Secrecy, integrity, and availability. The 31st installment of an informative video series describes cybersecurity measures in the digital age. It explains the three different goals of...
Google
Protect Your Stuff
If you think password is an acceptable password, think again! A short video demonstrates the importance of an unguessable password as part of a Google series on digital citizenship.
Curated OER
Powerful Passwords
Usernames and passwords are required for so many different sites these days. Watch this video to learn how to create a powerful password to secure your privacy.
Crash Course
Crash Course Computer Science #31: Cybersecurity
Cybersecurity is a set of techniques to protect the secrecy, integrity, and availability. This episode discusses these three goals and talk through some strategies we use like passwords, biometrics, and access privileges to keep our...
Khan Academy
Khan Academy: Math Behind Password Security
Sal explains the ins and outs of creating stronger passwords to keep your personal information safe. [10:20]
Childnet
Childnet: Online Safety: The S Rule: Video Lesson
This is the first of six video lessons designed to support families with online safety at home using Childnet's SMART Rules. The S Rule interactive video (13:45) focuses on online safety including what to share and not share online for...
Khan Academy
Khan Academy: Math Behind Password Security
Sal explains the ins and outs of creating stronger passwords to keep your personal information safe. [10:18]