8,905 Results for:

March 1, 2021

Cybersecurity
Christina Ayiotis Should Get a Blue Check Mark. So Should Everyone Else

Widespread identity verification on social media platforms would make it harder for malicious actors to impersonate real people.

People holding mobile phones are silhouetted against a backdrop projected with the Twitter logo.

January 23, 2024

Digital and Cyberspace Policy Program
Influence Immunity and Addressing Misinformation

Dolores Albarracín, professor and director of the Social Action Lab and the science of science communications division of the Annenberg Public Policy Center at the University of Pennsylvania, discuss…

Play Hacker internet computer crime cyber attack network security programming code password protection

December 22, 2017

Cybersecurity
Cyber Week in Review: December 22, 2017

This week: WannaCry attribution, cybersecurity in Trump's National Security Strategy, new election security bill, and North Korea tries its luck at Bitcoin. 

January 26, 2022

Sudan
Sudanese Protesters Insist on End to Military Rule

As the fraught standoff in Sudan enters its fourth month, pro-democracy demonstrators persist in resisting the military officers that seized power in October. Their courage and determination deserve the world’s attention and support.

Protesters, one holding a Sudanese flag, walk down the street. A young girl in the foreground throws up two fingers in a peace symbol.

September 27, 2019

Cybersecurity
Cyber Week in Review: September 27, 2019

ECJ rules GDPR "right to be forgotten" does not extend beyond EU; Chinese companies innovate without U.S. components; debate over cyber norms plays out at UN General Assembly; leaked documents implic…

Alibaba's Chief Technology Officer (CTO) Jeff Zhang holds a new self-developed AI chip Hanguang 800 at the Alibaba Cloud Computing Conference in Yunqi of Hangzhou, Zhejiang province, China September 25, 2019.