2014 was a banner year for cybersecurity. In March, a group of hackers installed a malicious piece of software in Target’s security and payments system and obtained` 40 million credit card numbers and 70 million private addresses. In September, a ...

Recent geopolitical events in Africa have shed light on an unfortunate trend in Western media: the neglect of substantial African stories. When stories on Africa do make headlines, they are usually the most sensational pieces. These pieces reveal two unfortunate ...

Despite the existence of previous cyber incidents more severe than the recent attack on Sony Pictures Entertainment, the last month has seen cybersecurity penetrate the American psyche and affect day-to-day news like never before. The involvement of a major movie ...

  In the spring of 1776, the American Revolution was still in its infancy. It had been just over a year since a decade of British grievances against the citizens of the American colonies had exploded into actual warfare at ...

On September 12th, software security specialist Stéphane Chazelas discovered a security flaw in a core component of popular operating systems that run on personal computers, web servers and other connected devices. Within two weeks, the vulnerability was announced publicly and ...

Despite past success, change may be looming for South Korea’s education system For decades, South Korea has been among the top nations worldwide in student test scores and literacy and graduation rates. Following the Korean War, the administrations of Syngman ...

Every four years during the World Cup, the US press fixates collectively on the “will it/won’t it” question of soccer’s future. Each World Cup seems to bring higher TV ratings and more water cooler conversations than the last. Soccer optimists, ...

US cybersecurity strategy faces an uncertain future in Washington while the private sector bolsters its ability to respond to cyber attacks In July 2011, the Department of Defense (DoD) issued a five-point strategic initiative, the first of which designated cyberspace ...