Bruce Schneier

Mar. 07, 2014

Delving Into the Security of an Internet of Things

As more devices come online, is enough attention being given to security and privacy?

internet of things, bruce schneier, networked appliances, online, privacy, security, security flaw, security breach

Jun. 03, 2011

Cyber Attacks May Be “Acts Of War”

Ira Flatow and guests discuss cyber attacks and the challenges in defining the nature of cyber warfare.

computer communication cyber online internet

Oct. 01, 2010

Cyber Warfare

With the Stuxnet worm still affecting industrial systems around the world, some analysts are saying that the code may have been produced by a government. We'll talk about cyber warfare and computer security.

computers, virus, worm, code

AVAILABLE IN ITUNES

Michael Pollan Talks Plants and Food

view more

FEATURED PLAYLIST

Whale Tales

BOOKS BY OUR GUESTS

Mystery Box

How Humpbacks Hunt With Bubbles

Humpback whales blow bubbles around schools of fish to concentrate them for easier capture. It's called a bubble net, says David Wiley, research coordinator for Stellwagen Bank National Marine Sanctuary, and it's visible as a ring of bubbles at the surface. Now, with underwater digital tracking tags and custom visualization software, whale researchers can see what the whales are doing underwater when they're bubble-netting.

Science Friday® is produced by the Science Friday Initiative, a 501(c)(3) nonprofit organization.

Science Friday® and SciFri® are registered service marks of Science Friday, Inc. Site design by Pentagram; engineering by Mediapolis.

 

topics