NOT REGISTERED? REGISTER HERE
Hide Advanced Search - Show Advanced Search +

We found 14 results for:

Cybercrime ×
Clear

Title
& Description

News Outlet
& Journalist

Date
& Location

MEDIA TYPE
& LENGTH

The Daily Tar Heel

Guillermo Molero

2 November 2020

North Carolina, United States

Text

800-1500 Words

ADD TO COLLECTION
FAVORITE
VIEW STORY

North Carolina takes a multipronged approach to election security. Unique serial numbers on mail-in ballots allow the voter to be removed from the system once they are processed. Hundreds of thousands of test ballots ...

Politico

Eric Geller

2 November 2020

United States

Text

1500-3000 Words

ADD TO COLLECTION
FAVORITE
VIEW STORY

The Democratic National Committee (DNC) built up its digital defenses, successfully protecting the 2018 midterm election from the cyber-hacking that occurred in 2016. The DNC now trains staff to spot cyber threats, co...

Christian Science Monitor

Christa Case Bryant

21 October 2020

United States

Text

800-1500 Words

ADD TO COLLECTION
FAVORITE
VIEW STORY

Cyber security simulations are taking place across the country to help everyone, from government officials to journalists, to identify election-related cyber threats and coordinated disinformation campaigns and make p...

Christian Science Monitor

Christa Case Bryant

4 February 2020

Tallinn, Estonia

Text

Over 3000 Words

ADD TO COLLECTION
1
FAVORITE
VIEW STORY

Estonia is bolstering its cybersecurity against Russian would-be hackers on a shoestring budget and a brigade of volunteers, called the "nerd reserves." Hailing from Estonia's rich IT community, as well as other indus...

KPHO-TV

Kristine Harrington

15 August 2019

Chandler, Arizona, United States

Broadcast TV News

5-15 Minutes

ADD TO COLLECTION
1
FAVORITE
VIEW STORY

At Basha High School in Chandler, Arizona, students can learn about one of the world's fastest-growing professional fields: cybersecurity. The high school works in partnership with the University of Arizona to teach s...

The Colorado Sun

Tamara Chuang

27 May 2019

Colorado Springs, Colorado, United States

Text

1500-3000 Words

ADD TO COLLECTION
FAVORITE
VIEW STORY

The Cybersecurity industry in Colorado has started recruiting and training veterans, finding that ex-military members gave what it takes to combat digital "bad guys" and other cybersecurity issues. While Colorado has ...

The New York Times

Tina Rosenberg

9 April 2019

New York, New York, United States

Text

1500-3000 Words

ADD TO COLLECTION
1
FAVORITE
VIEW STORY

Online buyers of sex now have a great chance of running into the NYPD's latest initiative to combat trafficking amongst prostitution: a chatbot called Freedom Signal. Originated by an organization called Seattle Again...

The Boston Globe

Stefanie Dreyer

10 January 2019

United States

Text

800-1500 Words

ADD TO COLLECTION
FAVORITE
VIEW STORY

By collecting and sharing its data on Internet scams and phishing attacks, the Anti-Phishing Working Group (APWG), a cyber security nonprofit, acts like a clearinghouse for records. The APWG brings together other inte...

The New York Times Magazine

Nick Confessore

14 August 2018

California, United States

Multi-Media

Over 3000 Words

ADD TO COLLECTION
4
FAVORITE
VIEW STORY

Alastair Mactaggart, decided he had enough off companies like Facebook and Google, which make trillions of dollars from collecting private data from users. While the U.S. has made attempts to regulate consumer privacy...

Apolitical

Edward Siddons

5 December 2017

Winnipeg, Manitoba, Canada

Text

800-1500 Words

ADD TO COLLECTION
1
FAVORITE
VIEW STORY

For all the positive tools and platforms the internet has helped create over the decades, it can also be an extremely dark place, and has unfortunately enabled the horrific and wide-spread sharing of millions of image...

BBC

Fi Glover

Henrietta Moore

Martha Lane Fox

3 February 2016

Estonia

Radio

Over 15 Minutes

ADD TO COLLECTION
FAVORITE
VIEW STORY

Government services are easily accessible in Estonia in part because everything is online. A digital signature carries the same weight as a physical signature, and data is shared between offices allowing forms such as...

Christian Science Monitor

Michael Holtz

26 October 2015

United States

Multi-Media

1500-3000 Words

ADD TO COLLECTION
2
FAVORITE
VIEW STORY

Human trafficking can take an array of forms, it can happen in the sea, the dark web, and while working in the U.S. However, technological advancements are being used counter traffickers.

Christian Science Monitor

Harry Bruinius

31 May 2015

New York, New York, United States

Text

Over 3000 Words

ADD TO COLLECTION
1
FAVORITE
VIEW STORY

In an age of uncivil social media, a simple tweet can bring a torrent of threats and taunts. Online groups – digital vigilantes – are uncovering the anonymous people behind many of the taunts, and many states are tryi...

Al Jazeera

Molly McCluskey

20 March 2015

Tallin, Estonia

Text

1500-3000 Words

ADD TO COLLECTION
FAVORITE
VIEW STORY

Estonia is preparing to protect itself digitally from any neighbouring enemies. To do so it is trying to create 'data embassies', that would have the same protections as physical embassies, in order to protect the dig...

I WORK IN, TEACH, OR STUDY JOURNALISM Not a journalist, but I want to learn about solutions.
AS A MEMBER, YOU WILL BE ABLE TO:
  • Access our training curriculum or attend a training
  • Share your stories
  • Join a local community of journalists
  • Attend story workshops and events to hone your craft
  • Get funding and additional support
  • Access the full Solutions Story Tracker®
  • Save favorite stories and create collections in your user profile
  • Receive emails containing the above offerings via occasional email throughout your membership
TO JOIN, PLEASE SUBMIT THE FOLLOWING INFORMATION (*=REQUIRED)

Not a journalist? Register here instead.



Your information will be used to complete your application, and to subscribe you to occasional updates. We will only send you relevant information, which may be sent to you through any channel for which you provide contact information to us. We may use this information to target content we send you, but we will never sell or transfer your information to 3rd parties for commercial or advertising purposes. We may use your information to connect you to 3rd parties for the purpose of improving your membership and enriching your professional network. You can unsubscribe at any time from any content delivery channel, or from all of them, though unsubscribing may prevent you from participating in the opportunities provided by this program. View our full privacy policy here.

Here is what you will get:
  • Unlimited access to thousands of stories from around the world
  • First look and access to new features, tools, and resources
  • Curated newsletters with top stories
  • Invitations to SolutionsU® community events
  • Receive emails containing the above offerings via occasional email throughout your membership
  • And much more to come…
It’s easy and will take less than 2 minutes.

Journalist or J-School? Register here instead.



Your information will be used to complete your application, and to subscribe you to occasional updates. We will only send you relevant information, which may be sent to you through any channel for which you provide contact information to us. We may use this information to target content we send you, but we will never sell or transfer your information to 3rd parties for commercial or advertising purposes. We may use your information to connect you to 3rd parties for the purpose of improving your membership and enriching your professional network. You can unsubscribe at any time from any content delivery channel, or from all of them, though unsubscribing may prevent you from participating in the opportunities provided by this program. View our full privacy policy here.

Our issue area taxonomy was adapted from the PCS Taxonomy with definitions by the Foundation Center, which is licensed under Creative Commons Attribution Non Commercial 4.0 International License.

Photos are licensed under Attribution Non Commercial 2.0 Generic Creative Commons license / Desaturated from original, and are credited to the following photographers:

Fondriest Environmental, David De Wit / Community Eye Health, Linda Steil / Herald Post, John Amis / UGA College of Ag & Environmental Sciences – OCCS, Andy B, Peter Garnhum, Thomas Hawk, 7ty9, Isriya Paireepairit, David Berger, UnLtd The Foundation For Social Entrepreneurs, Michael Dunne, Burak Kebapci, and Forrest Berkshire / U.S. Army Cadet Command public affairs

Photos are licensed under Attribution Non Commercial Share Alike 2.0 Generic Creative Commons license, and are credited to the following photographers:

Ra'ed Qutena, 段 文慶, Fabio Campo, City Clock Magazine, Justin Norman, scarlatti2004, Gary Simmons, Kathryn McCallum, and Nearsoft Inc

Photos are licensed under CC0 1.0 Universal (CC0 1.0) Public Domain Dedication Creative Commons license / Desaturated from original, and are credited to the following photographers:

Burak Kebapci and SCY.

Photos are licensed under Attribution 2.0 Generic (CC BY 2.0) and are credited to the US Army Corps of Engineers.

Conference attendee listening to speaker, Jenifer Daniels / Colorstock getcolorstock.com.

Photo Credit: Kevork Djansezian via Getty Images

Photo Credit: Sonia Narang