100 WVIA Way
Pittston, PA 18640

Phone: 570-826-6144
Fax: 570-655-1180

Copyright © 2025 WVIA, all rights reserved. WVIA is a 501(c)(3) not-for-profit organization.
Play Live Radio
Next Up:
0:00
0:00
0:00 0:00
Available On Air Stations
In just 10 seconds, YOU can take a stand for WVIA! Tell Congress to Protect Public Media NOW!

Hackers & Cyber Attacks: Crash Course Computer Science #32

Season 1 Episode 32 | 11m 52s

Now, not all hackers are are malicious cybercriminals intent on stealing your data (these people are known as Black Hats). There are also White Hats who hunt for bugs, close security holes, and perform security evaluations for companies. And there are a lot of different motivations for hackers.

Aired: 10/17/17
Extras
In our SERIES FINALE of Crash Course Computer Science we take a look towards the future!
Today, we’re going to discuss some psychological considerations in building computers.
Today we’re going to talk about how computers understand speech and speak themselves.
Today we're going to talk about robots!
Today we’re going to talk about how computer science can support learning.
How do computers make decisions on the data they collect?
Today we’re going to talk about how computers see.
Today we’re going to talk about how to keep information secret, and this isn’t a new goal.
Cybersecurity is a set of techniques to protect data against threats.
Today we’re going to discuss how 3D graphics are created and rendered for a 2D screen.
Latest Episodes
In our SERIES FINALE of Crash Course Computer Science we take a look towards the future!
Today, we’re going to discuss some psychological considerations in building computers.
Today we’re going to talk about how computers understand speech and speak themselves.
Today we're going to talk about robots!
Today we’re going to talk about how computer science can support learning.
How do computers make decisions on the data they collect?
Today we’re going to talk about how computers see.
Today we’re going to talk about how to keep information secret, and this isn’t a new goal.
Cybersecurity is a set of techniques to protect data against threats.
Today we’re going to discuss how 3D graphics are created and rendered for a 2D screen.