Latest News from NPR

on:

NCPR is supported by:

 
Hourly Newscast
4 min., 45 sec.

Programs

Latest program rundown

Coming up:

Latest Features:
July 25, 2014 | NPR · Steve Inskeep talks with Honduran Foreign Minister Mireya Aguero de Corrales, who's in Washington to help find a solution to the thousands of Central American children arriving at the U.S. border.
 
July 25, 2014 | WBUR · Massachusetts is offering to house hundreds of unaccompanied minors who've been detained crossing the U.S.-Mexico border. One of the proposed sites is on Cape Cod, but residents are blasting the plan.
 
July 25, 2014 | NPR · The novels of John le Carre have been reliable sources of compelling cinema. The new adaptation of "A Most Wanted Man" stars Philip Seymour Hoffman in one of his last roles.
 

Latest program rundown

Coming up:

Latest Features:
July 25, 2014 | NPR · Central American presidents met with President Obama, discussing the influx of unaccompanied children crossing the border. So far, Obama has not seen eye to eye with Congress on possible solutions.
 
July 25, 2014 | NPR · Regular political commentators, E.J. Dionne of The Washington Post and David Brooks of The New York Times, discuss U.S. policy options in the Gaza Strip and Rep. Paul Ryan's anti-poverty plan.
 
July 25, 2014 | NPR · Sayed Kashua is an Arab who writes novels in Hebrew and a sitcom in Arabic. A contradiction? Maybe. But his newest book is a good look at an often-overlooked segment of the Israeli population.
 

Latest Saturday rundown




WE Saturday Feature

July 26, 2014 | NPR · Hezbollah has been a longtime ally of Hamas, but during this most recent conflict between Israel and Gaza they've taken a sideline role. NPR's Scott Simon talks to the BBC's Kim Ghattas in Beirut.
 

Latest Sunday rundown


WE Sunday Feature

July 20, 2014 | NPR · NPR's Arun Rath gets the latest from correspondent Corey Flintoff at the site of last week's downing of a Malaysian jetliner in Eastern Ukraine.
 

Latest program rundown

Coming up:

security

Jul 11, 2014 — The sloppy handling by federal scientists of the world's scariest germs must stop, says the dismayed head of the Centers for Disease Control and Prevention. Are his new rules enough?
Launch in player | Comments |
Apr 24, 2014 — Google, Intel and others say they will now financially support the open-source software that encrypts much of the traffic on the Internet. The effort follows the discovery of a key security flaw.
Launch in player | Comments |
Feb 13, 2014 — The world is at greater risk than ever from pandemics and biological weapons, health officials said Thursday. In response, the U.S. government is spearheading a global effort to build an early warning system for infectious diseases, drug-resistant microbes and possible bioterror agents.
Launch in player | Comments |
Aug 16, 2013 — This summer, The New York Times moved all of it reporters' email to corporate Gmail accounts. This move to a third party could leave Times reporters and their sources with fewer legal protections if they are the subject of a government investigation.
Launch in player | Comments |
Aug 2, 2013 — Few details have emerged about the U.S. plan to shut down embassies that would normally be open this Sunday. A senior State Department official says that the U.S. facilities may close for more days, as well. The closures are described as "precautionary steps" taken "out of an abundance of caution."
Comments |
Jul 30, 2013 — Chris Valasek and Charlie Miller have been hacking into products for a long time. But they don't steal stuff or mess with people; instead, their purpose is to pressure companies into making their products more secure. Their recent research on hacking cars has shown just how dangerous these kinds of attacks could be.
Launch in player | Comments |
Jun 11, 2013 — Big Data raises concerns about more than just privacy. The debate opening up before us is an essential one for a culture dominated by science and technology. Who determines if a technology is adopted? Who determines when and how it will be deployed? Who owns our data? What are our rights in this new world?
Comments |
Feb 17, 2013 — For a fee, Silent Circle erases messages from both the receiver and the sender's phones. The app's creators got the idea after hearing an all-too-familiar story: A friend of theirs inadvertently read a text meant for someone else.
Launch in player | Comments |
Jul 7, 2010 — Forget your social security or credit card numbers — some hackers can now access your personal identification with just your cell phone number.
Comments |
Apr 28, 2010 — A new ad for Internet monitoring software from Spector Pro is the scariest thing we've ever seen.
Comments |
more security from NPR