Curated Video
The Beginners 2025 Cyber Security Awareness Training Course - Smartphones and Mobile Apps Part I
New ReviewIn Part I of this module, you will learn the general differences in security between iPhones and Androids, and why Androids can have some serious security issues that need to be addressed.
Curated Video
The Beginners 2025 Cyber Security Awareness Training Course - Apple Part II
New ReviewYou will be presented with some of the main ways in which Apple protects you from evilness on the Internet, as well as some general things you can do to protect yourself whilst using a Mac computer.
Curated Video
The Beginners 2025 Cyber Security Awareness Training Course - Apple Part I
New ReviewYou will learn about the general security around Apple computers. You will also learn why Apple operating systems can be very secure most of the time but can sometimes be just as insecure as other computers. In addition, you will be...
Curated Video
The Beginners 2025 Cyber Security Awareness Training Course - Vishing
New ReviewIn this entertaining module, you will learn how scammers are social engineering us by spoofing caller ID numbers, and calling us on our phones, asking for money, personal information, or access to our computers. You will be played...
Curated Video
The Beginners 2025 Cyber Security Awareness Training Course - Smishing
New ReviewIn this video module, you will learn about the sneaky art of social engineering using SMS text messaging on your mobile device. You will be shown examples of Smishing, and we will discuss the red flags that can be easily spotted in these...
Curated Video
U.S. Treasury says Chinese hackers accessed employee workstations, stole documents
The U.S. Treasury is accusing Chinese state-sponsored hackers of accessing several department workstations and unclassified documents after compromising a third-party software service provider. The department did not provide details on...
Seven Dimensions
Protecting Data and Sensitive Information at Work
An organization’s data is a valuable asset that needs to be protected from unauthorized access by competitors, cybercriminals, or any unverified third party. It is important to have strict policies around sensitive information. Know who...
Curated Video
QR Code Attacks
Delve into the world of QR code attacks in this revelatory video. Gain valuable insights into the potential risks and vulnerabilities associated with QR codes, and learn how cybercriminals exploit these seemingly harmless codes to...
Curated Video
Web Shoppers Beware: The SCOB Virus and the Threat to Online Security
This video discusses the SCOB virus, a recent web virus that has infected numerous computers and servers. The virus spreads through banner ads, pictures, and logos on trusted websites like eBay and Yahoo. Unlike traditional viruses, SCOB...
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Patching and Updates
This video demonstrates how applying Windows safety patches and updates is essential in constantly keeping the system safe and how to use these patches and updates.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - The World of Electronic Mails – Dangers, Attacks, and Protection
This section focuses on emails, the dangers of not protecting the emails or opening dangerous emails, how hackers attack using emails, and how to protect yourself from being hacked by emails.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Reconnaissance Methods
In this lesson, you will learn about footprinting, or the art of collecting information about a person or object of interest, called reconnaissance.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - What are Privacy, Anonymity, and Pseudonymity
In this video, you will learn more about privacy, anonymity, and pseudonymity concepts.
Curated Video
Practical Cyber Hacking Skills for Beginners - Target Reconnaissance
In this video, you will learn how to perform reconnaissance based on a specific target, usually, a location, understand the groundwork and infrastructure involved, and the possibilities of being able to hack.
Curated Video
Practical Cyber Hacking Skills for Beginners - Firewall and IDS Evasion Techniques
In this video, we will understand a firewall and the intrusion detecting system in NMAP for a packet or probe coming specifically from NMAP.
Curated Video
Practical Cyber Hacking Skills for Beginners - Phishing Notes
This continuation of the previous video explains phishing emails in detail and how to avoid phishing attacks.
Curated Video
Practical Cyber Hacking Skills for Beginners - NMAP Scripting
In this video, we will look at the different scripts used in NMAP, programs, or codes used to check the vulnerability of networks and other functional availabilities.
Curated Video
Flaws in the Internet's Border Gateway Protocol
The White House recently unveiled a plan to deal with networking weaknesses in the Border Gateway Protocol. In the past, the BGP has been exploited or misconfigured to cause massive disruptions on the Internet.
Topics Covered:
Biggest...
Science ABC
How Are Computer Games ‘Cracked’?
Game cracking involves bypassing security checks implemented by gaming companies. Hackers use tools such as kernel-mode debuggers, disassemblers, and hex-editors, which allow manipulation of the game's code. In this video, we will...
Curated Video
JavaScript Mastery from Zero to Hero - Prepare for Coding Interviews - Exercise - Virus Detection Algorithm with Asymmetric Arrays
This is an exercise video where you will work on a virus detection algorithm with the help of asymmetric arrays. This clip is from the chapter "Algorithms and Data Structures - Intermediate to Advanced" of the series "JavaScript Mastery...
Curated Video
A Detailed Guide to the OWASP Top 10 - API9:2023 Improper Inventory Management
In this session, we will address the challenges of Improper Inventory Management in API ecosystems and propose solutions for better management.
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - You Have Been HACKED - Now What?
In this video, you will look at steps to take after you have been hacked and how exactly you would respond. This clip is from the chapter "Conclusion" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Identify Legit Apps
In this video, the author shares a few tips on how to successfully navigate Google Play Store and download the right kind of application to help you identify legit apps and spot the fake apps out there. This clip is from the chapter...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Personal Cybersecurity - What I Do
In this video, the author talks about the necessary steps that he takes to keep himself and his data safe from malware and hackers. This clip is from the chapter "Introduction" of the series "The Absolute Beginners Guide to Cybersecurity...