Curated Video
Wireshark D2 V5 - Toolbars
DAY TWO - We will explore Wireshark interface in details - Video 5: Toolbars
Curated Video
Cyber Security Issues
This video sheds the light on some ethical issues of cyber security jobs
Curated Video
Run a Simple Ransomware
In this tutorial, you will learn how to create a very simple Ransomware to encrypt files, and how to use a Decrypter to gain access to these files again. THIS VIDEO IS FOR EDUCATIONAL PURPOSES ONLY. I AM NOT RESPONSIBLE FOR YOUR ACTIONS....
Curated Video
Wireshark D4 V3 - UDP Deep Dive
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 3: UDP deep-dive
Curated Video
How to Protect Your Data
This video introduces different techniques on how to protect your data
Curated Video
Ethical Hacking with Kali Linux Introduction
This video is an introduction on ethical hacking
Curated Video
Bluetooth Devices Recon
In this tutorial, you will learn how to recon BT devices and enumerate its services.
Curated Video
OWASP Mobile op 10
In this video, we will be discussing the OWASP Mobile Top 10, which is a list of the most critical security risks for mobile applications. We will go through each of the top 10 risks and explain what they are, how they can be exploited,...
Curated Video
History of iPhone Attacks
In this video, we delve into the fascinating and often alarming history of iPhone attacks. From the first jailbreaks to the infamous iCloud celebrity photo leak, we explore the various ways in which hackers have targeted Apple's iconic...
National Institute of Standards and Technology
Launch of the National Cybersecurity Center of Excellence
At a news briefing held on Feb. 21, 2012, the National Institute of Standards and Technology (NIST) announced the launch of the National Cybersecurity Center of Excellence, a public-private collaboration for accelerating the widespread...
Next Animation Studio
How China used iPhone hack in Uyghur genocide
MIT’s Technology Review magazine recently analyzed the infamous Chaos hack that targeted iPhones in 2018, suggesting that China used a civilian competition to create the hack and then used it to spy on its Uyghur Muslim minority. The...
National Institute of Standards and Technology
Information Technology Security For Small Business
Gives small business owners a glimpse into the resources from NIST, SBA, and the FBI that will help protect them from cyber crime. The video describes computer hacking, denial-of-service, laptop theft, insider abuse, computer viruses,...
Curated Video
Guiding Principle - Reliability and Safety
In this video, we will cover a guiding principle - reliability and safety. This clip is from the chapter "AI Workloads and Considerations (15-20%)" of the series "AI-900: Microsoft Azure AI Fundamentals Video Course + Ques".In this...
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Confidentiality, Availability, and Integrity Attacks
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. It’s important to know the main...
Science360
Researchers discover how coffee house hackers are stealing computer data - Science Now 30
In this week's episode, we explore how babies learn, discover what is threatening coral reefs, see how coffee house hackers are stealing computer data, and finally, we explore how our brain remembers information. Check it out!
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Risk - Attackers and Types of Attacks - Part 1
This is the first part of the two-part video that explains risk attackers and their types. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
Next Animation Studio
North Korean hackers stole sensitive information from Microsoft users
Microsoft has filed a lawsuit against two anonymous North Korean hackers for stealing user information in a hacking operation called Thallium.
Science360
Researchers explore how babies learn! NSF Science Now 30
In this week’s episode, we explore how babies learn, discover what is threatening coral reefs, see how coffee house hackers are stealing computer data and, finally, we explore our memories. Check it out!
Science360
NSF Science Now: Episode 30
In this week's episode, we explore how babies learn, discover what is threatening coral reefs, see how coffee house hackers are stealing computer data and, finally, we explore our memories. Check it out!
Next Animation Studio
U.S. charges four Chinese military operatives in Equifax 2017 hack
A federal grand jury charged four Chinese military officers on Tuesday for the massive hack of the credit rating giant Equifax that occurred in 2017.
The Wall Street Journal
Lessons From a Data Breach
Jamil Farshchi, chief information security officer at Equifax, and Jo De Vliegher, chief information officer at Norsk Hydro, give their firsthand account of suffering a data breach and how they responded.
Curated Video
Explain web security : Methodolo-gy of Hack-ers
From the section: Steps for Ethical Hacking. In this part, you are going to learn how hackers think and act before and after they hack a system, and how they gather sensitive information. We’ll follow the same steps to test whether we...
Curated Video
Describe cyber attacks that could affect a computer system or network : Leaving a Backdoor in the Target Machine
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will find out what is persistent...
IDG TECHtalk
Why new remote work policies attract hackers
With widespread mandated work from home policies due to the coronavirus, many employees are working remotely for the first time. In some cases, employers had never intended their employees to be remote-only, and they may lack key work...