PBS
Our “Junk DNA” Is More Important Than We Once Thought
In the search for the genes that make us human, some of the most important answers were hiding not in the genes themselves, but in what was once considered genomic junk.
PBS
Thinking about math in terms of literacy - not levels
Algebra is a core subject for U.S. high school students. But should it be? Author Andrew Hacker believes we should reconsider how math is taught: only 5 percent of the American workforce actually uses math beyond arithmetic, though...
Curated Video
Apple Boosts iPhone Security After Spyware Find
FOR CLEAN VERSION SEE STORY NUMBER: apus061994APPLE ISSUED AN IPHONE SECURITY UPDATE AFTER RESEARCHERS UNCOVERED POWERFUL ESPIONAGE SOFTWARE ON AN ACTIVIST'S PHONE IN THE MIDDLE EAST. APPLE IN A STATEMENT SAYS IT FIXED THE VULNERABILITY...
SciShow
Why Was the WannaCry Attack Such a Big Deal?
On Friday, May 12th, 2017, the ransomware program WannaCry started spreading to computers all over the world at an alarming rate. A couple days later, it was basically completely contained with very little damage done. So what happened?
TED Talks
Misha Glenny: Hire the hackers!
Despite multibillion-dollar investments in cybersecurity, one of its root problems has been largely ignored: who are the people who write malicious code? Underworld investigator Misha Glenny profiles several convicted coders from around...
TED Talks
TED: Why good hackers make good citizens | Catherine Bracy
Hacking is about more than mischief-making or political subversion. As Catherine Bracy describes in this spirited talk, it can be just as much a force for good as it is for evil. She spins through some inspiring civically-minded projects...
SciShow
5 Devastating Security Flaws You've Never Heard Of
Devastating vulnerabilities are hiding in the technology in programs, protocols, and hardware all around us. Most of the time, you can find ways to protect yourself.
TED Talks
Tim Leberecht: 3 ways to (usefully) lose control of your brand
The days are past (if they ever existed) when a person, company or brand could tightly control their reputation -- online chatter and spin mean that if you're relevant, there's a constant, free-form conversation happening about you that...
Crash Course
The Biggest Problems We're Facing Today & The Future of Engineering: Crash Course Engineering #46
In our final episode of Crash Course Engineering we are going to take all the tools and ideas we’ve discussed throughout this series and try to imagine where we’re headed. We’re going to explore some of the biggest problems that today’s...
SciShow
How Hackers Hack, and How To Stop Them
Hacking is tough, but stopping hackers can be even tougher.
Crash Course
Hackers & Cyber Attacks: Crash Course Computer Science
Today we're going to talk about hackers and their strategies for breaking into computer systems. Now, not all hackers are malicious cybercriminals intent on stealing your data (these people are known as Black Hats). There are also White...
SciShow
How the Krack Hack Breaks Wi-Fi Security
After 14 years of going unnoticed, a vulnerability in Wi-Fi security was published last week. It's a serious problem, but it's already in the process of being fixed.
SciShow
Is Public WiFi Safe
You might want to think twice before signing into that too-good-to-be-true "Free Airport Wi-Fi." It might not be what you think it is.
SciShow
How the Massive Equifax Data Breach Happened
There was a massive data breach in the United States, and chances are you're probably affected by it. While Hank can't undo what was done, he can give you some insight into how it all went down.
Crash Course
Cybersecurity: Crash Course Computer Science
Cybersecurity is a set of techniques to protect the secrecy, integrity, and availability of computer systems and data against threats. In today’s episode, we’re going to unpack these three goals and talk through some strategies we use...
TED Talks
Keren Elazari: Hackers: the Internet's immune system
The beauty of hackers, says cybersecurity expert Keren Elazari, is that they force us to evolve and improve. Yes, some hackers are bad guys, but many are working to fight government corruption and advocate for our rights. By exposing...
Curated Video
Web Shoppers Beware: The SCOB Virus and the Threat to Online Security
This video discusses the SCOB virus, a recent web virus that has infected numerous computers and servers. The virus spreads through banner ads, pictures, and logos on trusted websites like eBay and Yahoo. Unlike traditional viruses, SCOB...
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Patching and Updates
This video demonstrates how applying Windows safety patches and updates is essential in constantly keeping the system safe and how to use these patches and updates.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - The World of Electronic Mails – Dangers, Attacks, and Protection
This section focuses on emails, the dangers of not protecting the emails or opening dangerous emails, how hackers attack using emails, and how to protect yourself from being hacked by emails.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Reconnaissance Methods
In this lesson, you will learn about footprinting, or the art of collecting information about a person or object of interest, called reconnaissance.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - What are Privacy, Anonymity, and Pseudonymity
In this video, you will learn more about privacy, anonymity, and pseudonymity concepts.
Curated Video
Practical Cyber Hacking Skills for Beginners - Target Reconnaissance
In this video, you will learn how to perform reconnaissance based on a specific target, usually, a location, understand the groundwork and infrastructure involved, and the possibilities of being able to hack.
Curated Video
Practical Cyber Hacking Skills for Beginners - Firewall and IDS Evasion Techniques
In this video, we will understand a firewall and the intrusion detecting system in NMAP for a packet or probe coming specifically from NMAP.
Curated Video
Practical Cyber Hacking Skills for Beginners - Phishing Notes
This continuation of the previous video explains phishing emails in detail and how to avoid phishing attacks.