SciShow
Hacking the Brain: The Future of Prosthetics
We usually think of 'hacking' as a bad thing, but scientists are working on ways to hack the brain that will greatly benefit people with prosthetics, and maybe someday people with paralysis.
Curated Video
Apple Boosts iPhone Security After Spyware Find
FOR CLEAN VERSION SEE STORY NUMBER: apus061994APPLE ISSUED AN IPHONE SECURITY UPDATE AFTER RESEARCHERS UNCOVERED POWERFUL ESPIONAGE SOFTWARE ON AN ACTIVIST'S PHONE IN THE MIDDLE EAST. APPLE IN A STATEMENT SAYS IT FIXED THE VULNERABILITY...
TED Talks
TED: Everyday cybercrime -- and what you can do about it | James Lyne
* Viewer discretion advised. This video includes discussion of mature topics and may be inappropriate for some audiences. How do you pick up a malicious online virus, the kind of malware that snoops on your data and taps your bank...
TED Talks
Kevin Kelly: How technology evolves
Tech enthusiast Kevin Kelly asks "What does technology want?" and discovers that its movement toward ubiquity and complexity is much like the evolution of life.
TED Talks
Misha Glenny: Hire the hackers!
Despite multibillion-dollar investments in cybersecurity, one of its root problems has been largely ignored: who are the people who write malicious code? Underworld investigator Misha Glenny profiles several convicted coders from around...
SciShow
Cybersecurity & a Hacker Called Alien | SciShow Talk Show
Jeremy Smith and Sherri Davidoff talk hacking, cyber security, and the end of the world, and Jessi stops by with Rook the Raven.
TED Talks
TED: Why good hackers make good citizens | Catherine Bracy
Hacking is about more than mischief-making or political subversion. As Catherine Bracy describes in this spirited talk, it can be just as much a force for good as it is for evil. She spins through some inspiring civically-minded projects...
TED Talks
Christopher Soghoian: Government surveillance — this is just the beginning
Privacy researcher Christopher Soghoian sees the landscape of government surveillance shifting beneath our feet, as an industry grows to support monitoring programs. Through private companies, he says, governments are buying technology...
SciShow
How Hackers Hack, and How To Stop Them
Hacking is tough, but stopping hackers can be even tougher.
SciShow
Hacking the Brain: The Future of Prosthetics
We usually think of 'hacking' as a bad thing, but scientists are working on ways to hack the brain that will greatly benefit people with prosthetics, and maybe someday people with paralysis.
SciShow
How the Massive Equifax Data Breach Happened
There was a massive data breach in the United States, and chances are you're probably affected by it. While Hank can't undo what was done, he can give you some insight into how it all went down.
SciShow
How Do Chips Make Credit Cards More Secure?
If you live in the United States, you might have recently gotten a credit card with a microchip on it. But what does this chip do that makes it any different than the magnetic strip on the back of the card?
Curated Video
The Evolution and History of Football: From Ancient Origins to FIFA
This video provides a historical overview of the origins and development of football, from ancient ball games to the formation of the Football Association and the creation of the modern rules of the game. It highlights the significance...
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Welcome to the Course
This video outlines an introduction about the author as he explains what you will learn as the course advances and the topics covered in general.
Curated Video
Practical Cyber Hacking Skills for Beginners - Kali Linux Walkthrough
This video is a demonstrative walkthrough of the Kali Linux operative system, how to use it, and work on it.
Curated Video
Practical Cyber Hacking Skills for Beginners - Section Preview-3
This is a brief outline of the concepts of Kali Linux that you will learn in this section.
Curated Video
Practical Cyber Hacking Skills for Beginners - The Bad Guys - Black Hats, Cyber Criminals and Disgruntled Employees
Here, you will learn more about hackers, how they operate, their intentions, and how they differ based on the hacking methodologies.
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Case Studies of Award-Winning Race Condition Attacks
This video explains some case studies of award-winning race condition attacks. This clip is from the chapter "Exploiting Race Conditions with OWASP ZAP" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".null
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Exploiting Race Conditions Case 2
This video explains exploiting race conditions for case 2. Here, you would be looking at how the hackers reuse a one-time discount code. This clip is from the chapter "Exploiting Race Conditions with OWASP ZAP" of the series "Web...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Exploiting Race Conditions Case 1 (Part2)
This is the first of the two-part video on exploiting race conditions for case 2. Here, you would be looking at how the hackers use another race condition for stealing money from a bank. This clip is from the chapter "Exploiting Race...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Exploiting Race Conditions Case 1 (Part1)
This is the first of the two-part video on exploiting race conditions for case 1. Here, you would be looking at how hackers use multithreading conditions for stealing money from a bank. This clip is from the chapter "Exploiting Race...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Introduction-What is Covered in This Course?
This video provides an introduction to the section. This clip is from the chapter "Exploiting Race Conditions with OWASP ZAP" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".null
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Fuzzing with Burp Suite Intruder Tips and Tricks
This video helps you with tips and tricks on Fuzzing with Burp Suite Intruder. You will learn some advanced tricks that can be used in your own projects as well. This clip is from the chapter "Fuzzing with Burp Suite Intruder" of the...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Fuzzing for Path Traversal Demo
This is a demo video on Fuzzing for path traversal. This clip is from the chapter "Fuzzing with Burp Suite Intruder" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses on Fuzzing with Burp Suite...