Instructional Video5:09
SciShow

Hacking the Brain: The Future of Prosthetics

12th - Higher Ed
We usually think of 'hacking' as a bad thing, but scientists are working on ways to hack the brain that will greatly benefit people with prosthetics, and maybe someday people with paralysis.
News Clip2:44
Curated Video

Apple Boosts iPhone Security After Spyware Find

Higher Ed
FOR CLEAN VERSION SEE STORY NUMBER: apus061994APPLE ISSUED AN IPHONE SECURITY UPDATE AFTER RESEARCHERS UNCOVERED POWERFUL ESPIONAGE SOFTWARE ON AN ACTIVIST'S PHONE IN THE MIDDLE EAST. APPLE IN A STATEMENT SAYS IT FIXED THE VULNERABILITY...
Instructional Video17:22
TED Talks

TED: Everyday cybercrime -- and what you can do about it | James Lyne

12th - Higher Ed
* Viewer discretion advised. This video includes discussion of mature topics and may be inappropriate for some audiences. How do you pick up a malicious online virus, the kind of malware that snoops on your data and taps your bank...
Instructional Video19:50
TED Talks

Kevin Kelly: How technology evolves

12th - Higher Ed
Tech enthusiast Kevin Kelly asks "What does technology want?" and discovers that its movement toward ubiquity and complexity is much like the evolution of life.
Instructional Video18:32
TED Talks

Misha Glenny: Hire the hackers!

12th - Higher Ed
Despite multibillion-dollar investments in cybersecurity, one of its root problems has been largely ignored: who are the people who write malicious code? Underworld investigator Misha Glenny profiles several convicted coders from around...
Instructional Video28:44
SciShow

Cybersecurity & a Hacker Called Alien | SciShow Talk Show

12th - Higher Ed
Jeremy Smith and Sherri Davidoff talk hacking, cyber security, and the end of the world, and Jessi stops by with Rook the Raven.
Instructional Video9:50
TED Talks

TED: Why good hackers make good citizens | Catherine Bracy

12th - Higher Ed
Hacking is about more than mischief-making or political subversion. As Catherine Bracy describes in this spirited talk, it can be just as much a force for good as it is for evil. She spins through some inspiring civically-minded projects...
Instructional Video8:18
TED Talks

Christopher Soghoian: Government surveillance — this is just the beginning

12th - Higher Ed
Privacy researcher Christopher Soghoian sees the landscape of government surveillance shifting beneath our feet, as an industry grows to support monitoring programs. Through private companies, he says, governments are buying technology...
Instructional Video8:22
SciShow

How Hackers Hack, and How To Stop Them

12th - Higher Ed
Hacking is tough, but stopping hackers can be even tougher.
Instructional Video5:08
SciShow

Hacking the Brain: The Future of Prosthetics

12th - Higher Ed
We usually think of 'hacking' as a bad thing, but scientists are working on ways to hack the brain that will greatly benefit people with prosthetics, and maybe someday people with paralysis.
Instructional Video5:18
SciShow

How the Massive Equifax Data Breach Happened

12th - Higher Ed
There was a massive data breach in the United States, and chances are you're probably affected by it. While Hank can't undo what was done, he can give you some insight into how it all went down.
Instructional Video2:25
SciShow

How Do Chips Make Credit Cards More Secure?

12th - Higher Ed
If you live in the United States, you might have recently gotten a credit card with a microchip on it. But what does this chip do that makes it any different than the magnetic strip on the back of the card?
Instructional Video7:37
Curated Video

The Evolution and History of Football: From Ancient Origins to FIFA

6th - Higher Ed
This video provides a historical overview of the origins and development of football, from ancient ball games to the formation of the Football Association and the creation of the modern rules of the game. It highlights the significance...
Instructional Video5:08
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Welcome to the Course

Higher Ed
This video outlines an introduction about the author as he explains what you will learn as the course advances and the topics covered in general.
Instructional Video5:03
Curated Video

Practical Cyber Hacking Skills for Beginners - Kali Linux Walkthrough

Higher Ed
This video is a demonstrative walkthrough of the Kali Linux operative system, how to use it, and work on it.
Instructional Video1:49
Curated Video

Practical Cyber Hacking Skills for Beginners - Section Preview-3

Higher Ed
This is a brief outline of the concepts of Kali Linux that you will learn in this section.
Instructional Video5:32
Curated Video

Practical Cyber Hacking Skills for Beginners - The Bad Guys - Black Hats, Cyber Criminals and Disgruntled Employees

Higher Ed
Here, you will learn more about hackers, how they operate, their intentions, and how they differ based on the hacking methodologies.
Instructional Video2:26
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Case Studies of Award-Winning Race Condition Attacks

Higher Ed
This video explains some case studies of award-winning race condition attacks. This clip is from the chapter "Exploiting Race Conditions with OWASP ZAP" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".null
Instructional Video10:53
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Exploiting Race Conditions Case 2

Higher Ed
This video explains exploiting race conditions for case 2. Here, you would be looking at how the hackers reuse a one-time discount code. This clip is from the chapter "Exploiting Race Conditions with OWASP ZAP" of the series "Web...
Instructional Video8:36
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Exploiting Race Conditions Case 1 (Part2)

Higher Ed
This is the first of the two-part video on exploiting race conditions for case 2. Here, you would be looking at how the hackers use another race condition for stealing money from a bank. This clip is from the chapter "Exploiting Race...
Instructional Video11:28
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Exploiting Race Conditions Case 1 (Part1)

Higher Ed
This is the first of the two-part video on exploiting race conditions for case 1. Here, you would be looking at how hackers use multithreading conditions for stealing money from a bank. This clip is from the chapter "Exploiting Race...
Instructional Video1:47
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Introduction-What is Covered in This Course?

Higher Ed
This video provides an introduction to the section. This clip is from the chapter "Exploiting Race Conditions with OWASP ZAP" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".null
Instructional Video5:26
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Fuzzing with Burp Suite Intruder Tips and Tricks

Higher Ed
This video helps you with tips and tricks on Fuzzing with Burp Suite Intruder. You will learn some advanced tricks that can be used in your own projects as well. This clip is from the chapter "Fuzzing with Burp Suite Intruder" of the...
Instructional Video11:36
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Fuzzing for Path Traversal Demo

Higher Ed
This is a demo video on Fuzzing for path traversal. This clip is from the chapter "Fuzzing with Burp Suite Intruder" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses on Fuzzing with Burp Suite...