Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Understanding Malware and Anti-Malware Products
In this video, you will learn about malware and the various anti-malware products. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section talks about...
Great Big Story
Inside Sweden's Pionen Data Centre, A High-Security Bunker
Tour the subterranean world of Pionen Data Centre, housed in a former nuclear bunker beneath Stockholm.
Curated Video
Propaganda Today
In the digital age, it’s never been easier for governments to influence our opinions and actions using propaganda. So what does propaganda actually look like in the 21st century – and how effective is it?
Curated Video
Browsing the Internet Safely
The video highlights the tips on how to browse the internet safely and what are the risky habits to avoid over the internet
National Institute of Standards and Technology
Launch of the National Strategy for Trusted Identities in Cyberspace
The Obama Administration released the National Strategy for Trusted Identities in Cyberspace (NSTIC) on April 15, 2011 during a meeting with about 250 business, government, and other leaders at the U.S. Chamber of Commerce in Washington,...
Next Animation Studio
TikTok secretly collected users’ MAC addresses: report
TikTok engaged in a banned data-collecting process that harvested highly personalized information from its users for more than a year, an investigation by the Wall Street Journal has found.
IDG TECHtalk
How to set up security in Office 365 to CIS recommendations
Following the Center for Internet Security’s benchmarks and checklists, here’s how to configure Microsoft Office 365 for the security level you need.
IDG TECHtalk
Microsoft’s Windows, Office 365 advice for secure elections
Microsoft has issued guidance and offered resources to help election officials and candidate campaigns to better protect their Windows and Office 365 systems.
IDG TECHtalk
The four pillars of Windows network security
Multi-factor authentication, strong patch management, device control, and adherence to security benchmarks go a long way to protecting your Windows network.
Curated Video
Explainer: The Security Flaw That's Freaked Out The Internet
A wide swath of critical industries, including electric power, water, food and beverage, manufacturing and transportation, were exposed.
Bloomberg
BlackBerry Wants to Teach You How to Defeat Hackers
Feb. 25 -- BlackBerry Ltd. is building out a consultancy business to help companies and governments defend against hackers as it seeks new revenue streams. Bloomberg TV Canada's, Pamela Ritchie speaks with Bloomberg News' technology...
AFP News Agency
CLEAN : Ethiopia mobile internet still off after a week
Getting online remains difficult in Ethiopia as the country enters the second week of its nationwide internet shutdown even as the government falsely claimed the service had been restored
Curated Video
List Of U.S. Government Agency Cyberattacks Grows
SolarWinds, the maker of the software targeted in the attack says thousands of its customers were also affected by the attack.
Other
Netsafe Net Basics
New Zealand-based cybersafety organization provides access to entertaining, educational animated videos on topics associated with online safety and media awareness. Find episodes on the dangers of downloading, firewalls, phishing,...
PBS
Nova Labs: The Secret Lives of Hackers
Hackers may not be who we think they are. In fact, you might be a hacker and not even know it. Learn the true meaning of hacking and some of the many reasons that hackers hack. [3:01]
PBS
Nova Labs: Cyber Codes
Do you trust the security of your email, text messages, and browser history? Learn how trustworthy online communication actually is and how encryption can protect your privacy. Sometimes. [3:25]
PBS
Nova Labs: A Cyber Privacy Parable
Follow the trials and tribulations of Tim as a seemingly innocent piece of digital information threatens to ruin his life when it falls into the wrong hands. [3:18]
Other
It Conversations: Future Proofing Your Privacy
This podcast addresses the issue of protecting your privacy today with threats from identity theft, malware, government surveillance, and consumer profiling. Marc Hedlund speaks about how can we best protect our future selves from the...
PBS
Pbs: Nova Science Now: Luis Von Ahn: Computer Scientist
In this video meet Luis von Ahn, a computer scientist and a professor at Carnegie Mellon who had a most successful idea-CAPTCHA-a test that humans can pass but computers cannot, which has been used to improve the security of Internet...
PBS
Pbs Learning Media: Online "Friends"
You know your friends in your neighborhood or at school because you see them almost every day, you play with them, sometimes you are in class with them, you see them at the store, the library, or the playground. On the Internet there are...