Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Welcome to the Course
In this video, the author talks about what to expect from this course and explains why cybersecurity is important. This clip is from the chapter "Introduction" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Exploiting Race Conditions Case 1 (Part1)
This is the first of the two-part video on exploiting race conditions for case 1. Here, you would be looking at how hackers use multithreading conditions for stealing money from a bank. This clip is from the chapter "Exploiting Race...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Exploiting Race Conditions – Case 1 (Part1)
This is the first of the two-part video on exploiting race conditions for case 1. Here, you would be looking at how the hackers use multithreading conditions for stealing money from a bank. This clip is from the chapter "Exploiting Race...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Summary – Hacking AngularJS Applications
This is a summary video on hacking AngularJS applications. This clip is from the chapter "Hacking AngularJS Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on hacking AngularJS...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Hacking AngularJS Applications
This video introduces the section. This clip is from the chapter "Hacking AngularJS Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on hacking AngularJS applications.
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Hacking Web Applications via PDFs, Images, and Links
This video introduces the section. This clip is from the chapter "Hacking Web Applications through PDFs, Images, and Links" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on hacking web...
Curated Video
I FINALLY understand the Maillard reaction
You’ve probably heard of the Maillard reaction, but here's how it actually works (AND how to hack it).
The Business Professor
Racketeering
Racketeering is a type of organized crime in which the persons set up a coercive, fraudulent, extortionary, or otherwise illegal coordinated scheme or operation to repeatedly or consistently collect a profit.
Vlogbrothers
They Hacked Me
Thank you to Sherri Davidoff from LMG Security for helping me both with this video and also with recovering from my hack. If you're thinking "I won't get hacked, I'm not a public person like Hank," that does NOT protect you. Most hacks...
Vlogbrothers
Hackers, Cyber crime, and a New Kind of War.
In which Hank talks briefly about the fundamental shift in espionage, warfare, crime, and activism that may re-define our age. Hackers have been mounting increasingly sophisticated attacks. Billions of dollars have been stolen, and even...
Curated Video
Handle Passwords Safely
This video will introduce you to best practices in handling your passwords
Curated Video
Introduction to Termux
A simple tool for ethical hacking is Termux. There are numerous tools for Termux available online, so we've compiled a list of the top hacking tools for Termux along with instructions on how to use each one.
Curated Video
Ethical Hacking with Kali Linux Introduction
This video is an introduction on ethical hacking
Next Animation Studio
How China used iPhone hack in Uyghur genocide
MIT’s Technology Review magazine recently analyzed the infamous Chaos hack that targeted iPhones in 2018, suggesting that China used a civilian competition to create the hack and then used it to spy on its Uyghur Muslim minority. The...
Physics Girl
The Most EXPLOSIVE Holiday Gift Ever; Making A Volcano From Wrapping Paper l The Great Gift Exchange
As part of THE GREAT GIFT EXCHANGE, Physics Girl is transported to a whimsical “Wrapshop” to wrap a charitable gift for creator Alex Wassabi. With help from The World’s Most Famous Gift Wrap Artist, Physics Girl creates an EXPLOSIVE gift...
TLDR News
Why Don't We Vote Online in Elections? - TLDR Explains
Voting can be complicated a time consuming, and having your say in an election can take its toll. That's why many have discussed taking voting online to make engaging in democracy quicker and easier. However, Estonia is the only country...
Science360
From Navy weather forecaster to NSF Graduate Research Fellow
Navy veteran Amy Battocletti describes her military service and her transition to academe. She is now a second-year Ph.D. student in the Biology Program at Georgetown University.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - DNS Security
DNS is a crucial network service used by everybody to resolve names to IP addresses and as a result, it is a target for attackers. This episode also discusses other protocols such has Simple Network Management Protocol (SNMP) and Secure...
Curated Video
Bug Bounty Program Certification 1.1: The Course Overview
This video provides an overview of the entire course.
NASA
NASA in Silicon Valley: Geert Barentsen Talks About Bringing People Together To Contribute to Exoplanet Science
A conversation with Geert Barentsen, the Guest Observer Office director for the Kepler and K2 mission at NASA’s Ames Research Center in Silicon Valley.
Englishing
Lesson on the FUTURE (Future Simple, going to, Present continuous, and Present Simple)
This lesson will delve into four types of tenses used for the future: Future Simple - will, going to, Present Continuous and Present Simple. For each one, Mr. P. will list the most important rules there are. He will provide examples as...
Next Animation Studio
U.S. charges four Chinese military operatives in Equifax 2017 hack
A federal grand jury charged four Chinese military officers on Tuesday for the massive hack of the credit rating giant Equifax that occurred in 2017.
The Wall Street Journal
The Year in Hacks
Andy Ellis, chief security officer at Akamai and Siobhan Gorman, partner, Cybersecurity and Privacy at Brunswick Group, dissect some of the biggest hacks of the past year.
Next Animation Studio
Possible ‘Havana Syndrome’ attack delays V.P. Harris’ flight
Havana Syndrome is a mysterious illness that many experts believe could only be caused by directed energy weapons that pulse invisible microwaves at targets.