Instructional Video14:36
TED Talks

Andrew Marantz: Inside the bizarre world of internet trolls and propagandists

12th - Higher Ed
Journalist Andrew Marantz spent three years embedded in the world of internet trolls and social media propagandists, seeking out the people who are propelling fringe talking points into the heart of conversation online and trying to...
Instructional Video17:53
SciShow

5 Videos on the Science of Memory

12th - Higher Ed
Michael Aranda hosts a compilation of videos discussing the science of memory!
Instructional Video9:33
TED Talks

TED: How (and why) Russia hacked the uS election | Laura Galante

12th - Higher Ed
Hacking, fake news, information bubbles ... all these and more have become part of the vernacular in recent years. But as cyberspace analyst Laura Galante describes in this alarming talk, the real target of anyone looking to influence...
Instructional Video16:53
TED Talks

Avi Rubin: All your devices can be hacked

12th - Higher Ed
Could someone hack your pacemaker? Avi Rubin shows how hackers are compromising cars, smartphones and medical devices, and warns us about the dangers of an increasingly hack-able world.
Instructional Video6:01
SciShow

How Meltdown and Spectre Make Your Computer Vulnerable

12th - Higher Ed
Another year, another security breach that could expose all of your information. Installing updates might be a good New Year's resolution.
Instructional Video9:20
TED Talks

Mikko Hypponen: Three types of online attack

12th - Higher Ed
Cybercrime expert Mikko Hypponen talks us through three types of online attack on our privacy and data -- and only two are considered crimes. "Do we blindly trust any future government? Because any right we give away, we give away for...
Instructional Video8:18
TED Talks

Christopher Soghoian: Government surveillance — this is just the beginning

12th - Higher Ed
Privacy researcher Christopher Soghoian sees the landscape of government surveillance shifting beneath our feet, as an industry grows to support monitoring programs. Through private companies, he says, governments are buying technology...
Instructional Video5:30
TED Talks

Johnny Lee: Free or cheap Wii Remote hacks

12th - Higher Ed
Building sophisticated educational tools out of cheap parts, Johnny Lee demos his cool Wii Remote hacks, which turn the $40 video game controller into a digital whiteboard, a touchscreen and a head-mounted 3-D viewer.
Instructional Video15:38
TED Talks

Todd Humphreys: How to fool a GPS

12th - Higher Ed
Todd Humphreys forecasts the near-future of geolocation when millimeter-accurate GPS "dots" will enable you to find pin-point locations, index-search your physical possessions ... or to track people without their knowledge. And the...
Instructional Video7:05
TED Talks

TED: This scientist makes ears out of apples | Andrew Pelling

12th - Higher Ed
TeD Fellow Andrew Pelling is a biohacker, and nature is his hardware. His favorite materials are the simplest ones (and oftentimes he finds them in the garbage). Building on the cellulose structure that gives an apple its shape, he...
Instructional Video17:37
TED Talks

Lorrie Faith Cranor: What’s wrong with your pa$$w0rd?

12th - Higher Ed
Lorrie Faith Cranor studied thousands of real passwords to figure out the surprising, very common mistakes that users -- and secured sites -- make to compromise security. And how, you may ask, did she study thousands of real passwords...
Instructional Video14:28
TED Talks

TED: Where is cybercrime really coming from? | Caleb Barlow

12th - Higher Ed
Cybercrime netted a whopping $450 billion in profits last year, with 2 billion records lost or stolen worldwide. Security expert Caleb Barlow calls out the insufficiency of our current strategies to protect our data. His solution? We...
Instructional Video12:56
TED Talks

Eva Galperin: What you need to know about stalkerware

12th - Higher Ed
"Full access to a person's phone is the next best thing to full access to a person's mind," says cybersecurity expert Eva Galperin. In an urgent talk, she describes the emerging danger of stalkerware -- software designed to spy on...
Instructional Video2:37
MinuteEarth

The Secrets of Extreme Breath Holding

12th - Higher Ed
Humans can hold our breath longer than we think by taking advantage of our body’s innate survival instincts - and then ignoring them. __________________________________________ To learn more, start your googling with these keywords:...
Instructional Video11:44
TED Talks

Dale Dougherty: We are makers

12th - Higher Ed
America was built by makers -- curious, enthusiastic amateur inventors whose tinkering habit sparked whole new industries. At TED@MotorCity, MAKE magazine publisher Dale Dougherty says we're all makers at heart, and shows cool new tools...
Instructional Video11:20
Crash Course

Hackers & Cyber Attacks: Crash Course Computer Science

12th - Higher Ed
Today we're going to talk about hackers and their strategies for breaking into computer systems. Now, not all hackers are malicious cybercriminals intent on stealing your data (these people are known as Black Hats). There are also White...
Instructional Video7:45
TED Talks

TED: Your smartphone is a civil rights issue | Christopher Soghoian

12th - Higher Ed
The smartphone you use reflects more than just personal taste ... it could determine how closely you can be tracked, too. Privacy expert and TED Fellow Christopher Soghoian details a glaring difference between the encryption used on...
Instructional Video4:25
TED Talks

Joe Smith: How to use a paper towel

12th - Higher Ed
You use paper towels to dry your hands every day, but chances are, you're doing it wrong. In this enlightening and funny short talk, Joe Smith reveals the trick to perfect paper towel technique.
Instructional Video16:39
TED Talks

Keren Elazari: Hackers: the Internet's immune system

12th - Higher Ed
The beauty of hackers, says cybersecurity expert Keren Elazari, is that they force us to evolve and improve. Yes, some hackers are bad guys, but many are working to fight government corruption and advocate for our rights. By exposing...
Instructional Video8:53
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Anatomy of a Social Engineering Attack

Higher Ed
This video will examine hackers' process of creating an attack using the social engineering technique.
Instructional Video1:44
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Meet Kevin Mitnick

Higher Ed
This video is an overview of a famous hacker, Kevin Mitnick, that highlights his hacking techniques.
Instructional Video5:32
Curated Video

Practical Cyber Hacking Skills for Beginners - The Bad Guys - Black Hats, Cyber Criminals and Disgruntled Employees

Higher Ed
Here, you will learn more about hackers, how they operate, their intentions, and how they differ based on the hacking methodologies.
Instructional Video3:56
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Anonymizer

Higher Ed
In this video, we will look at the tools and software used to make activity on the Internet untraceable.
Instructional Video2:30
Curated Video

Fundamentals of Secure Software - OWASP ZAP (Zed Attack Proxy)

Higher Ed
In this video, we will install and configure OWASP ZAP.