TED Talks
Andrew Marantz: Inside the bizarre world of internet trolls and propagandists
Journalist Andrew Marantz spent three years embedded in the world of internet trolls and social media propagandists, seeking out the people who are propelling fringe talking points into the heart of conversation online and trying to...
SciShow
5 Videos on the Science of Memory
Michael Aranda hosts a compilation of videos discussing the science of memory!
TED Talks
TED: How (and why) Russia hacked the uS election | Laura Galante
Hacking, fake news, information bubbles ... all these and more have become part of the vernacular in recent years. But as cyberspace analyst Laura Galante describes in this alarming talk, the real target of anyone looking to influence...
TED Talks
Avi Rubin: All your devices can be hacked
Could someone hack your pacemaker? Avi Rubin shows how hackers are compromising cars, smartphones and medical devices, and warns us about the dangers of an increasingly hack-able world.
SciShow
How Meltdown and Spectre Make Your Computer Vulnerable
Another year, another security breach that could expose all of your information. Installing updates might be a good New Year's resolution.
TED Talks
Mikko Hypponen: Three types of online attack
Cybercrime expert Mikko Hypponen talks us through three types of online attack on our privacy and data -- and only two are considered crimes. "Do we blindly trust any future government? Because any right we give away, we give away for...
TED Talks
Christopher Soghoian: Government surveillance — this is just the beginning
Privacy researcher Christopher Soghoian sees the landscape of government surveillance shifting beneath our feet, as an industry grows to support monitoring programs. Through private companies, he says, governments are buying technology...
TED Talks
Johnny Lee: Free or cheap Wii Remote hacks
Building sophisticated educational tools out of cheap parts, Johnny Lee demos his cool Wii Remote hacks, which turn the $40 video game controller into a digital whiteboard, a touchscreen and a head-mounted 3-D viewer.
TED Talks
Todd Humphreys: How to fool a GPS
Todd Humphreys forecasts the near-future of geolocation when millimeter-accurate GPS "dots" will enable you to find pin-point locations, index-search your physical possessions ... or to track people without their knowledge. And the...
TED Talks
TED: This scientist makes ears out of apples | Andrew Pelling
TeD Fellow Andrew Pelling is a biohacker, and nature is his hardware. His favorite materials are the simplest ones (and oftentimes he finds them in the garbage). Building on the cellulose structure that gives an apple its shape, he...
TED Talks
Lorrie Faith Cranor: What’s wrong with your pa$$w0rd?
Lorrie Faith Cranor studied thousands of real passwords to figure out the surprising, very common mistakes that users -- and secured sites -- make to compromise security. And how, you may ask, did she study thousands of real passwords...
TED Talks
TED: Where is cybercrime really coming from? | Caleb Barlow
Cybercrime netted a whopping $450 billion in profits last year, with 2 billion records lost or stolen worldwide. Security expert Caleb Barlow calls out the insufficiency of our current strategies to protect our data. His solution? We...
TED Talks
Eva Galperin: What you need to know about stalkerware
"Full access to a person's phone is the next best thing to full access to a person's mind," says cybersecurity expert Eva Galperin. In an urgent talk, she describes the emerging danger of stalkerware -- software designed to spy on...
MinuteEarth
The Secrets of Extreme Breath Holding
Humans can hold our breath longer than we think by taking advantage of our body’s innate survival instincts - and then ignoring them. __________________________________________ To learn more, start your googling with these keywords:...
TED Talks
Dale Dougherty: We are makers
America was built by makers -- curious, enthusiastic amateur inventors whose tinkering habit sparked whole new industries. At TED@MotorCity, MAKE magazine publisher Dale Dougherty says we're all makers at heart, and shows cool new tools...
Crash Course
Hackers & Cyber Attacks: Crash Course Computer Science
Today we're going to talk about hackers and their strategies for breaking into computer systems. Now, not all hackers are malicious cybercriminals intent on stealing your data (these people are known as Black Hats). There are also White...
TED Talks
TED: Your smartphone is a civil rights issue | Christopher Soghoian
The smartphone you use reflects more than just personal taste ... it could determine how closely you can be tracked, too. Privacy expert and TED Fellow Christopher Soghoian details a glaring difference between the encryption used on...
TED Talks
Joe Smith: How to use a paper towel
You use paper towels to dry your hands every day, but chances are, you're doing it wrong. In this enlightening and funny short talk, Joe Smith reveals the trick to perfect paper towel technique.
TED Talks
Keren Elazari: Hackers: the Internet's immune system
The beauty of hackers, says cybersecurity expert Keren Elazari, is that they force us to evolve and improve. Yes, some hackers are bad guys, but many are working to fight government corruption and advocate for our rights. By exposing...
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Anatomy of a Social Engineering Attack
This video will examine hackers' process of creating an attack using the social engineering technique.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Meet Kevin Mitnick
This video is an overview of a famous hacker, Kevin Mitnick, that highlights his hacking techniques.
Curated Video
Practical Cyber Hacking Skills for Beginners - The Bad Guys - Black Hats, Cyber Criminals and Disgruntled Employees
Here, you will learn more about hackers, how they operate, their intentions, and how they differ based on the hacking methodologies.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Anonymizer
In this video, we will look at the tools and software used to make activity on the Internet untraceable.
Curated Video
Fundamentals of Secure Software - OWASP ZAP (Zed Attack Proxy)
In this video, we will install and configure OWASP ZAP.