Curated Video
Sensitive Data Exposure
Sensntive data exposure is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Curated Video
How to Attack Modern Wireless Networks - Introduction
This video is a general overview on how to attack wireless networks
Curated Video
Wi-Fi Security
You will learn how to protect your home WiFi and be vigilant when you are using public Wifi
Curated Video
Execute Man-in-the-Middle Attacks
Learn how to execute MITM attacks using Ettercap tool, a very powerful application in Kali
Curated Video
Broken Authentication
This video will explain the broken authentication on web applications and how can attackers leverage this vulnerability to gain unauthorized access
Curated Video
Blended Attacks
A complex cyberattack described as a "blended attack" makes use of a variety of malicious malware, computer viruses, worms, or Trojan horses in addition to several vulnerabilities in hardware or software that the attacker is aware of.
Curated Video
iPhone Security Model
In this video, we will be discussing the iPhone Security Model. We will explore the various layers of security that Apple has implemented to protect your personal data and information. From the hardware level to the software level, we...
Schooling Online
English Essentials - Nailing Non-fiction - Finer Details of Analysing Non-fiction Texts (Stage 5, Years/Grades 9-10)
In today’s lesson, we’ll take a closer look at the finer details of non-fiction texts. We’ll break down specific techniques composers use to appeal to ethos, logos and pathos. As always, we’ll recap the basics before moving on to more...
Institute for New Economic Thinking
What Is Economics About? | How & How NOT to Do Economics with Robert Skidelsky
Why did economists largely fail to predict the 2008-09 financial crisis? In the first lecture in his INET series, “How and How Not to do Economics,” Robert Skidelsky looks at a neglected cause: methodology. The way economists build their...
SWPictures
Surviving Acid Attacks: The Stories of Victims and the Fight for Recovery
The video discusses the devastating impact of acid attacks on victims, particularly women and children, in Cambodia. It highlights the work of a refuge for acid survivors run by the Cambodian acid survivors charity, which provides...
Healthcare Triage
Big Sugar, Big Money, and the Obfuscated Truth About Heart Disease
Big Sugar, Big Money, and the Obfuscated Truth About Heart Disease
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Categories of ML Tasks and Attacks
From the section: Security Test Using Adversarial Attack. In this section, you will test any AI system against the latest attacks with the help of simple tools. The aim of this video is to demonstrate that all approaches to solving...
Globalive Media
Beyond Innovation: Episode 7
An algorithm makes insurance firms smarter, AI and blockchain join forces and the future of cryptocurrencies becomes clearer. Plus, Anthony and Michael speak with the startup making it virtually impossible to hack into sensitive...
The Wall Street Journal
Geopolitics And Cyberattacks
Anne Neuberger, Director of the NSA's new Cybersecurity Directorate, discusses how geo-political events often drive surges in cyberattacks against the U.S. public and private sector. Are the nation's defenses up to the task of defending...
Packt
Evaluate the impact of privacy issues, cyberattacks, and malware on your AI application : Introduction to Various Defense Approaches to Adversarial Attacks
From the section: Choosing the Right Defense. In this section, you will deploy the right defense methods to protect AI systems from attacks by comparing their efficiency. The aim of this video is to give an overview of different defense...
Professor Dave Explains
President Bush Jr
Professor Dave explores the career and legacy of President Bush Jr
TLDR News
Wealth Tax? Could Britain's Billionaires Pay for the Pandemic?
Having already spent hundreds of billions on COVID, some are suggesting that the UK government should attempt to recoup some of those costs with a wealth tax. So in this video we explain how a British wealth tax might work, how much...
Brainwaves Video Anthology
Diane Ravitch - Reign of Error
Diane Ravitch is Research Professor of Education at New York University and a historian of education. Diane Ravitch’s Blog is dianeravitch.net and has received more that 17 million hits in 30 months. From 1991 to 1993, she was Assistant...
The Wall Street Journal
The Limits Of Cyber Insurance
Matthew McCabe, Assistant Counsel, Cyber Policy, Marsh & McLennan and Josh Mooney, Co-Chair, Cyber Law and Data Protection Group, White & Williams discussed how cyberattacks by nation states have raised new questions about what insurance...
SWPictures
BATTLE FOR THE GULF - A Different Kind of War
The air war by the Allies begins. The Allies started jamming Baghdad's radar defences. The jamming gave the game away. Iraqi radars were blinded, but 3,000 anti-aircraft guns and 60 missile batteries began firing wildly into the sky....
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Threat Intelligence
With the ever-changing IT threat landscape, how can you keep up with the latest security issues? Threat intelligence refers to the wide variety of open-source intelligence (OSINT) and proprietary IT security sources that use standards...
TLDR News
The UK's Sugar Tax Explained
Today, 6th April, the UK government have introduced a new tax on sugary drinks in an attempt to reduce the level of obesity in the UK. How will you be affected and will it even work? Full Disclosure: The creator of this video formerly...
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Adversarial Attacks and Their Distinctive Features
From the section: Testing Image Classification. In this section, you will design specific security tests for image recognition systems. Here you will focus on one particular type of AI solution – image classification, and one category of...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - About the Security+ (SY0-601) Exam
This episode goes over the domains of the CompTIA Security+ (SY0-601) exam objectives and the various topics that are covered. This clip is from the chapter "Risk Management" of the series "CompTIA Security+ Certification SY0-601: The...