Hi, what do you want to do?
TED Talks
James Surowiecki: The power and the danger of online crowds
James Surowiecki pinpoints the moment when social media became an equal player in the world of news-gathering: the 2005 tsunami, when YouTube video, blogs, IMs and txts carried the news -- and preserved moving personal stories from the...
Brainwaves Video Anthology
Kara Alaimo - Over the Influence: Why Social Media is Toxic for Women and Girls
Kara Alaimo is a professor of communication at Fairleigh Dickinson University and the author of Over the Influence: Why Social Media is Toxic for Women and Girls and How We Can Take It Back. She has written opinion and analysis pieces...
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - The World of Electronic Mails – Dangers, Attacks, and Protection
This section focuses on emails, the dangers of not protecting the emails or opening dangerous emails, how hackers attack using emails, and how to protect yourself from being hacked by emails.
Institute for New Economic Thinking
Amir Herzberg: Cyber Security & Centralized Data, What Could Go Wrong?
A global watchdog has sounded the alarm about the growing danger of cyber attacks, on financial markets, warning that firms and regulators around the world need to address the “uneven” response to the threat of online...
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Phishing Attacks
Here, we will understand the concepts of phishing, how the attack is performed, the dangers of opening phishing emails, and how to prevent them.
Institute for New Economic Thinking
Sarah Quinn: Federal Credit Programs and the Birth of Lemon Socialism
President John F. Kennedy once said that success had many fathers, whereas failure was an orphan. One wonders what he would have made of today’s Federal credit programs, a vast network whose obscure political origins have finally...
Curated Video
Practical Cyber Hacking Skills for Beginners - Introduction
In this video, the author discusses cyber security as a career and the dangers of not having proper cyber security over systems and networks.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Scam Email Live Example
In this video, we will look at the various examples of scam emails that bombard your inbox from time to time and how they can be dangerous if the information is passed on to unknown people.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Rootkits
In this video, we will try to understand rootkits, one of the most dangerous forms of malware.
The Great War
Submarines, Dreadnoughts and Battle Cruisers - The Navies of World War 1 I THE GREAT WAR - Special
Even though there was only one major naval battle in the Atlantic during World War 1, the navies played a huge role during the entire conflict. From troop transports to supplies and from unrestricted submarine warfare to the landing at...
Learn German with Herr Antrim
Döner Kebab Adventure - Deutsch lernen
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - Business Email Compromise
In this interesting module, you will learn about Business Email Compromise attacks, also known as ‘CEO Fraud’. You will visually see how they trick us into initiating large wire transfers, what the red flags are, and then you will...
IT'S HISTORY
Ebola and Media Hysteria? I INTO CONTEXT
In this episode we talk about the dangerous virus that causes a worldwide hysteria: Ebola. But how exactly is the virus spreading and is the medial scaremongering justified? We compare the virus to other epidemic diseases from our...
IT'S HISTORY
Oktoberfest and the World’s Greatest Parties I INTO CONTEXT
There is a festival in Germany where people drink beer and forget the everyday troubles even, if it is just for a day or a few hours. The “Beer Festival” or “Oktoberfest” is one of the biggest events in Germany. This celebration takes...
Science360
Computer scientist Anthony Joseph - ScienceLives
The Cold War may be over, but silent dangers still lurk in cyber space. With increasing amounts of sensitive personal information — social security numbers, financial data, stock transactions — finding its way onto computing networks,...
Other
Social Media Pros and Cons: Community Building to Facebook Addiction
Social media and social networking - like Facebook, Snapchat and Twitter - have changed the ways we interact and access information. This video discusses the pros and cons of social media. Does Facebook addiction exist? What are the...