Instructional Video1:09
Next Animation Studio

U.S. charges four Chinese military operatives in Equifax 2017 hack

12th - Higher Ed
A federal grand jury charged four Chinese military officers on Tuesday for the massive hack of the credit rating giant Equifax that occurred in 2017.
Instructional Video29:29
The Wall Street Journal

Lessons From a Data Breach

Higher Ed
Jamil Farshchi, chief information security officer at Equifax, and Jo De Vliegher, chief information officer at Norsk Hydro, give their firsthand account of suffering a data breach and how they responded.
Instructional Video5:32
Curated Video

Explain web security : Methodolo-gy of Hack-ers

Higher Ed
From the section: Steps for Ethical Hacking. In this part, you are going to learn how hackers think and act before and after they hack a system, and how they gather sensitive information. We’ll follow the same steps to test whether we...
Instructional Video4:37
Curated Video

Describe cyber attacks that could affect a computer system or network : Leaving a Backdoor in the Target Machine

Higher Ed
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will find out what is persistent...
Instructional Video14:09
IDG TECHtalk

Why new remote work policies attract hackers

Higher Ed
With widespread mandated work from home policies due to the coronavirus, many employees are working remotely for the first time. In some cases, employers had never intended their employees to be remote-only, and they may lack key work...
Instructional Video10:43
AllTime 10s

10 Things NASA Doesn't Want You To Know

12th - Higher Ed
When it comes to NASA, things are bound to get a little out of this world. Alltime10s brings you some weird claims and historical abnormalities about the world's most famous space program.
Instructional Video2:15
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 13 Ask Me Anything (AMA)

Higher Ed
There is much to be learned by analyzing past security incidents. In this episode, Dan discussed the Cyber Kill Chain. This clip is from the chapter "Dealing with Incidents" of the series "CompTIA Security+ Certification SY0-601: The...
Instructional Video21:03
The Wall Street Journal

What's Next?

Higher Ed
With cyber threats ever changing, it is hard to predict the next flashpoint. To stay ready, here is what, and who, companies need to watch.
Instructional Video1:01
Next Animation Studio

North Korea mines cryptocurrency to circumvent sanctions

12th - Higher Ed
North Korea is turning to cryptocurrency as a means to circumvent sanctions.
Instructional Video10:32
IDG TECHtalk

Black Hat 2019 and DEF CON 27: What to expect at hacker summer camp | TECH(talk)

Higher Ed
Every year, thousands of hackers arrive in Las Vegas for three large security conferences -- DEF CON, Black Hat and Bsides Las Vegas -- taking place from Monday through Sunday next week. CSO Online's J.M. Porup chats with Juliet about...
Instructional Video7:29
Curated Video

Bug Bounty Program Certification 13.4: Certification Exam Practice Questions – Part 3

Higher Ed
Exam questions. • Practice questions • Solutions • Explanation of answer
Instructional Video1:03
Next Animation Studio

Vulnerabilities found in TikTok: Report

12th - Higher Ed
Cybersecurity firm Check Point has conducted an investigation into video-sharing app TikTok and found major vulnerabilities within the app.
Instructional Video5:07
CuriosaMente

¿Los hackers son delincuentes?

9th - 12th
¿Quienes fueron los primeros hackers? ¿Cuáles son los hackers más famosos y más controvertidos? ¿Son malvados? Un hacker es una persona con habilidades avanzadas en computación que puede ingresar a sistemas informáticos sin autorización,...
Instructional Video0:55
Next Animation Studio

Iranian hackers target corporate VPN servers

12th - Higher Ed
A new report by cyber security firm ClearSky has found that hackers backed by the Iranian government have been exploiting bugs in corporate VPN servers.
Instructional Video1:28
Curated Video

The Beginners 2022 Cyber Security Awareness Training Course - Greeting from Your Instructor, Reza

Higher Ed
This clip is from the chapter "Course Introduction" of the series "The Beginners 2022 Cyber Security Awareness Training Course".This section introduces you to the course.
Instructional Video18:59
The Wall Street Journal

Inside the Mind of a Russian Cybercriminal

Higher Ed
Dmtiry Smilyanets, a former Russian cybercriminal who was featured in WSJ's, "Hack Me if You Can"" podcast series, shares his story and his insights about the escalation of cybercrime and the effectiveness of defensive and interdiction...
Instructional Video1:00
Next Animation Studio

Thousands of Disney+ accounts stolen by hackers

12th - Higher Ed
Hackers started targeting Disney’s new streaming service just hours after it was launched on November 12.
Instructional Video5:24
Curated Video

Web Security: Common Vulnerabilities And Their Mitigation - All about passwords - Strength, Use and Transit

Higher Ed
Credentials Management: All about passwords - Strength, Use and Transit This clip is from the chapter "Credentials Management" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, very common source...
Instructional Video10:13
Curated Video

Web Security: Common Vulnerabilities And Their Mitigation - Security related definitions and categories

Higher Ed
What Is Security?: Security related definitions and categories This clip is from the chapter "What Is Security?" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, you will learn how common...
Instructional Video5:56
Curated Video

Risk Management 101 for IT Professionals Essential Concepts - The State of Cybersecurity

Higher Ed
This video explains the state of cybersecurity. This clip is from the chapter "Why We Need Risk Management" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains the need for risk management.
Instructional Video3:20
Curated Video

Risk Management 101 for IT Professionals Essential Concepts - Common IT Vulnerabilities

Higher Ed
This video explains common IT vulnerabilities. This clip is from the chapter "Understanding Risk" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains how to understand risk.
Instructional Video2:59
Curated Video

Describe cyber attacks that could affect a computer system or network : Network Attack Vectors

Higher Ed
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will consider the variety of ways a...
Instructional Video2:27
Packt

Explain the privacy issues raised by artificial intelligence systems : Confidentiality, Availability, and Integrity Attacks

Higher Ed
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. It’s important to know the main...
Instructional Video11:28
Flame Media

Real Future: Hackers

12th - Higher Ed
As companies like Ashley Madison and celebrities like Jennifer Lawrence have learned, being hacked can have devastating consequences. But how bad can it get? Our host decides to find out by inviting two of the world's most elite hackers...