SciShow
5 Devastating Security Flaws You've Never Heard Of
Devastating vulnerabilities are hiding in the technology in programs, protocols, and hardware all around us. Most of the time, you can find ways to protect yourself.
TED Talks
TED: Everyday cybercrime -- and what you can do about it | James Lyne
* Viewer discretion advised. This video includes discussion of mature topics and may be inappropriate for some audiences. How do you pick up a malicious online virus, the kind of malware that snoops on your data and taps your bank...
SciShow
Why Was the WannaCry Attack Such a Big Deal?
On Friday, May 12th, 2017, the ransomware program WannaCry started spreading to computers all over the world at an alarming rate. A couple days later, it was basically completely contained with very little damage done. So what happened?
SciShow
5 More Computer Viruses You Really Don't Want to Get
From taking your files ransom to foiling uranium enrichment, here are five more computer viruses that you really want to avoid.
SciShow
5 Devastating Security Flaws You've Never Heard Of
Devastating vulnerabilities are hiding in the technology in programs, protocols, and hardware all around us. Most of the time, you can find ways to protect yourself.
SciShow
How Meltdown and Spectre Make Your Computer Vulnerable
Another year, another security breach that could expose all of your information. Installing updates might be a good New Year's resolution.
Crash Course
Cybersecurity: Crash Course Computer Science
Cybersecurity is a set of techniques to protect the secrecy, integrity, and availability of computer systems and data against threats. In today’s episode, we’re going to unpack these three goals and talk through some strategies we use...
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Anatomy of a Social Engineering Attack
This video will examine hackers' process of creating an attack using the social engineering technique.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Conclusion
Here, we will hear from the author about his thoughts on completing this course and a cursory outline of what you have learned.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Hardening - Randomizing the MAC Address
Another step of hardening the Windows 10 OS is randomizing the MAC address, which is usually a unique number for each PC.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Hardening - Enabling the Smart Screen Filter
Here, we will look at the next step in hardening the Windows 10 OS using smart screen filtering to enhance the protection of your OS.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Hardening - The Windows 10 Firewall
Here, we will understand a firewall, how it works, and how it can protect the Windows 10 OS.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Privacy - Turning Off Peer Updates
This video illustrates how the privacy of Windows 10 OS can be improved by turning off the peer updates features from other computers, especially where the internet is unreliable.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Privacy - Turning Off Location Tracking
Here, we will look at how location tracking works on our systems and networks and how we can prevent systems from knowing our location to prevent being hacked.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Privacy - Restricting Cortana
In this video, we will understand how Cortana works and how to limit the amount of information it collects, to prevent the data from being shared through trackers.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Privacy - Turning Off Ad Tracking
This video illustrates a few tricks and tips to improve the privacy of the Windows 10 operating system. You will learn how to turn off ad tracking and prevent being tracked.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Patching and Updates
This video demonstrates how applying Windows safety patches and updates is essential in constantly keeping the system safe and how to use these patches and updates.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Scam Email Live Example
In this video, we will look at the various examples of scam emails that bombard your inbox from time to time and how they can be dangerous if the information is passed on to unknown people.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Phishing Attacks
Here, we will understand the concepts of phishing, how the attack is performed, the dangers of opening phishing emails, and how to prevent them.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Introducing Proton Email
This video illustrates the Proton email and its features and advantages, safety, and disadvantages.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Guerrilla Mail
This video illustrates Guerrilla mail and its features and advantages, safety, and disadvantages.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - How to Detect Email Tracking
In this lesson, we will understand how to detect if someone is tracking your email and how to prevent that from happening.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - How to Track Sent Emails
In this video, we will look at an email tracker software that allows you to track the status of the sent mail or if the emails have been read or not, the email tracker.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Email Basics, Protocols and Ports
In this lesson, you will learn about emails, what protocols and ports they use to communicate, the IMAP port 143 and POP port 110, IMAP port 993 and POP port 995, encrypted and unencrypted.