Internet Security Videos

===================================================

* How Proton Mail Works

Sending an email message is like sending a postcard, says scientist Andy Yen in this thought-provoking talk: Anyone can read it. Yet encryption, the technology that protects the privacy of email communication, does exist. It’s just that until now it has been difficult to install and a hassle to use. Showing a demo of Proton Mail, an email program he designed with colleagues at CERN, Yen argues that encryption can be made simple to the point of becoming the default option, providing true email privacy to all.

Watch the video and share it with others.

===================================================

*How stores track your shopping behavior

Why are companies so intent on using technology to track our behavior? Our actions reveal what we desire, how we shop, and why we buy. Retailers can now learn about shopper behavior, and this creates concerns about privacy and data collection. While big box stores claim this data collection is to improve the shopper’s experience, privacy advocates strongly disagree.

Watch the video and share it with others.

===============================================

*Why you shouldn’t throw away your boarding pass

After we board many of us toss our airline boarding passes in the seat back pocket, other times we leave it in the hotel room, or just toss it in the airport trash. What most people don’t know is that there is a LOT of personal information encrypted on your boarding pass. How much information? Your home address, banking info, email address, phone number, and much more.

Watch the video and share it for others to learn about the risks and damage of being careless with their boarding pass.

===============================================

*All your devices can be tracked

Avi Rubin is Professor of Computer Science at Johns Hopkins University and Technical Director of the JHU Information Security Institute. Avi’s primary research area is Computer Security, and his latest research focuses on security for electronic medical records. Avi is credited for bringing to light vulnerabilities in electronic voting machines.

Watch the video and share it with others.

===============================================

*Which companies protect you from Big Brother

Dubbed the Ralph Nader for the Internet Age by Wired Magazine, Christopher Soghoian is a researcher and advocate focused on improving privacy protections for individuals. He is particularly interested in how companies choose to either resist or facilitate surveillance of their customers.

Watch the video and share it with others.

===============================================

*10 Cyber Security facts

With recent high-profile and widespread computer viruses making headlines, it’s become obvious that the future is now. WatchMojo News counts down 10 crucial facts you should know about cyber security.

Watch the video and share it with others.

===================================================

*Your smartphone is leaking your personal information

Bram Bonne’ is a PhD student in computer science at Hasselt University in Belgium, where he specializes in computer security and privacy. In this presentation he will show the information that is available to mostly anyone. But he will also explain what you can do to prevent privacy-sensitive information from leaking.

Watch the video and share it with others.

===================================================

*Why privacy matters

Glenn Greenwald was one of the first reporters to see, and write about, the Edward Snowden files, with their revelations about the United States’ extensive surveillance of private citizens. In this searing talk, Greenwald makes the case for why you need to care about privacy, even if you’re “not doing anything you need to hide.”

Watch the video and share it with others.

===================================================

*Edward Snowden on passwords

John Oliver interviews Edward Snowden on how to construct a proper password.

Watch the video and share it with others.

===================================================

*John McAfee: Security is an illusion

Young interviewer questions John McAfee on Internet Security.

Watch the video and share it with others.

===================================================

*We are being tracked everywhere

Disturbing description of How We Are Being Tracked Everywhere, by Mikko Hypponen, CEO of F-Secure Cyber Services – Helsinki, Finland

Watch the video and share it with others.

===================================================

*Edward Snowden on cyber attacks

Edward Snowden, controversial former NSA contractor, sat down with PBS- NOVA to discuss the future of cyber warfare.

Watch the video and share it with others.

===================================================

*How does the Internet work?

SIMPLE explanation of how the internet really works. Understand networks, inter-networks, data packets, peering and internet exchanges.

Watch the video and share it with others.

===================================================

*Cyber Security – 101

The Internet is fundamentally insecure. However, there are simple things you can do to protect yourself and your information. Learn how from NOVA’s Cybersecurity Lab.

Watch the video and share it with others.

===================================================

*How advertisers target you

Christopher Miglino, Social Reality CEO, on how advertisers target consumers.

Watch the video and share it with others.

===================================================

*How does Internet encryption work?

This is a simple explanation on how Internet encryption works.  And, BTW, look for the lock on your URL panel when connecting to a secure website.

Watch the video and share it with others.

===================================================

*What are DDOS attacks?

After the massive cyber-attack in the United States, 10-21-16, many people have been asking , “What is a DDoS attack, and how does it work?”

This is an excellent animated description of how millions of Internet connected devices caused havoc on major internet services that day.

Watch the video and share it with others.

===================================================

 

*Smartphone apps steal your personal data

This video from “The Privacy Project” shows how our smartphones and their apps intentionally take personal data and give it to the App’s developers for collection and profile building.

This is the most intrusive data collection tool we are vulnerable to today.

Watch the video and share it with others.

===================================================

*Dangers of cellphones for intrusion of privacy.

This video, “The Call”, is from 2011 just before the flood of smartphones hit the market and clearly shows the dangers of cellphones for intrusion of privacy.

While this video is several years old, please remember while watching this that with the downloaded apps we now are accustomed to installing in our new smartphones this intrusion only makes data privacy more important.

Watch the video and share it with others.

===================================================

Advertisements