Internet Security Videos

===================================================

*How Ads Follow You Around the Internet

If you’ve visited a new website on your phone or computer over the past 18 months or so, you’ve probably seen it: a notification informing you that the page is using cookies to track you and asking you to agree to let it happen. The site invites you to read its “cookie policy,” (which, let’s be honest, you’re not going to do), and it may tell you the tracking is to “enhance” your experience — even though it feels like it’s doing the opposite.

It’s true, cookies do improve your experience. They function as the website’s short-term memory. With each new click you make, cookies help the site identify you as the same person. Imagine every time you add something to your cart and click away, it disappears. Or each time you load a new page on Facebook, you have to log in again. Without cookies, the online world we know today wouldn’t exist. A building block of our online world has become a tool to track you wherever you go in it. This video explains how cookies work and what you should know about how they are being used. We even get a little help from the man who invented them.

Watch the video and share it with others

===================================================

*Ten Ways the Government is Spying on You

We should all know by now that what we do online is watched-over, collected, exploited, and sold. Big Brother is definitely watching and recording you.  

Watch the video and share it with others.

===================================================

*The Mirage of Security

The feeling of security and the reality of security don’t always match, says computer-security expert Bruce Schneier. During a TED presentation, he explains why we spend billions addressing perceived risks to our security, while neglecting more probable risks — and how we can break this pattern. The “theater of security”, as Schneier calls it, is designed to make us feel safe, when we really aren’t. But if we feel safe, we tend to live more relaxed lives.

 He also discusses how technological progress affects our ability to counter threats, but also enhance our daily living. For example, we couldn’t develop the theory that diseases were caused by germs until the microscope was invented. But the microscope also expanded our knowledge of other minute observations as well.

Watch the video and share it with others.

===================================================

*Some tech companies are resisting gvt. phone surveillance

Who is listening in on your phone calls? It could be anyone, says privacy activist Christopher Soghoian, because surveillance backdoors are built into the phone system by default, to allow governments to listen in. But then again, so could a foreign intelligence service … or a criminal. Which is why, says Soghoian, some tech companies are resisting governments’ call to build the same backdoors into mobile phones and new messaging systems. Learn how some tech companies are working to keep your calls and messages private.

Watch the video and share it with others.

===================================================

* How Proton Mail Works

Sending an email message is like sending a postcard, says scientist Andy Yen in this thought-provoking talk: Anyone can read it. Yet encryption, the technology that protects the privacy of email communication, does exist. It’s just that until now it has been difficult to install and a hassle to use. Showing a demo of Proton Mail, an email program he designed with colleagues at CERN, Yen argues that encryption can be made simple to the point of becoming the default option, providing true email privacy to all.

Watch the video and share it with others.

===================================================

*How stores track your shopping behavior

Why are companies so intent on using technology to track our behavior? Our actions reveal what we desire, how we shop, and why we buy. Retailers can now learn about shopper behavior, and this creates concerns about privacy and data collection. While big box stores claim this data collection is to improve the shopper’s experience, privacy advocates strongly disagree.

Watch the video and share it with others.

===============================================

*Why you shouldn’t throw away your boarding pass

After we board many of us toss our airline boarding passes in the seat back pocket, other times we leave it in the hotel room, or just toss it in the airport trash. What most people don’t know is that there is a LOT of personal information encrypted on your boarding pass. How much information? Your home address, banking info, email address, phone number, and much more.

Watch the video and share it for others to learn about the risks and damage of being careless with their boarding pass.

===============================================

*All your devices can be tracked

Avi Rubin is Professor of Computer Science at Johns Hopkins University and Technical Director of the JHU Information Security Institute. Avi’s primary research area is Computer Security, and his latest research focuses on security for electronic medical records. Avi is credited for bringing to light vulnerabilities in electronic voting machines.

Watch the video and share it with others.

===============================================

*Which companies protect you from Big Brother

Dubbed the Ralph Nader for the Internet Age by Wired Magazine, Christopher Soghoian is a researcher and advocate focused on improving privacy protections for individuals. He is particularly interested in how companies choose to either resist or facilitate surveillance of their customers.

Watch the video and share it with others.

===============================================

*10 Cyber Security facts

With recent high-profile and widespread computer viruses making headlines, it’s become obvious that the future is now. WatchMojo News counts down 10 crucial facts you should know about cyber security.

Watch the video and share it with others.

===================================================

*Your smartphone is leaking your personal information

Bram Bonne’ is a PhD student in computer science at Hasselt University in Belgium, where he specializes in computer security and privacy. In this presentation he will show the information that is available to mostly anyone. But he will also explain what you can do to prevent privacy-sensitive information from leaking.

Watch the video and share it with others.

===================================================

*Why privacy matters

Glenn Greenwald was one of the first reporters to see, and write about, the Edward Snowden files, with their revelations about the United States’ extensive surveillance of private citizens. In this searing talk, Greenwald makes the case for why you need to care about privacy, even if you’re “not doing anything you need to hide.”

Watch the video and share it with others.

===================================================

*Edward Snowden on passwords

John Oliver interviews Edward Snowden on how to construct a proper password.

Watch the video and share it with others.

===================================================

*John McAfee: Security is an illusion

Young interviewer questions John McAfee on Internet Security.

Watch the video and share it with others.

===================================================

*We are being tracked everywhere

Disturbing description of How We Are Being Tracked Everywhere, by Mikko Hypponen, CEO of F-Secure Cyber Services – Helsinki, Finland

Watch the video and share it with others.

===================================================

*Edward Snowden on cyber attacks

Edward Snowden, controversial former NSA contractor, sat down with PBS- NOVA to discuss the future of cyber warfare.

Watch the video and share it with others.

===================================================

*How does the Internet work?

SIMPLE explanation of how the internet really works. Understand networks, inter-networks, data packets, peering and internet exchanges.

Watch the video and share it with others.

===================================================

*Cyber Security – 101

The Internet is fundamentally insecure. However, there are simple things you can do to protect yourself and your information. Learn how from NOVA’s Cybersecurity Lab.

Watch the video and share it with others.

===================================================

*How advertisers target you

Christopher Miglino, Social Reality CEO, on how advertisers target consumers.

Watch the video and share it with others.

===================================================

*How does Internet encryption work?

This is a simple explanation on how Internet encryption works.  And, BTW, look for the lock on your URL panel when connecting to a secure website.

Watch the video and share it with others.

===================================================

*What are DDOS attacks?

After the massive cyber-attack in the United States, 10-21-16, many people have been asking , “What is a DDoS attack, and how does it work?”

This is an excellent animated description of how millions of Internet connected devices caused havoc on major internet services that day.

Watch the video and share it with others.

===================================================

 

*Smartphone apps steal your personal data

This video from “The Privacy Project” shows how our smartphones and their apps intentionally take personal data and give it to the App’s developers for collection and profile building.

This is the most intrusive data collection tool we are vulnerable to today.

Watch the video and share it with others.

===================================================

*Dangers of cellphones for intrusion of privacy.

This video, “The Call”, is from 2011 just before the flood of smartphones hit the market and clearly shows the dangers of cellphones for intrusion of privacy.

While this video is several years old, please remember while watching this that with the downloaded apps we now are accustomed to installing in our new smartphones this intrusion only makes data privacy more important.

Watch the video and share it with others.

===================================================