CyberWar Threat [YouTube Video] | NOVA #tech #hacking #cybersecurity #documentaries #telecommunications #Internet


The global cyberwar is heating up and the stakes are no longer limited to the virtual world of computers. Now, thanks in part to secret documents released by Edward Snowden, the true scale of the National Security Agency’s scope and power is coming to light. Besides spending billions of dollars to ingest and analyze the worlds’ electronic communications, the NSA has set out to dominate a new battlefield—cyberspace.

NOVA examines the science and technology behind cyber warfare and asks if we are already in the midst of a deadly new arms race. Already, highly sophisticated, stealthy computer programs such as the notorious Stuxnet worm can take over and even destroy the control systems that regulate everything from food factories to gas pipelines, power plants, and chemical facilities—even our cars. While the destruction of Iranian centrifuges may have delayed Iran’s bomb program and forestalled an Israeli attack, the attack has opened a Pandora’s Box, and now America’s own critical infrastructure is vulnerable to retaliation and attack. With leading defense experts and investigative journalists who have probed the murky realm of criminal and strategic hacking, NOVA examines the chilling new reality of cyberwar in which no nation or individual is safe from attack.

SOURCE: Cyberwar Threat | Full Documentary HD |Our World in HD | NOVA | YouTube

Career Spotlight: What I Do as an “Ethical Hacker” | LifeHacker #cybersecurity #hackers #hacking


You occasionally hear about major security vulnerabilities being discovered before they’re exploited, like the notorious Heartbleed bug last year. Security researchers work hard to weed out those dangerous flaws before they’re found by hackers of more malicious intent. This breed of preemptive hacking is sometimes referred to as white hat, or simply “ethical hacking.”

These hackers work with businesses to probe their networks for security holes, vulnerabilities to social engineering, and more, while considering the mindset of someone who might have criminal motivations. To learn about what such work is like we spoke with Ben Miller, an ethical hacker at Parameter Security. READ MORE: Career Spotlight: What I Do as an “Ethical Hacker” | LifeHacker

Symantec’s 2015 Internet Security Threat Report, Volume 20 | Symantec.com #cybersecurity


2015 Internet Security Threat Report, Volume 20 | Symantec
The Internet Security Threat Report provides an overview and analysis of the year in global threat activity. The report is based on data from the Symantec Global Intelligence Network, which Symantec’s analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.

▶ Symantec’s 2015 Internet Security Threat Report: The Cyber Landscape | YouTube.

▶ Symantec’s 2015 Internet Security Threat Report: The Cyber Landscape - YouTube

9 Facts About Computer Security That Experts Wish You Knew | Gizmodo


Every day, you hear about security flaws, viruses, and evil hacker gangs that could leave you destitute — or, worse, bring your country to its knees. But what’s the truth about these digital dangers? We asked computer security experts to separate the myths from the facts. Here’s what they said.

READ MORE: 9 Facts About Computer Security That Experts Wish You Knew | Gizmodo