Shows
Videos
-
Hacking Critical Infrastructure
We ask an Industrial Control System expert how to detect hackers and what can be done once a network is compromised.
-
The Economic Toll of Chinaโs Cyber Espionage
Bill Evanina explains how the U.S. has lost an estimated 400 billion dollars in the form of economic espionage by Chinese hackers.
-
Why Your Phone Is Safer Than Your Computer
โโโBen finds out why a phone is more secure than a computer.โ
-
How to Unlock a Laptop Using an NSA Tool
Security researcher Joe FitzPatrick shows Ben a demo of SLOTSCREAMER, a NSA spy tool he created from leaked documents.โโ
-
Hacker โPhineas Fisherโ Speaks on Camera for the First TimeโThrough a Puppet
Benย interviews hackerย Phineas Fisher on the condition the interview is recreated with a puppet.
-
Hacking the Internet of Things
John Matherly demos Shodan, a search tool that finds all the insecure devices connected to the internet.
-
Ashley Madison Fembots (Extra Scene)
In an extra scene from CYBERWAR, Ben Makuch talks to Annalee Newitz about how the fembots were made on Ashley Madison.
-
The Attribution Problem in Cyber Attacks
In an extra scene fromย CYBERWAR,ย Bruce Schneier explains the difference between real world attribution and cyber attribution.
-
Hacking Lessons From geohot
In an extra scene fromย CYBERWAR,ย George Hotz (geohot) shows Ben Makuch how to perform a binary exploit.
-
Hacking a USB Key
Darknet J shows Ben how easy it is to perform a USB exploit and take complete control over a computer.โโ
-
When a Hacker Goes to Jail
Benย gets prison advice from Christopher Weatherhead aka ‘Nerdo’.
-
MLT on the Future of Hacking
Hacker MLT tells Benย about the security flaws in driverless cars and the future of the UK hacking community.
-
National Security and Silicon Valley
Ben talks to Matthew Prince, CEO of CloudFlare, about meeting with the National Security team and how Silicon Valley companies would approach the threat of violent extremism online.โ
-
Pakistan and the Geopolitical Chess Game
Pakistan is a vital US ally in one of the world’s most strategically important regions. In an extra scene fromย CYBERWAR, Hamid Mir, journalist and host of “Capital Talk,” explains how the Americans have used his country as a base for surveillance since the 1960s.
-
Cyber Kill Lists
America builds a global killing machine, using data to identify and take out suspected terrorists. Ben heads to Pakistan to see how the CIA and NSA put together the kill list.
-
Putin Trumps America
NATO troops amass along Russia’s borders as U.S. officials grapple with Putin’s election meddling. How will a battle that started in cyberspace play out on the ground?