Shows
Videos
-
The Economic Toll of Chinaโs Cyber Espionage
Bill Evanina explains how the U.S. has lost an estimated 400 billion dollars in the form of economic espionage by Chinese hackers.
-
How to Unlock a Laptop Using an NSA Tool
Security researcher Joe FitzPatrick shows Ben a demo of SLOTSCREAMER, a NSA spy tool he created from leaked documents.โโ
-
Hacker โPhineas Fisherโ Speaks on Camera for the First TimeโThrough a Puppet
Benย interviews hackerย Phineas Fisher on the condition the interview is recreated with a puppet.
-
Hacking the Internet of Things
John Matherly demos Shodan, a search tool that finds all the insecure devices connected to the internet.
-
The Attribution Problem in Cyber Attacks
In an extra scene fromย CYBERWAR,ย Bruce Schneier explains the difference between real world attribution and cyber attribution.
-
Hacking Lessons From geohot
In an extra scene fromย CYBERWAR,ย George Hotz (geohot) shows Ben Makuch how to perform a binary exploit.
-
Hacking a USB Key
Darknet J shows Ben how easy it is to perform a USB exploit and take complete control over a computer.โโ
-
When a Hacker Goes to Jail
Benย gets prison advice from Christopher Weatherhead aka ‘Nerdo’.
-
MLT on the Future of Hacking
Hacker MLT tells Benย about the security flaws in driverless cars and the future of the UK hacking community.
-
Americaโs Elite Hacking Force
Tailored Access Operations, or TAO, is the NSA’s elite hacking force. TAO employs some of America’s best hackers–so who are their targets?โโ
-
Hacking the Infrastructure
As Iran ramps up its offensive cyber operations, American critical infrastructure is increasingly vulnerable to attacks.
-
Stuxnet the Digital Weapon
Stuxnet was a sophisticated cyber attack on an Iranian nuclear plant that may have changed the nature of warfare forever.
-
Syriaโs Cyber Battlefields
On the frontlines of one of the world’s bloodiest conflicts, a parallel war is being fought in cyberspace. Is Syria’s cyber battlefield creating a model for the wars of the future?
-
Hacked by China
From Google to the government, China has hacked many American networks. But thereโs a difference between spying and stealing intellectual property.
-
Cyber Mercenaries
Authoritarian regimes are using spyware tools bought from private companies in the West. Hacker PhineasFisher targeted these companies to reveal their deals to suppress dissent.
-
Former Sony Employee Discusses Being Hacked
Former Sony employee Celina Chavanette tells host Ben Makuch about how she found out the security breach of employee data affected her, and what happened afterwards.