Global Internet Security Threats (01:52)
FREE PREVIEW
An unlikely group of scientists is uncovering government eavesdropping and cyber weapons while taking on hackers attempting to steal money, identities and secrets.
Internet Identity Theft (06:32)
After being hacked, "Wired" journalist Mat Honan convinced the perpetrators to reveal their methods. Using a "social engineering" method, they accessed and destroyed his digital life through internet security loopholes.
Stuxnet Virus (07:00)
Cyber security experts Eric Chien and Liam O Murchu describe their investigation of malignant software coded to infiltrate Iran's nuclear facilities and destroy uranium centrifuges.
Pioneering Cyber Weaponry (01:58)
No nation has admitted responsibility for Stuxnet but it was likely built by the U.S. and Israel. Chien explains how the virus raises the possibility of cyber warfare.
RSA Algorithm System (05:19)
Mathematician James Lyne explains how semi prime numbers are used to encrypt sensitive data. Large prime numbers are currently impossible to unscramble—but hacker computers are advancing.
Quantum Mechanics (02:10)
Physics expert Eric Lucero explains the idea of superposition—that atoms can simultaneously occupy multiple places.
Quantum Computer (04:37)
Lucero's invention could potentially crack RSA encryption code. Learn how it has the power to do multiple calculations simultaneously—threatening the internet.
Quantum Cryptography (05:51)
MIT expert Seth Lloyd explains how the laws of physics can guarantee internet security through the observer effect. However, all codes are vulnerable to human behavior.
Ultra Paranoid Computing (02:51)
Dr. Patrick Lincoln explains why we should be worried about internet hackers. He is working on installing identity passwords in the subconscious.
Corticol Cryptography (03:34)
Daniel Sanchez illustrates how a pattern can be learned subconsciously and used to identify individuals based on their muscle memory—a project in ultra paranoid computing.
Human Weakness in Internet Security (04:18)
Sean McGurk searches for system vulnerabilities in U.S. networks. Removable media devices can introduce viruses through unsuspecting individuals—such as the Stuxnet virus.
Rogue Virus Threat (02:31)
Stuxnet has escaped to the public domain, infecting 100,000 computers. McGurk explains how it can be exploited by hackers in the new frontier of cyber warfare.
Credits: Defeating the Hackers (00:43)
Credits: Defeating the Hackers
For additional digital leasing and purchase options contact a media consultant at 800-257-5126
(press option 3) or sales@films.com.