Introduction: Rise of the Hackers (01:44)
This brief overview of computer technology orients viewers with excerpts from the upcoming program.
One Common Enemy (01:29)
Hackers are trying to come up with ways to steal our money, our identities, and our secrets.
Mat Honan learns that his hackers social engineered all of his accounts.
Social Engineering (04:00)
Learn how the hackers followed a series of loopholes to gain access to all of Honan's accounts.
Cyber security sleuths Eric Chien and Liam O'Murchu discuss their investigation into this unusual virus.
Stuxnet was attempting to attack a nuclear facility in Iran.
Learn how Stuxnet planned to thwart creation of nuclear arms in Iran. Stuxnet opened the door for cyber warfare.
Prime Numbers (02:08)
Former mathematician, James Lyne talks about the importance of prime numbers in encrypting codes.
Learn how data is encrypted on the Internet.
Quantum Mechanics (03:26)
Computers are gaining in power, and staying ahead of Internet security may become more difficult. Erik Lucero describes the concept of superposition.
Quantum Bits (02:22)
Learn how Lucer's quantum processor works at super speed.
Quantum Processing (02:16)
A quantum processor considers all possible answers simultaneously instead of sequentially. This could be a threat to current encryption methods.
Keeping Secrets Safe (02:43)
Seth Lloyd explains how quantum mechanics can be used to guarantee privacy and encryption using the observer effect theory.
Quantum Cryptography (03:09)
Lloyd demonstrates how this technology is used to determine if someone is eavesdropping, which then allows a secret key to be created.
Ultra Paranoid Computing (03:07)
Patrick Lincoln compares the Internet to a bad neighborhood where thieves are rattling your doorknobs constantly. No one machine can be completely trusted.
Subliminal Password (02:45)
Daniel Sanchez explains how a guitar video game can be used to store sequential passwords in the human brain.
Complex Networks (03:36)
People are the weak link in a computer network. Even computers that are not connected to the Internet can be infected with malicious code.
Digital Pandora's Box (03:37)
A removable media device may have been used to start the Stuxnet virus. The virus has now gone global and can be manipulated to attack others.
Codes and secrets are not new. But the advent of global digital communication has created a new battleground.
Credits: Rise of the Hackers (01:07)
Credits: Rise of the Hackers
For additional digital leasing and purchase options contact a media consultant at 800-257-5126
(press option 3) or firstname.lastname@example.org.