What happens when you lose your cell phone and it’s picked up by a stranger? Do they try and return it? Do they rifle through your data?
Watch what really happens in this video reconstruction of Symantec’s Project Honeystick.
Knowledge is the life of the mind
It’s not the device itself that’s so valuable to victims of stolen smartphones,
but the data stored on those smartphones.
of theft victims would pay $1,000 to retrieve their stolen smartphones
Left on a bus bench, Phone #32 went on a 4-day journey.
Its social networking, passwords, webmail,
and online banking apps were accessed throughout the trip.
Six cities, 60 phones, no privacy
Symantec Canada ‘lost’ 60 smartphones across the country in Vancouver, Calgary, Toronto, Ottawa, Montreal and Halifax.
Then it tracked what happened to them.
The number of smartphones stolen dropped in 2014 by
in San Francisco
in New York
Mayor Boris Johnson and city officials in San Fransisco and New York argue for laws mandating phone locking options after cities see dramatic decline in phone theft.
According to Consumer Reports 3.1 million Americans
were the victims of smartphone theft in 2013,
up from 1.6 million in 2012.
In 2009, roughly 5 percent of the global population owned a smartphone.
Before 2015 is out, that number is expected to hit 35 percent,
or 2.5 billion people—approximately the populations
of China and India combined.
Change your thoughts and you change your world
Videos from the same category or videos related to the subject.
You will find something new to watch and expand your knowledge.
Learn how Google collects imagery and safeguards privacy on Street View.
Sophos security expert James Lyne looks back at 2013 and the major malware players of the year.
Learn more about phishing scams, how they work and how you can protect yourself.
Del Harvey offers a window into how she keeps 240 million users safe.
Chris Domas shows how researchers use different techniques to understand binary code.
Learn more about how to avoid, detect and get rid of malware.
Steve Jobs urged graduates to pursue their dreams and see opportunities in life’s setbacks.
Ever wonder how hackers can get into your company’s network?
IBTimes UK looks to demystify the dangers you face from online attackers.
Glenn Greenwald explains why you need to care about privacy.
You’re a computer guy, IT manager, system administrator – but what does that really mean?
James Lyne explains how ever-more-sophisticated cybercriminals work.
Body language affects how others see us, but it may also change how we see ourselves.
Dr. Joseph explores self confidence and how it is not just the most important skill in athletics.
Learn about the ins and outs of phishing scams and what you can do to stay protected.
You think you are being a leader, but you are probably being a manager.
What happens when you lose your cell phone and it’s picked up by a stranger?
What makes a great leader? Simon Sinek explains his view.
Did you ever wonder how the Internet works?
Learn the true meaning of hacking and some of the many reasons that hackers hack.
2020 is the story about cyber threats we can face in the near future.
Learn how cybercriminals are going after users through social engineering tricks.
Learn what to look for when you have malware on your computer and how to stay safe online.
Edward Snowden speaks at TED2014 about surveillance and Internet freedom.
See how a simple app can transform your smartphone into an espionage tool.
Learn about one of the common internet security threats and how to avoid them.
The Internet is insecure, there are simple things you can do to protect yourself.
Hugh Herr explains about building the next generation of bionic limbs.
We show you how to pick a proper password, and we explain why it’s worth it.
Get valuable safety tips about using social networks.
An evolution of mobile, home and embedded devices that are connected to the internet.
Sir Ken Robinson makes a case for creating an education system that nurtures creativity.
Learn about the steps your computer takes with every click of the mouse.
Take a look at how cybercriminals hide behind major sporting events like the 2010 World Cup.
Interviews about online privacy you will remember. How much do you share?
In less than 300 seconds you can experience the speed and intensity of a cyber attack.
Explaining the inventions from time-sharing to filesharing, from Arpanet to Internet.
Believe you can and you’re halfway there
A collection of videos organised or just select a video by the first impression.
That choice is up to you.
Just click and be surprised
Find what you're looking for