The 1s and 0s behind cyber warfare
Photo Credit: Christiaan Colen – Flickr
Chris Domas is a cybersecurity researcher, operating on what’s become a new front of war, “cyber.”
He shows how researchers use pattern recognition and reverse engineering to understand a chunk of binary code whose purpose and contents they don’t know.
Chris Domas is a cybersecurity researcher, operating on what’s become a new front of war, “cyber.”
He shows how researchers use pattern recognition and reverse engineering to understand a chunk of binary code whose purpose and contents they don’t know.
Related videos

The difference between leadership and management
You think you are being a leader, but you are probably being a manager.

The great bank robbery: Carbanak
One of the biggest cybercrime campaigns targeting financial institutions.

Scary internet stuff: Net threats
Take a look at how cybercriminals hide behind major sporting events like the 2010 World Cup.

The strangeness of scale at Twitter
Del Harvey offers a window into how she keeps 240 million users safe.

Do schools kill creativity?
Sir Ken Robinson makes a case for creating an education system that nurtures creativity.

Bionics that let us run, climb and dance
Hugh Herr explains about building the next generation of bionic limbs.

What does the Internet of Things mean?
An evolution of mobile, home and embedded devices that are connected to the internet.

The 1s and 0s behind cyber warfare
Chris Domas shows how researchers use different techniques to understand binary code.

Phishing scams in plain English
Learn more about phishing scams, how they work and how you can protect yourself.

Who are you? An IT Rock Star
You’re a computer guy, IT manager, system administrator – but what does that really mean?

The Black Hole of online crime
IBTimes UK looks to demystify the dangers you face from online attackers.

History of the Internet
Explaining the inventions from time-sharing to filesharing, from Arpanet to Internet.

Most popular threats of 2013
Sophos security expert James Lyne looks back at 2013 and the major malware players of the year.

Your body language shapes you
Body language affects how others see us, but it may also change how we see ourselves.

Street View: Behind the Scenes
Learn how Google collects imagery and safeguards privacy on Street View.

Stay Hungry. Stay Foolish.
Steve Jobs urged graduates to pursue their dreams and see opportunities in life’s setbacks.

How we take back the Internet
Edward Snowden speaks at TED2014 about surveillance and Internet freedom.

Game Over for GameOverZeus?
GameOverZeus is the most sophisticated botnet law enforcement has ever encountered.

The skill of self confidence
Dr. Joseph explores self confidence and how it is not just the most important skill in athletics.

Denial of Service attacks
Learn about one of the common internet security threats and how to avoid them.

Social engineering tricks
Learn how cybercriminals are going after users through social engineering tricks.

How to spot a phishing scam
Learn about the ins and outs of phishing scams and what you can do to stay protected.

How to pick a proper password
We show you how to pick a proper password, and we explain why it’s worth it.
Related videos
Videos from the same category or videos related to the subject.
You will find something new to watch and expand your knowledge.

The skill of self confidence
Dr. Joseph explores self confidence and how it is not just the most important skill in athletics.

Who are you? An IT Rock Star
You’re a computer guy, IT manager, system administrator – but what does that really mean?

The Black Hole of online crime
IBTimes UK looks to demystify the dangers you face from online attackers.

How to spot a phishing scam
Learn about the ins and outs of phishing scams and what you can do to stay protected.

Phishing scams in plain English
Learn more about phishing scams, how they work and how you can protect yourself.

Do schools kill creativity?
Sir Ken Robinson makes a case for creating an education system that nurtures creativity.

Bionics that let us run, climb and dance
Hugh Herr explains about building the next generation of bionic limbs.

How to pick a proper password
We show you how to pick a proper password, and we explain why it’s worth it.

Most popular threats of 2013
Sophos security expert James Lyne looks back at 2013 and the major malware players of the year.

Scary internet stuff: Net threats
Take a look at how cybercriminals hide behind major sporting events like the 2010 World Cup.

What does the Internet of Things mean?
An evolution of mobile, home and embedded devices that are connected to the internet.

The difference between leadership and management
You think you are being a leader, but you are probably being a manager.

Game Over for GameOverZeus?
GameOverZeus is the most sophisticated botnet law enforcement has ever encountered.

Street View: Behind the Scenes
Learn how Google collects imagery and safeguards privacy on Street View.

How we take back the Internet
Edward Snowden speaks at TED2014 about surveillance and Internet freedom.

Your body language shapes you
Body language affects how others see us, but it may also change how we see ourselves.

Denial of Service attacks
Learn about one of the common internet security threats and how to avoid them.

History of the Internet
Explaining the inventions from time-sharing to filesharing, from Arpanet to Internet.

Social engineering tricks
Learn how cybercriminals are going after users through social engineering tricks.

The great bank robbery: Carbanak
One of the biggest cybercrime campaigns targeting financial institutions.

Stay Hungry. Stay Foolish.
Steve Jobs urged graduates to pursue their dreams and see opportunities in life’s setbacks.

The strangeness of scale at Twitter
Del Harvey offers a window into how she keeps 240 million users safe.

The 1s and 0s behind cyber warfare
Chris Domas shows how researchers use different techniques to understand binary code.