Cybercrime netted a whopping $450 billion in profits last year, with 2 billion records lost or stolen worldwide. Security expert Caleb Barlow calls out the insufficiency of our current strategies to protect our data. His solution? We need to respond to cybercrime with the same collective effort as we apply to a health care crisis, sharing timely...
Is cybercrime getting easier? Cybersecurity expert Ryan Pullen dives into his work investigating massive digital breaches and testing security blindspots — which led to him gaining access to the software controls of a well-known building in London. Learn more about how cybercriminals exploit human vulnerabilities and hear the latest on how to re...
Todd Humphreys forecasts the near-future of geolocation when millimeter-accurate GPS "dots" will enable you to find pin-point locations, index-search your physical possessions ... or to track people without their knowledge. And the response to the sinister side of this technology may have unintended consequences of its own.
Lorrie Faith Cranor studied thousands of real passwords to figure out the surprising, very common mistakes that users -- and secured sites -- make to compromise security. And how, you may ask, did she study thousands of real passwords without compromising the security of any users? That's a story in itself. It's secret data worth knowing, especi...
In this practical talk, cybersecurity expert Nadya Bartol brings this crucial topic out into the open, lifting the shame around tech mistakes and offering creative ways to celebrate and reward good cybersecurity habits at work and beyond.
You use paper towels to dry your hands every day, but chances are, you're doing it wrong. In this enlightening and funny short talk, Joe Smith reveals the trick to perfect paper towel technique.
Could someone hack your pacemaker? Avi Rubin shows how hackers are compromising cars, smartphones and medical devices, and warns us about the dangers of an increasingly hack-able world.
Every day, a sea of decisions stretches before us, and it's impossible to make a perfect choice every time. But there are many ways to improve our chances — and one particularly effective technique is critical thinking. Samantha Agoos describes a 5-step process that may help you with any number of problems. [Directed by Nick Hilditch, narrated b...
Hacker and writer Joshua Klein is fascinated by crows. (Notice the gleam of intelligence in their little black eyes?) After a long amateur study of corvid behavior, he's come up with an elegant thought experiment: a machine that could form a new bond between animal and human.
The beauty of hackers, says cybersecurity expert Keren Elazari, is that they force us to evolve and improve. Yes, some hackers are bad guys, but many are working to fight government corruption and advocate for our rights. By exposing vulnerabilities, they push the Internet to become stronger and healthier, wielding their power to create a better...
"Full access to a person's phone is the next best thing to full access to a person's mind," says cybersecurity expert Eva Galperin. In an urgent talk, she describes the emerging danger of stalkerware -- software designed to spy on someone by gaining access to their devices without their knowledge -- and calls on antivirus companies to recognize ...
Building sophisticated educational tools out of cheap parts, Johnny Lee demos his cool Wii Remote hacks, which turn the $40 video game controller into a digital whiteboard, a touchscreen and a head-mounted 3-D viewer.
The smartphone you use reflects more than just personal taste ... it could determine how closely you can be tracked, too. Privacy expert and TED Fellow Christopher Soghoian details a glaring difference between the encryption used on Apple and Android devices and urges us to pay attention to a growing digital security divide. "If the only people ...
Mikko Hypponen lays it out: "The talks I chose for my playlist are about technology, security or privacy. Because geeks. Then I added the talk from Dan Barber. Because fish."
Can you imagine a future where wars are fought not with bombs and bullets but computer viruses and pacemaker shutdowns? Cyberware is unique in that it is not covered by existing legal framework and it often inspires more questions than we are yet capable of answering. Daniel Garrie ponders some of the practical and ethical dilemmas that may pop ...
America was built by makers -- curious, enthusiastic amateur inventors whose tinkering habit sparked whole new industries. At TED@MotorCity, MAKE magazine publisher Dale Dougherty says we're all makers at heart, and shows cool new tools to tinker with, like Arduinos, affordable 3D printers, even DIY satellites.
Journalist Andrew Marantz spent three years embedded in the world of internet trolls and social media propagandists, seeking out the people who are propelling fringe talking points into the heart of conversation online and trying to understand how they're making their ideas spread. Go down the rabbit hole of online propaganda and misinformation ...
Laura Galante profiles advanced cyber threats and network breaches and investigates the political, military and financial implications of cyber operations.
When faced with a big challenge where potential failure seems to lurk at every corner, you've probably heard the advice, "Be more confident!" But where does confidence come from, and how can you get more of it? Here are three easy tips to boost your confidence. [Directed by Kozmonot Animation Studio, narrated by Susan Zimmerman, music by WORKPLA...
The emergence of data-driven mass surveillance "is threatening to turn privacy into a relic of the 20th century," says the anonymous YouTube creator known as Ordinary Things. Meanwhile, state-funded troll farms are spreading disinformation and curating chaos on platforms meant to connect us and revolutionize the way we live. Ordinary Things give...
Nations can now attack other nations with cyber weapons: silent strikes on another country's computer systems, power grids, dams that leave no trace behind. (Think of the Stuxnet worm.) Guy-Philippe Goldstein shows how cyberattacks can leap between the digital and physical worlds to prompt armed conflict -- and how we might avert this global sec...