Segments in this Video

Introduction: Rise of the Hackers (01:44)

FREE PREVIEW

This brief overview of computer technology orients viewers with excerpts from the upcoming program.

One Common Enemy (01:29)

Hackers are trying to come up with ways to steal our money, our identities, and our secrets.

Hacked (02:00)

Mat Honan learns that his hackers social engineered all of his accounts.

Social Engineering (04:00)

Learn how the hackers followed a series of loopholes to gain access to all of Honan's accounts.

Stuxnet (03:45)

Cyber security sleuths Eric Chien and Liam O'Murchu discuss their investigation into this unusual virus.

Iran (02:16)

Stuxnet was attempting to attack a nuclear facility in Iran.

Natanz (03:56)

Learn how Stuxnet planned to thwart creation of nuclear arms in Iran. Stuxnet opened the door for cyber warfare.

Prime Numbers (02:08)

Former mathematician, James Lyne talks about the importance of prime numbers in encrypting codes.

Semiprimes (02:54)

Learn how data is encrypted on the Internet.

Quantum Mechanics (03:26)

Computers are gaining in power, and staying ahead of Internet security may become more difficult. Erik Lucero describes the concept of superposition.

Quantum Bits (02:22)

Learn how Lucer's quantum processor works at super speed.

Quantum Processing (02:16)

A quantum processor considers all possible answers simultaneously instead of sequentially. This could be a threat to current encryption methods.

Keeping Secrets Safe (02:43)

Seth Lloyd explains how quantum mechanics can be used to guarantee privacy and encryption using the observer effect theory.

Quantum Cryptography (03:09)

Lloyd demonstrates how this technology is used to determine if someone is eavesdropping, which then allows a secret key to be created.

Ultra Paranoid Computing (03:07)

Patrick Lincoln compares the Internet to a bad neighborhood where thieves are rattling your doorknobs constantly. No one machine can be completely trusted.

Subliminal Password (02:45)

Daniel Sanchez explains how a guitar video game can be used to store sequential passwords in the human brain.

Complex Networks (03:36)

People are the weak link in a computer network. Even computers that are not connected to the Internet can be infected with malicious code.

Digital Pandora's Box (03:37)

A removable media device may have been used to start the Stuxnet virus. The virus has now gone global and can be manipulated to attack others.

Conclusion (00:50)

Codes and secrets are not new. But the advent of global digital communication has created a new battleground.

Credits: Rise of the Hackers (01:07)

Credits: Rise of the Hackers

For additional digital leasing and purchase options contact a media consultant at 800-257-5126
(press option 3) or sales@films.com.

Rise of the Hackers


3-Year Streaming Price: $169.95

Share

Description

Our lives are going digital. We shop, bank and even date online. Computers hold our treasured photographs, private emails, and all of our personal information. This data is precious—and cybercriminals want it. Now, NOVA goes behind the scenes of the fast-paced world of cryptography to meet the scientists battling to keep our data safe. They are experts in extreme physics, math and a new field called “ultra-paranoid computing,” all working to forge unbreakable codes and build ultra-fast computers. From the two men who uncovered the world’s most advanced cyber weapon to the computer expert who worked out how to hack into cash machines and scientists who believe they can store a password in your unconscious brain, NOVA investigates how a new global geek squad is harnessing cutting-edge science—all to stay one step ahead of the hackers.

Length: 54 minutes

Item#: BVL60738

Copyright date: ©2014

Closed Captioned

Performance Rights

Prices include public performance rights.

Not available to Home Video, Dealer and Publisher customers.

Only available in USA and Canada.


Share