CYBERWAR

CYBERWAR

متاح للشراء
From the Sony hack to the Syrian Electronic Army, it’s happening all around us. Cyberwar hosted by Ben Makuch will investigate the most significant computer security issues of our time.
١٠/٧٫٧ IMDb20162 من المواسم
١٠/٧٫٧ IMDb20162 من المواسم
فريق التمثيل: Ben MakuchBrian KrebsMichael Chertoff
TV-MA
16 الحلقات
  • 1. Who is Anonymous?

    1. Who is Anonymous?

    The notorious hacktivist collective Anonymous has targeted everyone from PayPal to the FBI. But a string of arrests have crippled the group. So who is Anonymous now?
    The notorious hacktivist collective Anonymous has targeted everyone from PayPal to the FBI. But a string of arrests have crippled the group. So who is Anonymous now?
    TV-14
    23 من الدقائق
    4 يوليو 2016
  • 2. The Sony Hack

    2. The Sony Hack

    Sony Pictures was hacked and the U.S. blamed North Korea. But the government's evidence wasn't all that convincing, and many hackers and computer experts still have doubts.
    Sony Pictures was hacked and the U.S. blamed North Korea. But the government's evidence wasn't all that convincing, and many hackers and computer experts still have doubts.
    TV-PG
    23 من الدقائق
    11 يوليو 2016
  • 3. Cyber Mercenaries

    3. Cyber Mercenaries

    Authoritarian regimes are using spyware tools bought from private companies in the West. Hacker PhineasFisher targeted these companies to reveal their deals to suppress dissent.
    Authoritarian regimes are using spyware tools bought from private companies in the West. Hacker PhineasFisher targeted these companies to reveal their deals to suppress dissent.
    TV-14
    23 من الدقائق
    18 يوليو 2016
  • 4. Hacked by China

    4. Hacked by China

    From Google to the government, China has hacked many American networks. But there’s a difference between spying and stealing intellectual property.
    From Google to the government, China has hacked many American networks. But there’s a difference between spying and stealing intellectual property.
    TV-14
    23 من الدقائق
    25 يوليو 2016
  • 5. Syria's Cyber Battlefields

    5. Syria's Cyber Battlefields

    On the frontlines of one of the world's bloodiest conflicts, a parallel war is being fought in cyberspace. Is Syria's cyber battlefield creating a model for the wars of the future?
    On the frontlines of one of the world's bloodiest conflicts, a parallel war is being fought in cyberspace. Is Syria's cyber battlefield creating a model for the wars of the future?
    TV-MA
    23 من الدقائق
    1 أغسطس 2016
  • 6. Stuxnet the Digital Weapon

    6. Stuxnet the Digital Weapon

    Stuxnet was a sophisticated cyber attack on an Iranian nuclear plant that may have changed the nature of warfare forever.
    Stuxnet was a sophisticated cyber attack on an Iranian nuclear plant that may have changed the nature of warfare forever.
    TV-14
    23 من الدقائق
    8 أغسطس 2016
  • 7. Hacking the Infrastructure

    7. Hacking the Infrastructure

    As Iran ramps up its offensive cyber operations, American critical infrastructure is increasingly vulnerable to attacks.
    As Iran ramps up its offensive cyber operations, American critical infrastructure is increasingly vulnerable to attacks.
    TV-14
    23 من الدقائق
    15 أغسطس 2016
  • 8. America's Elite Hacking Force

    8. America's Elite Hacking Force

    Tailored Access Operations, or TAO, is the NSA's elite hacking force. TAO employs some of America's best hackers – so who are their targets?
    Tailored Access Operations, or TAO, is the NSA's elite hacking force. TAO employs some of America's best hackers – so who are their targets?
    TV-14
    23 من الدقائق
    22 أغسطس 2016
  • 9. The Zero Day Market

    9. The Zero Day Market

    "Zero days" are bugs in software that hackers use to break into systems. Some are valued at up to a million dollars, with both buyers and sellers shrouded in secrecy.
    "Zero days" are bugs in software that hackers use to break into systems. Some are valued at up to a million dollars, with both buyers and sellers shrouded in secrecy.
    TV-PG
    22 من الدقائق
    24 أكتوبر 2016
  • 10. Anonymous vs. ISIS

    10. Anonymous vs. ISIS

    Anonymous declares war on ISIS. But when Anonymous members share intel with the government it fractures the hacktivist collective.
    Anonymous declares war on ISIS. But when Anonymous members share intel with the government it fractures the hacktivist collective.
    TV-14
    23 من الدقائق
    31 أكتوبر 2016
  • 11. The Ashley Madison Hack

    11. The Ashley Madison Hack

    After Ashley Madison, a hook-up site for married people, got hacked, its users weren't the only ones exposed. Turns out the cheating site may have been cheating its own customers.
    After Ashley Madison, a hook-up site for married people, got hacked, its users weren't the only ones exposed. Turns out the cheating site may have been cheating its own customers.
    TV-14
    23 من الدقائق
    11 يوليو 2016
  • 12. Israel: Cyber Nation

    12. Israel: Cyber Nation

    Israel is one of the world’s cyber super powers. So how did this tiny nation grow so strong – and who is it targeting?
    Israel is one of the world’s cyber super powers. So how did this tiny nation grow so strong – and who is it targeting?
    TV-14
    23 من الدقائق
    21 نوفمبر 2016
  • 13. Lights Out In Ukraine

    13. Lights Out In Ukraine

    A cyber attack on Ukraine’s power grid leaves thousands of people in the dark. As a military conflict involving Russia rages in the east, has the ground war led to cyberwar?
    A cyber attack on Ukraine’s power grid leaves thousands of people in the dark. As a military conflict involving Russia rages in the east, has the ground war led to cyberwar?
    TV-MA
    23 من الدقائق
    28 نوفمبر 2016
  • 14. Crime & Government: Russia's Hackers

    14. Crime & Government: Russia's Hackers

    Russian cybercrime is big business – and some say hackers get a pass when they work double duty for Putin and his geopolitical ambitions."
    Russian cybercrime is big business – and some say hackers get a pass when they work double duty for Putin and his geopolitical ambitions."
    TV-MA
    23 من الدقائق
    5 ديسمبر 2016
  • 15. The Future of War

    15. The Future of War

    The wars of the future might be fought with autonomous machines, drones and weapons that can act on their own. But is it ever OK to write code that can kill?
    The wars of the future might be fought with autonomous machines, drones and weapons that can act on their own. But is it ever OK to write code that can kill?
    TV-14
    23 من الدقائق
    12 ديسمبر 2016
  • 16. The Race for Artificial Intelligence

    16. The Race for Artificial Intelligence

    From self-driving cars to Siri, a race is on to build more powerful AI. But some warn we could be programming our own extinction.
    From self-driving cars to Siri, a race is on to build more powerful AI. But some warn we could be programming our own extinction.
    TV-14
    23 من الدقائق
    19 ديسمبر 2016
  • CYBERWAR
    ١٠/٧٫٧ IMDb20162 من المواسم
    From the Sony hack to the Syrian Electronic Army, it’s happening all around us. Cyberwar hosted by Ben Makuch will investigate the most significant computer security issues of our time.
    تقييمات
    4.3 out of 5 stars

    22 تصنيف عالمي

    1. 5 star
      71%
    2. 4 star
      12%
    3. 3 star
      8%
    4. 2 star
      0%
    5. 1 star
      9%
    قراءة كل التقييمات
    استشاري المحتوى
    TV-MA
    أضواء ساطعةألفاظ نابيةمحتوى جنسيقد تؤثر الأضواء الساطعة وأنماط الوميض على المشاهدين الذين يعانون من الحساسية ضد الضوء
    لغات الصوت
    English
    الترجمة
    English [CC]
    بالطلب أو بالمشاهدة، فأنت توافق على شروطنا. مُباع من قِبل Amazon.com Services LLC.

    الملاحظات