GET THE APP

Smart Tab is installed.
Open a new tab to launch.

Smart Tab had trouble installing.

The Secret World of Computer Hackers

What's it like to live as one of the world's most famous computer hackers? Imagine how safe the secrets of national security would be in the hands of the unsuspecting guy next door. Now, let it sink in that many of the most infamous and pervasive hackers have been your average Joes and Janes. Some, like Apple's original co-founder Stephen Wozniak and 1990s hacker Kevin Mitnick even went on to make an honest living of their technological loopholes as online security consultants. And although some miners of information purposely seek to destroy, like HeartBleed, others are propelled by sheer curiosity and a desire to explore without exposition. Take for example Gary McKinnon, who broke into 97 U.S. government computers to learn more about aliens. (Spoiler alert: He didn't find much.)

So how do we know who the good and bad guys are? What are the repercussions of accidental hacking gone awry — like when Tadayoshi Kohno accidentally hacked a wireless heart defibrillator and electrocuted a patient at the University of Washington? What's the difference between hackers, whistleblowers and online security activists? It depends on who you ask. Check out this playlist to get the facts from the cyber hackers themselves.

Playlist by
Linze Rice

From Heartbleed to Tamiflu: Why We're Less Safe Than We Thought

05:22

Save the video to your favorites

Watch Later Added

Add this video to a playlist

Add to Playlist

Use this video to start a new path

Begin New Path

25 Most Notorious Hackers To Ever Get Caught

4 of 9

08:53

Save the video to your favorites

Watch Later Added

Add this video to a playlist

Add to Playlist

Use this video to start a new path

Begin New Path

10 Infamous Computer Hackers

5 of 9

02:51

Save the video to your favorites

Watch Later Added

Add this video to a playlist

Add to Playlist

Use this video to start a new path

Begin New Path

Computer fights hacker attack

6 of 9

01:53

Save the video to your favorites

Watch Later Added

Add this video to a playlist

Add to Playlist

Use this video to start a new path

Begin New Path

Data.gov: Hacker Culture Takes Over Government?

7 of 9

02:17

Save the video to your favorites

Watch Later Added

Add this video to a playlist

Add to Playlist

Use this video to start a new path

Begin New Path

Computers Tips : What Do Hackers Do?

8 of 9

02:04

Save the video to your favorites

Watch Later Added

Add this video to a playlist

Add to Playlist

Use this video to start a new path

Begin New Path

Geek Vs Geek: Passwords and Online Security

9 of 9

04:09

Save the video to your favorites

Watch Later Added

Add this video to a playlist

Add to Playlist

Use this video to start a new path

Begin New Path

16x9 - Hackers causing cyber terror

10 of 9

05:11

Save the video to your favorites

Watch Later Added

Add this video to a playlist

Add to Playlist

Use this video to start a new path

Begin New Path

Hardware hackers open source Homeland Security

11 of 9

04:40

Save the video to your favorites

Watch Later Added

Add this video to a playlist

Add to Playlist

Use this video to start a new path

Begin New Path
Jump to top

Discuss this Path with other learners