In this video, we will explore an example of worms in the real world. In 2010, Stuxnet caused centrifuges at Natanz, an Iranian nuclear facility, to fail. This is the …
In the video, you will learn about worms, how they differ from viruses, how they enter computers, and the capabilities of more advanced worms. The main takeaway is that worms …
In the video, we will look at viruses. A virus is any type of malicious code or program that alters the way a computer operates. A virus requires user interaction …
This video will consider the actual scope of malware, which is not always accurately portrayed in the media. Malware can range from high levels of sophistication to low levels of …
In the video, we will consider a definition of malware as any piece of software intentionally designed to harm your computer, server, client, or network. Malware is, therefore, defined by …
In this video two different Vishing attack examples are discussed, highlighting the red flags to look out for to prevent such attacks. You will be surprised at the lengths attackers …
In this video, you will be introduced to Vishing and the main objectives of this type of cybersecurity attack. Vishing (voice phishing) is the fraudulent practice of making phone calls …
In this video, we will take an overview of Fireball, a web browser hijack tool that directs users to other sites. Fireball Infected over 250 million devices in 2017. Typically, …
Five different smishing attack examples are discussed in the video, where one even uses humor as a tactic. Take note of what to do to prevent such attacks, especially in …
In this video you will be introduced to smishing, focusing on the key objective of this specialized attack and who is at risk. Smishing is the fraudulent practice of sending …
Malware is complicated and ever-evolving. Malware today is far more complex than 20 years ago. Although there are many classes of malware, these are increasingly blurred together in modern attacks. …
In this video, we will consider how hybrid malware combines several malware families together to perform a complex attack. The malware will typically be categorized by its dominant component, even …
In this video, five different whaling attack examples are discussed, which include high-profile cases that were a near-miss. The video will highlight the tactics that were used and what to …
In this video, you will be introduced to whaling, also known as CEO fraud. We will discuss what whaling attackers are trying to accomplish and highlight who is at risk.
In this video, four different spear-phishing email examples are discussed. The examples highlight the tactics used and the red flags to look out for when you want to prevent these …