The Cybersecurity Iceberg Explained
ByteSeb
Apologies for the huge delay. I spent 3 months working on this video everyday. It's not perfect, of course. But I don't think my PC could handle another 5-13 hour long render. Thank you so much for watching!.
Intro 00:00 Social Engineering 01:07 Social Media Scams 02:19 Hacking 05:07 Passwords 07:52 VPNs 11:57 Antiviruses 13:58 Shoulder Surfing 16:49 Kali Linux 18:58 Spyware 20:48 Adware 22:13 Software Cracks Are Often Viruses 23:36 Cryptojacking 24:10 Computer Worms 25:16 Malicious Macros 27:45 Ransomware 30:42 Threat Model 33:54 Gaming Hacks 35:38 What Happens To Deleted Files? 38:02 Trojans 39:35 Forkbombs 41:32 Rootkit 44:10 Niche Malware 46:50 Hardware Vulnerabilities 49:31 Quantum Computers Could Break Encryption 52:24 Fileless Malware 53:48 Physical Security 55:02 Deep Web 57:42 Ashley Madison Data Breach 01:00:58 Horror Malware 01:02:17 Snowden Leaks 01:05:20 John McAfee's Final Years 01:06:47 K1ller Malware 01:07:46 Aaron Swartz 01:08:26 Cyberwarfare 01:10:12 Sources & Outro 01:12:48 ... https://www.youtube.com/watch?v=EMTgxXCijv0
788031801 Bytes