Curated Video
What is Cyber Warfare
The employment of cyberattacks against an adversary state to disrupt critical computer systems and/or inflict damage on the same scale as physical conflict is known as cyberwarfare. Espionage, sabotage, propaganda, manipulation, and...
Curated Video
Blended Attacks
A complex cyberattack described as a "blended attack" makes use of a variety of malicious malware, computer viruses, worms, or Trojan horses in addition to several vulnerabilities in hardware or software that the attacker is aware of.
Curated Video
Email Security
This video will guide you on how to setup your email for optimal security in addition to tips on how to prevent malicious emails
Curated Video
What is a Phishing Attack
Phishing is a form of social engineering in which an attacker delivers a false message intended to dupe a person into giving up personal information to the attacker or to install harmful software, such as ransomware, on the victim's...
Curated Video
I WONDER - Why Should You Be Careful When Clicking On Online Links?
This video is answering the question of why should you be careful when clicking on online links.
Curated Video
Describe the different types of malware that could affect a computer system or network : Rootkits
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
AllTime 10s
10 Most Dangerous Places On The Internet
The Internet is a dark place, with scams, predators and viruses lurking everywhere. So which sites are the most dangerous? Alltime 10s investigates'
Curated Video
Describe the different types of malware that could affect a computer system or network : Understand the types of malware
From the section: What are the threats?. This section includes threats, types of malware and lot more. This video gives an overview of malware and threats. It shows how to recognize malware, types of malware and how devices get them.
The Wall Street Journal
Securing The Perimeter
Headed into an election year, are private and government systems ready to withstand sophisticated hacks and attempts to spread misinformation? Greylock's Sarah Guo and Crowdstrike's George Kurtz discuss at WSJ Tech Live in Laguna Beach.
Curated Video
Describe the different types of malware that could affect a computer system or network : Downloaders
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
Next Animation Studio
North Korean hackers stole sensitive information from Microsoft users
Microsoft has filed a lawsuit against two anonymous North Korean hackers for stealing user information in a hacking operation called Thallium.
Curated Video
Describe the different types of malware that could affect a computer system or network : Keyloggers and Information Stealers
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
IDG TECHtalk
What is a deepfake? How to prepare for and respond to this cyber attack
As cyber criminals deploy more complex methods of hacking, using deepfakes to spread misinformation and “hack reality” have become more popular. This video, audio and/or text-based content is AI-generated and may be hard to discern from...
The Wall Street Journal
Reshaping the Government Role
The Biden administration took office amid a rising tide of cyberattacks. Associate Deputy Attorney General John Carlin talks about the policies the administration is using to stem attacks and to help protect companies and consumers.
Next Animation Studio
At least 45,000 Android devices infected with unremovable malware
Researchers at cybersecurity firms Malwarebytes and Symantec have uncovered an Android trojan called xHelper that is able to reinstall itself even after users have uninstalled it.
IDG TECHtalk
How to tweak Windows logs to better investigate attacks
Default Windows event log settings won’t give you all the information you need to investigate security incidents. Here’s how to get the info you need.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 10 Exam Question Review
IT systems are greatly affected by physical security. This episode presents a scenario in which only some security controls effectively mitigate a security problem. This clip is from the chapter "Physical Security" of the series "CompTIA...
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - Macro Malware
You will learn all about Macro malware, why they are so popular, having become a go-to means of infiltrating a computer in devastating fashion. You will also learn how to easily spot malicious macros, as well as protect yourself against...
Curated Video
Describe the different types of malware that could affect a computer system or network : Ransomware
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Securing Endpoints
In the enterprise, endpoint detection and response solutions report to a centralized SIEM solution when abnormal activity, including malware, is detected on hosts and devices. Intrusion detection and prevention systems (IDS/IPS) are the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 11 Exam Question Review
Connecting to any Internet resource commonly uses DNS to resolve host names to IP addresses. In this episode, the viewer is presented with a DNS scenario and must determine which type of attack has occurred. This clip is from the chapter...
IDG TECHtalk
Setting up DLP features for email
Network World contributing editor David Strom provides a roundup of how to enable data leak prevention features on three email security platforms.
Curated Video
Bug Bounty Program Certification 6.6: Infect Complete Network Using Malwares
In this video, you will see how to infect entire network using malwares. • Learn about various network attacks • Explore the process of network infection techniques • Explanation of malware infection in network
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - Apple Part I
You will learn about the general security around Apple computers. You will also learn why Apple operating systems can be very secure most of the time but can sometimes be just as insecure as other computers. In addition, you will be...