Where Should I Host My Malware?
Offered By: Cooper via YouTube
Course Description
Overview
Explore the cybersecurity risks associated with IoT devices in this 28-minute conference talk from Hack.lu 2016. Discover how cybercriminals exploit poorly configured devices, particularly those with FTP services, to launch attacks. Learn about the SophosLabs research using the "ScanR" framework, which revealed alarming statistics about vulnerable IoT devices. Gain insights into the exploitation of old Internet protocols on modern connected devices and understand the risks for both home and corporate users. Receive recommendations for better protection against these unsophisticated yet dangerous attack scenarios. Presented by Attila Marosi, a Senior Threat Researcher at SophosLabs with extensive experience in information security and international certifications.
Syllabus
Intro
Agenda
Details
Seagate Central
Conclusions
Taught by
Cooper
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network