YoVDO

Where Should I Host My Malware?

Offered By: Cooper via YouTube

Tags

Hack.lu Courses Cybersecurity Courses Malware Analysis Courses

Course Description

Overview

Explore the cybersecurity risks associated with IoT devices in this 28-minute conference talk from Hack.lu 2016. Discover how cybercriminals exploit poorly configured devices, particularly those with FTP services, to launch attacks. Learn about the SophosLabs research using the "ScanR" framework, which revealed alarming statistics about vulnerable IoT devices. Gain insights into the exploitation of old Internet protocols on modern connected devices and understand the risks for both home and corporate users. Receive recommendations for better protection against these unsophisticated yet dangerous attack scenarios. Presented by Attila Marosi, a Senior Threat Researcher at SophosLabs with extensive experience in information security and international certifications.

Syllabus

Intro
Agenda
Details
Seagate Central
Conclusions


Taught by

Cooper

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network