Where Should I Host My Malware?
Offered By: Cooper via YouTube
Course Description
Overview
Explore the cybersecurity risks associated with IoT devices in this 28-minute conference talk from Hack.lu 2016. Discover how cybercriminals exploit poorly configured devices, particularly those with FTP services, to launch attacks. Learn about the SophosLabs research using the "ScanR" framework, which revealed alarming statistics about vulnerable IoT devices. Gain insights into the exploitation of old Internet protocols on modern connected devices and understand the risks for both home and corporate users. Receive recommendations for better protection against these unsophisticated yet dangerous attack scenarios. Presented by Attila Marosi, a Senior Threat Researcher at SophosLabs with extensive experience in information security and international certifications.
Syllabus
Intro
Agenda
Details
Seagate Central
Conclusions
Taught by
Cooper
Related Courses
Malicious Software and its Underground Economy: Two Sides to Every StoryUniversity of London International Programmes via Coursera Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera Introducción al Análisis del Malware en Windows
National Technological University – Buenos Aires Regional Faculty via Miríadax Android Malware Analysis - From Zero to Hero
Udemy How to Create and Embed Malware (2-in-1 Course)
Udemy