Тёмный

Social Engineering | Cyber Security Crash Course 

WithSecure
Подписаться 16 тыс.
Просмотров 46 тыс.
50% 1

In simple terms, social engineering means manipulating people into giving up confidential information. It is one of the most effective attack vectors. We designed a phishing experiment to show how social engineering works in real life. Watch this video to see if F-Secure’s ethical hackers were able to breach Linda Liukas*, and how you can protect your employees and business from social engineering.
Learn more about social engineering and phishing:
blog.f-secure....
Linda Liukas is a programmer, children’s book author and TED speaker exploring the wonders of cyber security with F-Secure experts on our Cyber Security Crash Course video series.

Наука

Опубликовано:

 

3 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 9   
@ccna101
@ccna101 6 лет назад
This is actually a very good video on the subject of social engineering. I think she got the hint and became a little more sensitive to being attacked through emails when the gentleman explained this her before she signed the paper. A regular reminder of such attacks is what keeps people aware and safe. It shows what education can do. People know about these things but need to be reminded from time to time because we are human and we forget.
@badlydrawncars6460
@badlydrawncars6460 5 лет назад
This is the most Scandinavian video I've ever seen.
@alexvtm7925
@alexvtm7925 6 лет назад
nice job.
@quax2500
@quax2500 4 года назад
music to loud
@rtnjo6936
@rtnjo6936 4 года назад
music very loud
@bhaktacharandas6656
@bhaktacharandas6656 5 лет назад
I am actually lover of hacking after seeing this video
@lonnielrc
@lonnielrc 5 лет назад
She can't be warned !
@ryangustin2195
@ryangustin2195 3 года назад
Ha get smurfed on lady
Далее
Social Engineering - How Bad Guys Hack Users
14:58
Просмотров 54 тыс.
КОГДА НАКРОШИЛ НА ПОЛ #shorts
00:19
Просмотров 855 тыс.
Incident Response | Cyber Security Crash Course
6:33
Hashing Algorithms and Security - Computerphile
8:12
Cybersecurity: Crash Course Computer Science #31
12:30
Просмотров 993 тыс.
Former Spy Ranks Amazon Spy Devices | DEEP X
13:05
Просмотров 303 тыс.
Watch this hacker break into a company
2:56
Просмотров 3,9 млн
iOS 18 в реальной жизни
14:42
Просмотров 174 тыс.
iPhone Standby mode dock, designed with @overwerk
0:27
Самый длинный ноутбук!
0:23
Просмотров 44 тыс.