1 00:00:00,030 --> 00:00:02,300 does this screen scare you it means your 2 00:00:02,300 --> 00:00:02,310 does this screen scare you it means your 3 00:00:02,310 --> 00:00:04,400 does this screen scare you it means your computer is disabled your hard drive is 4 00:00:04,400 --> 00:00:04,410 computer is disabled your hard drive is 5 00:00:04,410 --> 00:00:06,079 computer is disabled your hard drive is encrypted and you can't do anything 6 00:00:06,079 --> 00:00:06,089 encrypted and you can't do anything 7 00:00:06,089 --> 00:00:09,799 encrypted and you can't do anything unless you pay the ransom but it can be 8 00:00:09,799 --> 00:00:09,809 unless you pay the ransom but it can be 9 00:00:09,809 --> 00:00:10,430 unless you pay the ransom but it can be avoided 10 00:00:10,430 --> 00:00:10,440 avoided 11 00:00:10,440 --> 00:00:13,160 avoided it's basically finding holes and gaps to 12 00:00:13,160 --> 00:00:13,170 it's basically finding holes and gaps to 13 00:00:13,170 --> 00:00:14,870 it's basically finding holes and gaps to do malicious things 14 00:00:14,870 --> 00:00:14,880 do malicious things 15 00:00:14,880 --> 00:00:18,529 do malicious things stealing information destroying your box 16 00:00:18,529 --> 00:00:18,539 stealing information destroying your box 17 00:00:18,539 --> 00:00:20,929 stealing information destroying your box or you know doing something nefarious 18 00:00:20,929 --> 00:00:20,939 or you know doing something nefarious 19 00:00:20,939 --> 00:00:23,179 or you know doing something nefarious pretty much typically with ransomware 20 00:00:23,179 --> 00:00:23,189 pretty much typically with ransomware 21 00:00:23,189 --> 00:00:25,640 pretty much typically with ransomware the most common thing is to use 22 00:00:25,640 --> 00:00:25,650 the most common thing is to use 23 00:00:25,650 --> 00:00:28,370 the most common thing is to use encryption to encrypt all of your files 24 00:00:28,370 --> 00:00:28,380 encryption to encrypt all of your files 25 00:00:28,380 --> 00:00:30,890 encryption to encrypt all of your files or your hard drive and then try to 26 00:00:30,890 --> 00:00:30,900 or your hard drive and then try to 27 00:00:30,900 --> 00:00:34,940 or your hard drive and then try to ransom you one of the most famous 28 00:00:34,940 --> 00:00:34,950 ransom you one of the most famous 29 00:00:34,950 --> 00:00:36,680 ransom you one of the most famous ransomware attacks happened fairly 30 00:00:36,680 --> 00:00:36,690 ransomware attacks happened fairly 31 00:00:36,690 --> 00:00:40,270 ransomware attacks happened fairly recently in spring of 2017 wanna cry 32 00:00:40,270 --> 00:00:40,280 recently in spring of 2017 wanna cry 33 00:00:40,280 --> 00:00:42,709 recently in spring of 2017 wanna cry malicious code based on a leaked NSA 34 00:00:42,709 --> 00:00:42,719 malicious code based on a leaked NSA 35 00:00:42,719 --> 00:00:44,770 malicious code based on a leaked NSA exploit spread around the world 36 00:00:44,770 --> 00:00:44,780 exploit spread around the world 37 00:00:44,780 --> 00:00:47,959 exploit spread around the world infecting about 200,000 computers 38 00:00:47,959 --> 00:00:47,969 infecting about 200,000 computers 39 00:00:47,969 --> 00:00:50,060 infecting about 200,000 computers hospitals in the UK were hit so hard 40 00:00:50,060 --> 00:00:50,070 hospitals in the UK were hit so hard 41 00:00:50,070 --> 00:00:51,400 hospitals in the UK were hit so hard they were forced to turn away 42 00:00:51,400 --> 00:00:51,410 they were forced to turn away 43 00:00:51,410 --> 00:00:53,660 they were forced to turn away non-critical emergencies and while 44 00:00:53,660 --> 00:00:53,670 non-critical emergencies and while 45 00:00:53,670 --> 00:00:55,310 non-critical emergencies and while ransomware like that sounds like a 46 00:00:55,310 --> 00:00:55,320 ransomware like that sounds like a 47 00:00:55,320 --> 00:00:58,939 ransomware like that sounds like a nightmare spyware maybe even worse I can 48 00:00:58,939 --> 00:00:58,949 nightmare spyware maybe even worse I can 49 00:00:58,949 --> 00:01:04,789 nightmare spyware maybe even worse I can cover keystroke screenshot video or 50 00:01:04,789 --> 00:01:04,799 cover keystroke screenshot video or 51 00:01:04,799 --> 00:01:07,580 cover keystroke screenshot video or audio essentially it's like the Trojan 52 00:01:07,580 --> 00:01:07,590 audio essentially it's like the Trojan 53 00:01:07,590 --> 00:01:10,010 audio essentially it's like the Trojan horse you look like something benign but 54 00:01:10,010 --> 00:01:10,020 horse you look like something benign but 55 00:01:10,020 --> 00:01:12,260 horse you look like something benign but inside is malicious and it'll keep 56 00:01:12,260 --> 00:01:12,270 inside is malicious and it'll keep 57 00:01:12,270 --> 00:01:14,270 inside is malicious and it'll keep connecting back to its command and 58 00:01:14,270 --> 00:01:14,280 connecting back to its command and 59 00:01:14,280 --> 00:01:16,730 connecting back to its command and control server and it will keep sending 60 00:01:16,730 --> 00:01:16,740 control server and it will keep sending 61 00:01:16,740 --> 00:01:19,280 control server and it will keep sending data constantly back to that commanding 62 00:01:19,280 --> 00:01:19,290 data constantly back to that commanding 63 00:01:19,290 --> 00:01:22,660 data constantly back to that commanding control and on their on the Packers and 64 00:01:22,660 --> 00:01:22,670 control and on their on the Packers and 65 00:01:22,670 --> 00:01:25,999 control and on their on the Packers and you can access your box and see you like 66 00:01:25,999 --> 00:01:26,009 you can access your box and see you like 67 00:01:26,009 --> 00:01:27,499 you can access your box and see you like what kind of data I just came back 68 00:01:27,499 --> 00:01:27,509 what kind of data I just came back 69 00:01:27,509 --> 00:01:29,929 what kind of data I just came back someone could be logging everything you 70 00:01:29,929 --> 00:01:29,939 someone could be logging everything you 71 00:01:29,939 --> 00:01:31,850 someone could be logging everything you do on your computer a nightmare scenario 72 00:01:31,850 --> 00:01:31,860 do on your computer a nightmare scenario 73 00:01:31,860 --> 00:01:33,950 do on your computer a nightmare scenario that records your keystrokes as you 74 00:01:33,950 --> 00:01:33,960 that records your keystrokes as you 75 00:01:33,960 --> 00:01:35,899 that records your keystrokes as you enter your bank password captures 76 00:01:35,899 --> 00:01:35,909 enter your bank password captures 77 00:01:35,909 --> 00:01:37,940 enter your bank password captures confidential documents on screen and 78 00:01:37,940 --> 00:01:37,950 confidential documents on screen and 79 00:01:37,950 --> 00:01:40,490 confidential documents on screen and even watches your through your camera as 80 00:01:40,490 --> 00:01:40,500 even watches your through your camera as 81 00:01:40,500 --> 00:01:43,010 even watches your through your camera as you watch this video let's say the 82 00:01:43,010 --> 00:01:43,020 you watch this video let's say the 83 00:01:43,020 --> 00:01:46,730 you watch this video let's say the average reaches it's like 40 days like 84 00:01:46,730 --> 00:01:46,740 average reaches it's like 40 days like 85 00:01:46,740 --> 00:01:48,499 average reaches it's like 40 days like they don't figure it out so after 40 86 00:01:48,499 --> 00:01:48,509 they don't figure it out so after 40 87 00:01:48,509 --> 00:01:51,740 they don't figure it out so after 40 days so that's 40 days for them to steal 88 00:01:51,740 --> 00:01:51,750 days so that's 40 days for them to steal 89 00:01:51,750 --> 00:01:54,230 days so that's 40 days for them to steal data and information and get out and 90 00:01:54,230 --> 00:01:54,240 data and information and get out and 91 00:01:54,240 --> 00:01:58,039 data and information and get out and clean up 40 days that's probably more 92 00:01:58,039 --> 00:01:58,049 clean up 40 days that's probably more 93 00:01:58,049 --> 00:01:59,749 clean up 40 days that's probably more than enough time for someone to steal 94 00:01:59,749 --> 00:01:59,759 than enough time for someone to steal 95 00:01:59,759 --> 00:02:03,080 than enough time for someone to steal all of your information so how do you 96 00:02:03,080 --> 00:02:03,090 all of your information so how do you 97 00:02:03,090 --> 00:02:04,940 all of your information so how do you avoid this malicious software you should 98 00:02:04,940 --> 00:02:04,950 avoid this malicious software you should 99 00:02:04,950 --> 00:02:09,800 avoid this malicious software you should have something like if you're gonna 100 00:02:09,800 --> 00:02:09,810 have something like if you're gonna 101 00:02:09,810 --> 00:02:11,809 have something like if you're gonna download a documents the most common 102 00:02:11,809 --> 00:02:11,819 download a documents the most common 103 00:02:11,819 --> 00:02:14,540 download a documents the most common thing is to allow macros right Mac 104 00:02:14,540 --> 00:02:14,550 thing is to allow macros right Mac 105 00:02:14,550 --> 00:02:17,690 thing is to allow macros right Mac macros allows like little programs 106 00:02:17,690 --> 00:02:17,700 macros allows like little programs 107 00:02:17,700 --> 00:02:19,760 macros allows like little programs within the document a word document but 108 00:02:19,760 --> 00:02:19,770 within the document a word document but 109 00:02:19,770 --> 00:02:22,820 within the document a word document but that's the most common way that malware 110 00:02:22,820 --> 00:02:22,830 that's the most common way that malware 111 00:02:22,830 --> 00:02:25,900 that's the most common way that malware is delivered these days so by allowing 112 00:02:25,900 --> 00:02:25,910 is delivered these days so by allowing 113 00:02:25,910 --> 00:02:29,089 is delivered these days so by allowing enabling macros you're allowing you know 114 00:02:29,089 --> 00:02:29,099 enabling macros you're allowing you know 115 00:02:29,099 --> 00:02:32,990 enabling macros you're allowing you know some code to run in the background your 116 00:02:32,990 --> 00:02:33,000 some code to run in the background your 117 00:02:33,000 --> 00:02:34,580 some code to run in the background your computer can get infected from just a 118 00:02:34,580 --> 00:02:34,590 computer can get infected from just a 119 00:02:34,590 --> 00:02:36,410 computer can get infected from just a tiny piece of software in a text 120 00:02:36,410 --> 00:02:36,420 tiny piece of software in a text 121 00:02:36,420 --> 00:02:39,650 tiny piece of software in a text document but also be careful with the 122 00:02:39,650 --> 00:02:39,660 document but also be careful with the 123 00:02:39,660 --> 00:02:41,750 document but also be careful with the websites you're visiting you want to 124 00:02:41,750 --> 00:02:41,760 websites you're visiting you want to 125 00:02:41,760 --> 00:02:43,520 websites you're visiting you want to look at the reputation of the website 126 00:02:43,520 --> 00:02:43,530 look at the reputation of the website 127 00:02:43,530 --> 00:02:47,150 look at the reputation of the website does the website have SSL encryption or 128 00:02:47,150 --> 00:02:47,160 does the website have SSL encryption or 129 00:02:47,160 --> 00:02:50,170 does the website have SSL encryption or if it doesn't have the HTTPS like on 130 00:02:50,170 --> 00:02:50,180 if it doesn't have the HTTPS like on 131 00:02:50,180 --> 00:02:53,300 if it doesn't have the HTTPS like on actual URL like that'll be a big 132 00:02:53,300 --> 00:02:53,310 actual URL like that'll be a big 133 00:02:53,310 --> 00:02:55,729 actual URL like that'll be a big indicator if there's a pop-up just close 134 00:02:55,729 --> 00:02:55,739 indicator if there's a pop-up just close 135 00:02:55,739 --> 00:02:56,750 indicator if there's a pop-up just close down the browser 136 00:02:56,750 --> 00:02:56,760 down the browser 137 00:02:56,760 --> 00:02:59,420 down the browser really because by allowing that user 138 00:02:59,420 --> 00:02:59,430 really because by allowing that user 139 00:02:59,430 --> 00:03:01,610 really because by allowing that user interaction you're giving the program 140 00:03:01,610 --> 00:03:01,620 interaction you're giving the program 141 00:03:01,620 --> 00:03:06,740 interaction you're giving the program rights to do what it's very easy to hide 142 00:03:06,740 --> 00:03:06,750 rights to do what it's very easy to hide 143 00:03:06,750 --> 00:03:08,990 rights to do what it's very easy to hide malicious software and other programs so 144 00:03:08,990 --> 00:03:09,000 malicious software and other programs so 145 00:03:09,000 --> 00:03:10,670 malicious software and other programs so make sure the software you download is 146 00:03:10,670 --> 00:03:10,680 make sure the software you download is 147 00:03:10,680 --> 00:03:12,860 make sure the software you download is from a reputable source even a Flash 148 00:03:12,860 --> 00:03:12,870 from a reputable source even a Flash 149 00:03:12,870 --> 00:03:16,250 from a reputable source even a Flash Player or there are a lot of doubt 150 00:03:16,250 --> 00:03:16,260 Player or there are a lot of doubt 151 00:03:16,260 --> 00:03:18,259 Player or there are a lot of doubt clickable downloads out there that says 152 00:03:18,259 --> 00:03:18,269 clickable downloads out there that says 153 00:03:18,269 --> 00:03:20,630 clickable downloads out there that says oh your computer is hacked with a bright 154 00:03:20,630 --> 00:03:20,640 oh your computer is hacked with a bright 155 00:03:20,640 --> 00:03:23,589 oh your computer is hacked with a bright red screen but it's totally think also 156 00:03:23,589 --> 00:03:23,599 red screen but it's totally think also 157 00:03:23,599 --> 00:03:26,119 red screen but it's totally think also make sure you're being proactive in 158 00:03:26,119 --> 00:03:26,129 make sure you're being proactive in 159 00:03:26,129 --> 00:03:28,180 make sure you're being proactive in maintaining your security the more 160 00:03:28,180 --> 00:03:28,190 maintaining your security the more 161 00:03:28,190 --> 00:03:30,680 maintaining your security the more guests you have two-factor 162 00:03:30,680 --> 00:03:30,690 guests you have two-factor 163 00:03:30,690 --> 00:03:33,440 guests you have two-factor authentication strong passwords you know 164 00:03:33,440 --> 00:03:33,450 authentication strong passwords you know 165 00:03:33,450 --> 00:03:37,130 authentication strong passwords you know is there a special like code that you 166 00:03:37,130 --> 00:03:37,140 is there a special like code that you 167 00:03:37,140 --> 00:03:39,170 is there a special like code that you have with the person your account 168 00:03:39,170 --> 00:03:39,180 have with the person your account 169 00:03:39,180 --> 00:03:40,699 have with the person your account representative like so it's gonna know 170 00:03:40,699 --> 00:03:40,709 representative like so it's gonna know 171 00:03:40,709 --> 00:03:43,369 representative like so it's gonna know your first feature or something like 172 00:03:43,369 --> 00:03:43,379 your first feature or something like 173 00:03:43,379 --> 00:03:46,339 your first feature or something like that finally try to limit the amount of 174 00:03:46,339 --> 00:03:46,349 that finally try to limit the amount of 175 00:03:46,349 --> 00:03:48,920 that finally try to limit the amount of data you put online that includes your 176 00:03:48,920 --> 00:03:48,930 data you put online that includes your 177 00:03:48,930 --> 00:03:51,649 data you put online that includes your vacation photos you know once you get on 178 00:03:51,649 --> 00:03:51,659 vacation photos you know once you get on 179 00:03:51,659 --> 00:03:54,229 vacation photos you know once you get on to a social media platform or a banking 180 00:03:54,229 --> 00:03:54,239 to a social media platform or a banking 181 00:03:54,239 --> 00:03:55,970 to a social media platform or a banking site you're giving up personal 182 00:03:55,970 --> 00:03:55,980 site you're giving up personal 183 00:03:55,980 --> 00:03:58,339 site you're giving up personal information about yourself so the whole 184 00:03:58,339 --> 00:03:58,349 information about yourself so the whole 185 00:03:58,349 --> 00:04:01,039 information about yourself so the whole thing of using cloud and cloud servers 186 00:04:01,039 --> 00:04:01,049 thing of using cloud and cloud servers 187 00:04:01,049 --> 00:04:03,320 thing of using cloud and cloud servers it's like yeah you're giving data to 188 00:04:03,320 --> 00:04:03,330 it's like yeah you're giving data to 189 00:04:03,330 --> 00:04:05,509 it's like yeah you're giving data to that company but you're also giving the 190 00:04:05,509 --> 00:04:05,519 that company but you're also giving the 191 00:04:05,519 --> 00:04:07,880 that company but you're also giving the third party access to the data and even 192 00:04:07,880 --> 00:04:07,890 third party access to the data and even 193 00:04:07,890 --> 00:04:09,649 third party access to the data and even the more information that you give out 194 00:04:09,649 --> 00:04:09,659 the more information that you give out 195 00:04:09,659 --> 00:04:11,869 the more information that you give out on the web like there's these whole 196 00:04:11,869 --> 00:04:11,879 on the web like there's these whole 197 00:04:11,879 --> 00:04:14,449 on the web like there's these whole programs to go search for personal 198 00:04:14,449 --> 00:04:14,459 programs to go search for personal 199 00:04:14,459 --> 00:04:16,069 programs to go search for personal information about you and every social 200 00:04:16,069 --> 00:04:16,079 information about you and every social 201 00:04:16,079 --> 00:04:18,199 information about you and every social media profile ever everything that you 202 00:04:18,199 --> 00:04:18,209 media profile ever everything that you 203 00:04:18,209 --> 00:04:20,629 media profile ever everything that you have publicly they will find it and use 204 00:04:20,629 --> 00:04:20,639 have publicly they will find it and use 205 00:04:20,639 --> 00:04:23,150 have publicly they will find it and use it as like a way to kind of 206 00:04:23,150 --> 00:04:23,160 it as like a way to kind of 207 00:04:23,160 --> 00:04:24,980 it as like a way to kind of get your password our guest your 208 00:04:24,980 --> 00:04:24,990 get your password our guest your 209 00:04:24,990 --> 00:04:28,550 get your password our guest your activities so what if a robber knows 210 00:04:28,550 --> 00:04:28,560 activities so what if a robber knows 211 00:04:28,560 --> 00:04:31,370 activities so what if a robber knows where you live and can figure out when 212 00:04:31,370 --> 00:04:31,380 where you live and can figure out when 213 00:04:31,380 --> 00:04:32,900 where you live and can figure out when you go out on vacation they're going to 214 00:04:32,900 --> 00:04:32,910 you go out on vacation they're going to 215 00:04:32,910 --> 00:04:35,810 you go out on vacation they're going to go back to here and if you do wind up 216 00:04:35,810 --> 00:04:35,820 go back to here and if you do wind up 217 00:04:35,820 --> 00:04:37,280 go back to here and if you do wind up getting hit with some sort of malware 218 00:04:37,280 --> 00:04:37,290 getting hit with some sort of malware 219 00:04:37,290 --> 00:04:40,250 getting hit with some sort of malware don't panic you may still be able to 220 00:04:40,250 --> 00:04:40,260 don't panic you may still be able to 221 00:04:40,260 --> 00:04:41,990 don't panic you may still be able to save your data just completely 222 00:04:41,990 --> 00:04:42,000 save your data just completely 223 00:04:42,000 --> 00:04:44,150 save your data just completely disconnect the box or if you have a 224 00:04:44,150 --> 00:04:44,160 disconnect the box or if you have a 225 00:04:44,160 --> 00:04:46,850 disconnect the box or if you have a picture of the ransom note go to a 226 00:04:46,850 --> 00:04:46,860 picture of the ransom note go to a 227 00:04:46,860 --> 00:04:49,250 picture of the ransom note go to a different computer and look up like what 228 00:04:49,250 --> 00:04:49,260 different computer and look up like what 229 00:04:49,260 --> 00:04:50,780 different computer and look up like what type of ransomware it is because 230 00:04:50,780 --> 00:04:50,790 type of ransomware it is because 231 00:04:50,790 --> 00:04:52,730 type of ransomware it is because eventually you'll find that there could 232 00:04:52,730 --> 00:04:52,740 eventually you'll find that there could 233 00:04:52,740 --> 00:04:54,740 eventually you'll find that there could be a descriptor out there for it and you 234 00:04:54,740 --> 00:04:54,750 be a descriptor out there for it and you 235 00:04:54,750 --> 00:04:56,090 be a descriptor out there for it and you can get all of your information back 236 00:04:56,090 --> 00:04:56,100 can get all of your information back 237 00:04:56,100 --> 00:04:59,780 can get all of your information back without having to pay the ransom