Wana Decrypt0r (Wanacry Ransomware) - Computerphile
$300 or your files are toast: Dr Pound takes a look at the latest ransomware to be doing the rounds.
How Wana Decrypt0r encrypts files:
https://youtu.be/pLluFxHrc30
Microsoft Blog: http://bit.ly/Computerphile-Wana_MS
Professor Ross Anderson's blog: http://bit.ly/Computerphile-Wana_Ross
MalwareTech's blog: http://bit.ly/Computerphile-Wana_Mal
End to End Encryption: https://youtu.be/jkV1KEJGKRA
Internet of Things Problems: https://youtu.be/PLiE0Nr8VOE
http://www.facebook.com/computerphile
https://twitter.com/computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: http://bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. More at http://www.bradyharan.com
Видео Wana Decrypt0r (Wanacry Ransomware) - Computerphile канала Computerphile
How Wana Decrypt0r encrypts files:
https://youtu.be/pLluFxHrc30
Microsoft Blog: http://bit.ly/Computerphile-Wana_MS
Professor Ross Anderson's blog: http://bit.ly/Computerphile-Wana_Ross
MalwareTech's blog: http://bit.ly/Computerphile-Wana_Mal
End to End Encryption: https://youtu.be/jkV1KEJGKRA
Internet of Things Problems: https://youtu.be/PLiE0Nr8VOE
http://www.facebook.com/computerphile
https://twitter.com/computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: http://bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. More at http://www.bradyharan.com
Видео Wana Decrypt0r (Wanacry Ransomware) - Computerphile канала Computerphile
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
How WanaCrypt Encrypts Your Files - ComputerphileBuffer Overflow Attack - ComputerphileBut how does bitcoin actually work?Reversing WannaCry Part 1 - Finding the killswitch and unpacking the malware in #GhidraEarth's Deadliest [Computer] VirusThe Attack That Could Disrupt The Whole Internet - Computerphilehacker:HUNTER - Wannacry: The Marcus Hutchins Story - All 3 ChaptersSecrets Hidden in Images (Steganography) - ComputerphileElliptic Curve Back Door - ComputerphileHow is Money Created? – Everything You Need to KnowCrypto-jacking - ComputerphileEnd to End Encryption (E2EE) - ComputerphileHow to Choose a Password - ComputerphileSlow Loris Attack - ComputerphilePassword Cracking - Computerphile2FA: Two Factor Authentication - ComputerphileTransport Layer Security (TLS) - ComputerphileTOR Hidden Services - ComputerphileHow NOT to Store Passwords! - ComputerphileGOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs