Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:01,020 --> 00:00:07,260
Final counter-measure will be about monitoring network traffic.
2
00:00:07,260 --> 00:00:10,890
Now this is very hard to prevent.
3
00:00:10,890 --> 00:00:11,670
Why.
4
00:00:11,970 --> 00:00:18,060
Because when someone is using application like display it or network monitor or this kind of application
5
00:00:18,610 --> 00:00:22,890
he's not targeting your mobile phone or your tablet or your Android device.
6
00:00:22,890 --> 00:00:29,340
He's targeting the traffic so you may have all kinds of protection on your device.
7
00:00:29,430 --> 00:00:35,080
But still he will be able to manipulate the traffic and intercept the traffic.
8
00:00:35,350 --> 00:00:43,900
So this specific attack cannot be prevented by installing antivirus from your computer or any kind of
9
00:00:43,900 --> 00:00:44,600
protection.
10
00:00:44,890 --> 00:00:53,230
But there is some best practice that you can follow and it will actually secure your traffic and it
11
00:00:53,230 --> 00:00:55,810
will secure your device as well.
12
00:00:55,840 --> 00:01:04,480
The main and most important point is that I need to clarify which is the public wife right now and I'm
13
00:01:04,480 --> 00:01:10,740
talking about Puplick wife I do not just mean free Wi-Fi but any public Wi-Fi.
14
00:01:11,080 --> 00:01:15,880
So you are sitting in a restaurant and they have a wife and they have a passport and they will give
15
00:01:15,880 --> 00:01:17,240
you a pass.
16
00:01:17,260 --> 00:01:21,880
Any other user connected to the same access point he can.
17
00:01:21,880 --> 00:01:25,960
He will be able to do this attack using this kind of application.
18
00:01:25,980 --> 00:01:31,450
Yes play it or network monitoring or any kind of sniffing tools.
19
00:01:31,750 --> 00:01:35,860
So maybe you have someone sitting on the same place connected to the same network because after all
20
00:01:35,910 --> 00:01:37,450
yes it has a password.
21
00:01:37,780 --> 00:01:43,320
But any customer of any customer in this place has the right to have the password.
22
00:01:43,690 --> 00:01:48,550
And if you connect to the same network you will be able to sniff for the network and capture people
23
00:01:48,550 --> 00:01:52,340
password and manipulate them.
24
00:01:52,420 --> 00:01:58,010
Free Wi-Fi is even worse because you know it's not.
25
00:01:58,150 --> 00:01:59,260
No password is needed.
26
00:01:59,260 --> 00:02:07,120
You may be near of an airport or near a restaurant that has a free Wi-Fi and you can connect from your
27
00:02:07,120 --> 00:02:09,790
car and start sniffing people traffic.
28
00:02:09,790 --> 00:02:17,530
So what I'm saying here is that the main protection or the main countermeasure related to network traffic
29
00:02:17,560 --> 00:02:21,570
it's to prevent using the public Wi-Fi.
30
00:02:21,640 --> 00:02:28,500
So if you have to do something use you from your by or do not connect to public Wi-Fi.
31
00:02:28,720 --> 00:02:34,690
Even if it has a password because they don't have a control on the password any customer to this public
32
00:02:34,690 --> 00:02:38,720
place could be a coffee shop or restaurant has a right to get a pass.
33
00:02:38,860 --> 00:02:47,740
And it's just a small application to be installed on your mobile and I believe you saw that small application
34
00:02:47,740 --> 00:02:48,180
free.
35
00:02:48,190 --> 00:02:51,650
You install it and then you'll be able to capture all people traffic.
36
00:02:51,970 --> 00:02:57,550
So be aware of source public life and in general
37
00:03:00,430 --> 00:03:06,970
Android platform became more and more popular right now and people keep moving from computer to smartphone
38
00:03:07,000 --> 00:03:14,840
and tablet and so on and whatever that attack we explain during this lecture a few months and then we're
39
00:03:14,840 --> 00:03:16,860
going to see as part of that and so on.
40
00:03:17,230 --> 00:03:24,400
So my final recommendation for you is to follow up what is new because every day there is something
41
00:03:24,760 --> 00:03:28,970
related to a new threat or a new risk or a new vulnerability.
42
00:03:29,320 --> 00:03:37,470
And you can do that simply I don't you to be an expert in this area but if you go to websites like explorative
43
00:03:37,600 --> 00:03:44,890
which we use Huling discourse and search for Android you'll see what's new or if you go to security
44
00:03:44,890 --> 00:03:45,950
folks that can.
45
00:03:46,180 --> 00:03:52,660
But this is maybe more technical but there is a website that suggests that you're registered Sifry Web
46
00:03:52,660 --> 00:03:53,190
site.
47
00:03:53,200 --> 00:03:59,170
It's called security news and you can create a free account is a good thing about that is that whenever
48
00:03:59,170 --> 00:04:06,790
something shows up an Android tablet you or Apple was vulnerable to announcing it will send you a notification
49
00:04:06,790 --> 00:04:09,160
so you'll be aware of what is new.
50
00:04:09,190 --> 00:04:18,730
Recently there was a vulnerability talking about a vulnerability that is talking about a message coming
51
00:04:18,730 --> 00:04:19,290
to Android.
52
00:04:19,300 --> 00:04:26,340
Someone can send you a malicious message and you don't even have to open it just by receiving the message.
53
00:04:26,560 --> 00:04:29,430
You will get compromised.
54
00:04:29,560 --> 00:04:34,390
I'm working on a lecture related to that but I'm showing you that you know everything there is something
55
00:04:34,390 --> 00:04:34,850
new.
56
00:04:35,050 --> 00:04:43,270
So my final suggestion or my final recommendation is to be updated registered on such Web site information
57
00:04:43,270 --> 00:04:48,360
security security news or security weak or security focus.
58
00:04:48,370 --> 00:04:55,910
They have a newsletter service for free and you get to know what is new in Android vulnerability and
59
00:04:55,910 --> 00:04:56,770
Android which is.
6246
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.