Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
00:00:00,240 --> 00:00:02,950
this simple email will bypass your
00:00:02,950 --> 00:00:02,960
this simple email will bypass your
00:00:02,960 --> 00:00:05,710
this simple email will bypass your
complicated password and your two-factor
00:00:05,710 --> 00:00:05,720
complicated password and your two-factor
00:00:05,720 --> 00:00:07,670
complicated password and your two-factor
authentication no matter how much
00:00:07,670 --> 00:00:07,680
authentication no matter how much
00:00:07,680 --> 00:00:09,950
authentication no matter how much
protection you have hackers can get your
00:00:09,950 --> 00:00:09,960
protection you have hackers can get your
00:00:09,960 --> 00:00:12,150
protection you have hackers can get your
credit card info access your bank
00:00:12,150 --> 00:00:12,160
credit card info access your bank
00:00:12,160 --> 00:00:14,789
credit card info access your bank
account your email and anything else
00:00:14,789 --> 00:00:14,799
account your email and anything else
00:00:14,799 --> 00:00:17,310
account your email and anything else
that you log into and there is nothing
00:00:17,310 --> 00:00:17,320
that you log into and there is nothing
00:00:17,320 --> 00:00:21,550
that you log into and there is nothing
you can do to stop them what is going on
00:00:21,550 --> 00:00:21,560
you can do to stop them what is going on
00:00:21,560 --> 00:00:23,710
you can do to stop them what is going on
this type of attack is called info
00:00:23,710 --> 00:00:23,720
this type of attack is called info
00:00:23,720 --> 00:00:26,550
this type of attack is called info
Stealers and an info stealer as the name
00:00:26,550 --> 00:00:26,560
Stealers and an info stealer as the name
00:00:26,560 --> 00:00:29,790
Stealers and an info stealer as the name
suggests steals information it used to
00:00:29,790 --> 00:00:29,800
suggests steals information it used to
00:00:29,800 --> 00:00:32,350
suggests steals information it used to
be all about stealing your key strokes
00:00:32,350 --> 00:00:32,360
be all about stealing your key strokes
00:00:32,360 --> 00:00:34,830
be all about stealing your key strokes
with a key logger and send all that
00:00:34,830 --> 00:00:34,840
with a key logger and send all that
00:00:34,840 --> 00:00:36,790
with a key logger and send all that
information to the threat actor who
00:00:36,790 --> 00:00:36,800
information to the threat actor who
00:00:36,800 --> 00:00:38,670
information to the threat actor who
would then look for username and
00:00:38,670 --> 00:00:38,680
would then look for username and
00:00:38,680 --> 00:00:41,110
would then look for username and
passwords however with the introduction
00:00:41,110 --> 00:00:41,120
passwords however with the introduction
00:00:41,120 --> 00:00:44,029
passwords however with the introduction
of two Factor authentication this became
00:00:44,029 --> 00:00:44,039
of two Factor authentication this became
00:00:44,039 --> 00:00:46,670
of two Factor authentication this became
kind of useless as they would require
00:00:46,670 --> 00:00:46,680
kind of useless as they would require
00:00:46,680 --> 00:00:50,150
kind of useless as they would require
that second factor to log in so over the
00:00:50,150 --> 00:00:50,160
that second factor to log in so over the
00:00:50,160 --> 00:00:52,670
that second factor to log in so over the
years the info Stealers have evolved
00:00:52,670 --> 00:00:52,680
years the info Stealers have evolved
00:00:52,680 --> 00:00:54,709
years the info Stealers have evolved
into stealing information from your
00:00:54,709 --> 00:00:54,719
into stealing information from your
00:00:54,719 --> 00:00:57,750
into stealing information from your
browser all because of a simple thing
00:00:57,750 --> 00:00:57,760
browser all because of a simple thing
00:00:57,760 --> 00:01:00,950
browser all because of a simple thing
that we all want and we all have
00:01:00,950 --> 00:01:00,960
that we all want and we all have
00:01:00,960 --> 00:01:03,110
that we all want and we all have
convenience imagine having to put in
00:01:03,110 --> 00:01:03,120
convenience imagine having to put in
00:01:03,120 --> 00:01:05,109
convenience imagine having to put in
your username and password and then your
00:01:05,109 --> 00:01:05,119
your username and password and then your
00:01:05,119 --> 00:01:06,270
your username and password and then your
two-factor
00:01:06,270 --> 00:01:06,280
two-factor
00:01:06,280 --> 00:01:08,830
two-factor
authentication every single time you
00:01:08,830 --> 00:01:08,840
authentication every single time you
00:01:08,840 --> 00:01:11,390
authentication every single time you
want to check your email or every single
00:01:11,390 --> 00:01:11,400
want to check your email or every single
00:01:11,400 --> 00:01:12,789
want to check your email or every single
time you want to quickly check your
00:01:12,789 --> 00:01:12,799
time you want to quickly check your
00:01:12,799 --> 00:01:15,070
time you want to quickly check your
calendar or see what's going on on
00:01:15,070 --> 00:01:15,080
calendar or see what's going on on
00:01:15,080 --> 00:01:18,109
calendar or see what's going on on
Facebook or the latest tweets that would
00:01:18,109 --> 00:01:18,119
Facebook or the latest tweets that would
00:01:18,119 --> 00:01:21,069
Facebook or the latest tweets that would
be so irritating so what websites and
00:01:21,069 --> 00:01:21,079
be so irritating so what websites and
00:01:21,079 --> 00:01:24,270
be so irritating so what websites and
online services do is remember you you
00:01:24,270 --> 00:01:24,280
online services do is remember you you
00:01:24,280 --> 00:01:26,789
online services do is remember you you
log in once successfully therefore the
00:01:26,789 --> 00:01:26,799
log in once successfully therefore the
00:01:26,799 --> 00:01:28,830
log in once successfully therefore the
next time you visit that site from the
00:01:28,830 --> 00:01:28,840
next time you visit that site from the
00:01:28,840 --> 00:01:31,789
next time you visit that site from the
same computer and the same browser it
00:01:31,789 --> 00:01:31,799
same computer and the same browser it
00:01:31,799 --> 00:01:33,630
same computer and the same browser it
knows that it's you and you don't have
00:01:33,630 --> 00:01:33,640
knows that it's you and you don't have
00:01:33,640 --> 00:01:35,990
knows that it's you and you don't have
to keep putting in your credential it
00:01:35,990 --> 00:01:36,000
to keep putting in your credential it
00:01:36,000 --> 00:01:38,230
to keep putting in your credential it
does this with a combination of cookies
00:01:38,230 --> 00:01:38,240
does this with a combination of cookies
00:01:38,240 --> 00:01:40,789
does this with a combination of cookies
and authentication tokens now without
00:01:40,789 --> 00:01:40,799
and authentication tokens now without
00:01:40,799 --> 00:01:42,510
and authentication tokens now without
getting into the technical details of
00:01:42,510 --> 00:01:42,520
getting into the technical details of
00:01:42,520 --> 00:01:44,870
getting into the technical details of
each and when one is used over the other
00:01:44,870 --> 00:01:44,880
each and when one is used over the other
00:01:44,880 --> 00:01:47,310
each and when one is used over the other
essentially it's a file that is stored
00:01:47,310 --> 00:01:47,320
essentially it's a file that is stored
00:01:47,320 --> 00:01:49,789
essentially it's a file that is stored
on your computer and confirms that you
00:01:49,789 --> 00:01:49,799
on your computer and confirms that you
00:01:49,799 --> 00:01:52,469
on your computer and confirms that you
have access to that website nice and
00:01:52,469 --> 00:01:52,479
have access to that website nice and
00:01:52,479 --> 00:01:55,350
have access to that website nice and
convenient for us but with this
00:01:55,350 --> 00:01:55,360
convenient for us but with this
00:01:55,360 --> 00:01:57,310
convenient for us but with this
understanding what would happen if I
00:01:57,310 --> 00:01:57,320
understanding what would happen if I
00:01:57,320 --> 00:01:59,990
understanding what would happen if I
could grab this file from your computer
00:01:59,990 --> 00:02:00,000
could grab this file from your computer
00:02:00,000 --> 00:02:02,149
could grab this file from your computer
and put it on mine I would access the
00:02:02,149 --> 00:02:02,159
and put it on mine I would access the
00:02:02,159 --> 00:02:04,469
and put it on mine I would access the
same websites the website would look for
00:02:04,469 --> 00:02:04,479
same websites the website would look for
00:02:04,479 --> 00:02:06,670
same websites the website would look for
that file it will see that it has all
00:02:06,670 --> 00:02:06,680
that file it will see that it has all
00:02:06,680 --> 00:02:08,990
that file it will see that it has all
the right information that matches its
00:02:08,990 --> 00:02:09,000
the right information that matches its
00:02:09,000 --> 00:02:11,470
the right information that matches its
internal system and therefore it will
00:02:11,470 --> 00:02:11,480
internal system and therefore it will
00:02:11,480 --> 00:02:14,630
internal system and therefore it will
grant me access into your account as far
00:02:14,630 --> 00:02:14,640
grant me access into your account as far
00:02:14,640 --> 00:02:18,030
grant me access into your account as far
as the website is concerned I am you so
00:02:18,030 --> 00:02:18,040
as the website is concerned I am you so
00:02:18,040 --> 00:02:20,350
as the website is concerned I am you so
let's get back to that email it comes
00:02:20,350 --> 00:02:20,360
let's get back to that email it comes
00:02:20,360 --> 00:02:22,270
let's get back to that email it comes
from somebody that you typically would
00:02:22,270 --> 00:02:22,280
from somebody that you typically would
00:02:22,280 --> 00:02:25,270
from somebody that you typically would
know that just contains an attachment in
00:02:25,270 --> 00:02:25,280
know that just contains an attachment in
00:02:25,280 --> 00:02:27,830
know that just contains an attachment in
this case it's a video file but the
00:02:27,830 --> 00:02:27,840
this case it's a video file but the
00:02:27,840 --> 00:02:29,910
this case it's a video file but the
attachment could be anything it could be
00:02:29,910 --> 00:02:29,920
attachment could be anything it could be
00:02:29,920 --> 00:02:33,589
attachment could be anything it could be
a PDF an image a word doc but of course
00:02:33,589 --> 00:02:33,599
a PDF an image a word doc but of course
00:02:33,599 --> 00:02:36,430
a PDF an image a word doc but of course
it's none of those actual files what the
00:02:36,430 --> 00:02:36,440
it's none of those actual files what the
00:02:36,440 --> 00:02:38,910
it's none of those actual files what the
threat actors do is create a file that
00:02:38,910 --> 00:02:38,920
threat actors do is create a file that
00:02:38,920 --> 00:02:41,509
threat actors do is create a file that
looks like that video file PDF or any
00:02:41,509 --> 00:02:41,519
looks like that video file PDF or any
00:02:41,519 --> 00:02:44,229
looks like that video file PDF or any
type of file that file even has the
00:02:44,229 --> 00:02:44,239
type of file that file even has the
00:02:44,239 --> 00:02:47,710
type of file that file even has the
right icon for that type of file now
00:02:47,710 --> 00:02:47,720
right icon for that type of file now
00:02:47,720 --> 00:02:50,589
right icon for that type of file now
when you open that attachment even if
00:02:50,589 --> 00:02:50,599
when you open that attachment even if
00:02:50,599 --> 00:02:52,710
when you open that attachment even if
you open it in preview mode the
00:02:52,710 --> 00:02:52,720
you open it in preview mode the
00:02:52,720 --> 00:02:56,309
you open it in preview mode the
malicious code inside that file runs the
00:02:56,309 --> 00:02:56,319
malicious code inside that file runs the
00:02:56,319 --> 00:02:58,309
malicious code inside that file runs the
smart things that these threat actors do
00:02:58,309 --> 00:02:58,319
smart things that these threat actors do
00:02:58,319 --> 00:03:00,270
smart things that these threat actors do
is they make it look like
00:03:00,270 --> 00:03:00,280
is they make it look like
00:03:00,280 --> 00:03:02,470
is they make it look like
nothing happened you may even get a
00:03:02,470 --> 00:03:02,480
nothing happened you may even get a
00:03:02,480 --> 00:03:04,270
nothing happened you may even get a
message on your screen saying something
00:03:04,270 --> 00:03:04,280
message on your screen saying something
00:03:04,280 --> 00:03:06,509
message on your screen saying something
like the file is corrupt and cannot be
00:03:06,509 --> 00:03:06,519
like the file is corrupt and cannot be
00:03:06,519 --> 00:03:09,670
like the file is corrupt and cannot be
run so you just move on with your day
00:03:09,670 --> 00:03:09,680
run so you just move on with your day
00:03:09,680 --> 00:03:12,229
run so you just move on with your day
what you don't realize is that all your
00:03:12,229 --> 00:03:12,239
what you don't realize is that all your
00:03:12,239 --> 00:03:14,270
what you don't realize is that all your
tokens and cookies and all that
00:03:14,270 --> 00:03:14,280
tokens and cookies and all that
00:03:14,280 --> 00:03:16,550
tokens and cookies and all that
information from your browser has just
00:03:16,550 --> 00:03:16,560
information from your browser has just
00:03:16,560 --> 00:03:19,390
information from your browser has just
been stolen and sent to that threat
00:03:19,390 --> 00:03:19,400
been stolen and sent to that threat
00:03:19,400 --> 00:03:22,190
been stolen and sent to that threat
actor for all intents and purposes you
00:03:22,190 --> 00:03:22,200
actor for all intents and purposes you
00:03:22,200 --> 00:03:25,110
actor for all intents and purposes you
are hacked you just don't know it now
00:03:25,110 --> 00:03:25,120
are hacked you just don't know it now
00:03:25,120 --> 00:03:27,390
are hacked you just don't know it now
that they have your info they can load
00:03:27,390 --> 00:03:27,400
that they have your info they can load
00:03:27,400 --> 00:03:29,429
that they have your info they can load
those files on their computer and are
00:03:29,429 --> 00:03:29,439
those files on their computer and are
00:03:29,439 --> 00:03:32,070
those files on their computer and are
able to bypass your complicated password
00:03:32,070 --> 00:03:32,080
able to bypass your complicated password
00:03:32,080 --> 00:03:34,429
able to bypass your complicated password
and your two-factor authentication what
00:03:34,429 --> 00:03:34,439
and your two-factor authentication what
00:03:34,439 --> 00:03:36,869
and your two-factor authentication what
they do next is really anything that
00:03:36,869 --> 00:03:36,879
they do next is really anything that
00:03:36,879 --> 00:03:39,550
they do next is really anything that
they want sometimes they run scams on
00:03:39,550 --> 00:03:39,560
they want sometimes they run scams on
00:03:39,560 --> 00:03:41,750
they want sometimes they run scams on
your social media other times they log
00:03:41,750 --> 00:03:41,760
your social media other times they log
00:03:41,760 --> 00:03:44,110
your social media other times they log
into your bank or your PayPal and try to
00:03:44,110 --> 00:03:44,120
into your bank or your PayPal and try to
00:03:44,120 --> 00:03:46,550
into your bank or your PayPal and try to
transfer money they can even take out
00:03:46,550 --> 00:03:46,560
transfer money they can even take out
00:03:46,560 --> 00:03:49,149
transfer money they can even take out
loans in your name run identity theft
00:03:49,149 --> 00:03:49,159
loans in your name run identity theft
00:03:49,159 --> 00:03:52,350
loans in your name run identity theft
scams and basically ruin your digital
00:03:52,350 --> 00:03:52,360
scams and basically ruin your digital
00:03:52,360 --> 00:03:56,069
scams and basically ruin your digital
life this is serious now John Hammond
00:03:56,069 --> 00:03:56,079
life this is serious now John Hammond
00:03:56,079 --> 00:03:58,149
life this is serious now John Hammond
who is a security researcher actually
00:03:58,149 --> 00:03:58,159
who is a security researcher actually
00:03:58,159 --> 00:04:00,390
who is a security researcher actually
shows how the code works if you want to
00:04:00,390 --> 00:04:00,400
shows how the code works if you want to
00:04:00,400 --> 00:04:02,149
shows how the code works if you want to
check it out I'll have a link in the
00:04:02,149 --> 00:04:02,159
check it out I'll have a link in the
00:04:02,159 --> 00:04:04,630
check it out I'll have a link in the
description below now it looks super
00:04:04,630 --> 00:04:04,640
description below now it looks super
00:04:04,640 --> 00:04:06,470
description below now it looks super
complicated so you would think that in
00:04:06,470 --> 00:04:06,480
complicated so you would think that in
00:04:06,480 --> 00:04:08,670
complicated so you would think that in
order to pull this off hackers will need
00:04:08,670 --> 00:04:08,680
order to pull this off hackers will need
00:04:08,680 --> 00:04:12,270
order to pull this off hackers will need
to be some genius coders but that is not
00:04:12,270 --> 00:04:12,280
to be some genius coders but that is not
00:04:12,280 --> 00:04:15,110
to be some genius coders but that is not
the case just like you can pay a monthly
00:04:15,110 --> 00:04:15,120
the case just like you can pay a monthly
00:04:15,120 --> 00:04:18,430
the case just like you can pay a monthly
fee for Netflix there are maway services
00:04:18,430 --> 00:04:18,440
fee for Netflix there are maway services
00:04:18,440 --> 00:04:20,830
fee for Netflix there are maway services
on the dark web well for a couple of
00:04:20,830 --> 00:04:20,840
on the dark web well for a couple of
00:04:20,840 --> 00:04:23,830
on the dark web well for a couple of
hundred bucks you can get your own maway
00:04:23,830 --> 00:04:23,840
hundred bucks you can get your own maway
00:04:23,840 --> 00:04:26,469
hundred bucks you can get your own maway
ready to go this is one of the reasons
00:04:26,469 --> 00:04:26,479
ready to go this is one of the reasons
00:04:26,479 --> 00:04:29,710
ready to go this is one of the reasons
why we seeing this threat on the rise as
00:04:29,710 --> 00:04:29,720
why we seeing this threat on the rise as
00:04:29,720 --> 00:04:32,510
why we seeing this threat on the rise as
info Steelers can literally be done by
00:04:32,510 --> 00:04:32,520
info Steelers can literally be done by
00:04:32,520 --> 00:04:35,550
info Steelers can literally be done by
anyone in a couple of minutes and in an
00:04:35,550 --> 00:04:35,560
anyone in a couple of minutes and in an
00:04:35,560 --> 00:04:38,670
anyone in a couple of minutes and in an
instant you lose access to your entire
00:04:38,670 --> 00:04:38,680
instant you lose access to your entire
00:04:38,680 --> 00:04:41,430
instant you lose access to your entire
Digital Life so what can you do to
00:04:41,430 --> 00:04:41,440
Digital Life so what can you do to
00:04:41,440 --> 00:04:44,150
Digital Life so what can you do to
protect yourself well firstly you should
00:04:44,150 --> 00:04:44,160
protect yourself well firstly you should
00:04:44,160 --> 00:04:46,710
protect yourself well firstly you should
log out of important websites like your
00:04:46,710 --> 00:04:46,720
log out of important websites like your
00:04:46,720 --> 00:04:49,350
log out of important websites like your
Google your banking website or anything
00:04:49,350 --> 00:04:49,360
Google your banking website or anything
00:04:49,360 --> 00:04:51,550
Google your banking website or anything
else that you deem important then just
00:04:51,550 --> 00:04:51,560
else that you deem important then just
00:04:51,560 --> 00:04:54,029
else that you deem important then just
log back in when you do that it
00:04:54,029 --> 00:04:54,039
log back in when you do that it
00:04:54,039 --> 00:04:56,710
log back in when you do that it
invalidates any previous tokens which
00:04:56,710 --> 00:04:56,720
invalidates any previous tokens which
00:04:56,720 --> 00:04:59,629
invalidates any previous tokens which
means that if anybody has those tokens
00:04:59,629 --> 00:04:59,639
means that if anybody has those tokens
00:04:59,639 --> 00:05:02,390
means that if anybody has those tokens
they just became useless get into the
00:05:02,390 --> 00:05:02,400
they just became useless get into the
00:05:02,400 --> 00:05:04,150
they just became useless get into the
habit of logging out of important
00:05:04,150 --> 00:05:04,160
habit of logging out of important
00:05:04,160 --> 00:05:07,390
habit of logging out of important
websites once a month ideally more often
00:05:07,390 --> 00:05:07,400
websites once a month ideally more often
00:05:07,400 --> 00:05:10,310
websites once a month ideally more often
yes it's a pain but definitely worth it
00:05:10,310 --> 00:05:10,320
yes it's a pain but definitely worth it
00:05:10,320 --> 00:05:13,310
yes it's a pain but definitely worth it
to up your security level next if you
00:05:13,310 --> 00:05:13,320
to up your security level next if you
00:05:13,320 --> 00:05:16,350
to up your security level next if you
typically get attachment in emails I
00:05:16,350 --> 00:05:16,360
typically get attachment in emails I
00:05:16,360 --> 00:05:18,629
typically get attachment in emails I
highly recommend getting into the habit
00:05:18,629 --> 00:05:18,639
highly recommend getting into the habit
00:05:18,639 --> 00:05:20,870
highly recommend getting into the habit
of asking the sender not to send the
00:05:20,870 --> 00:05:20,880
of asking the sender not to send the
00:05:20,880 --> 00:05:23,350
of asking the sender not to send the
actual file as an attachment but to
00:05:23,350 --> 00:05:23,360
actual file as an attachment but to
00:05:23,360 --> 00:05:26,110
actual file as an attachment but to
rather put that file into something like
00:05:26,110 --> 00:05:26,120
rather put that file into something like
00:05:26,120 --> 00:05:29,070
rather put that file into something like
Google drive or Dropbox and then share
00:05:29,070 --> 00:05:29,080
Google drive or Dropbox and then share
00:05:29,080 --> 00:05:31,350
Google drive or Dropbox and then share
the link this is because Google or
00:05:31,350 --> 00:05:31,360
the link this is because Google or
00:05:31,360 --> 00:05:33,870
the link this is because Google or
Dropbox or those cloud storage services
00:05:33,870 --> 00:05:33,880
Dropbox or those cloud storage services
00:05:33,880 --> 00:05:36,870
Dropbox or those cloud storage services
are simply not going to host malware so
00:05:36,870 --> 00:05:36,880
are simply not going to host malware so
00:05:36,880 --> 00:05:39,230
are simply not going to host malware so
if it's legit you will get a link and
00:05:39,230 --> 00:05:39,240
if it's legit you will get a link and
00:05:39,240 --> 00:05:40,670
if it's legit you will get a link and
then you know that it's already been
00:05:40,670 --> 00:05:40,680
then you know that it's already been
00:05:40,680 --> 00:05:43,110
then you know that it's already been
scanned by Google and your antivirus
00:05:43,110 --> 00:05:43,120
scanned by Google and your antivirus
00:05:43,120 --> 00:05:45,670
scanned by Google and your antivirus
will then do another scanned again now
00:05:45,670 --> 00:05:45,680
will then do another scanned again now
00:05:45,680 --> 00:05:48,309
will then do another scanned again now
next if you get a random email from
00:05:48,309 --> 00:05:48,319
next if you get a random email from
00:05:48,319 --> 00:05:50,309
next if you get a random email from
people you don't know and are not
00:05:50,309 --> 00:05:50,319
people you don't know and are not
00:05:50,319 --> 00:05:52,110
people you don't know and are not
expecting and that email contains an
00:05:52,110 --> 00:05:52,120
expecting and that email contains an
00:05:52,120 --> 00:05:55,670
expecting and that email contains an
attachment just delete it do not try to
00:05:55,670 --> 00:05:55,680
attachment just delete it do not try to
00:05:55,680 --> 00:05:58,550
attachment just delete it do not try to
even open it in preview mode that will
00:05:58,550 --> 00:05:58,560
even open it in preview mode that will
00:05:58,560 --> 00:06:00,909
even open it in preview mode that will
execute the code and no matter how
00:06:00,909 --> 00:06:00,919
execute the code and no matter how
00:06:00,919 --> 00:06:03,350
execute the code and no matter how
tempting it is to open an email within
00:06:03,350 --> 00:06:03,360
tempting it is to open an email within
00:06:03,360 --> 00:06:07,070
tempting it is to open an email within
only fans photos or confidential salary
00:06:07,070 --> 00:06:07,080
only fans photos or confidential salary
00:06:07,080 --> 00:06:11,629
only fans photos or confidential salary
list attachment do not fall for it and
00:06:11,629 --> 00:06:11,639
list attachment do not fall for it and
00:06:11,639 --> 00:06:14,510
list attachment do not fall for it and
never ever ever open a zip file that is
00:06:14,510 --> 00:06:14,520
never ever ever open a zip file that is
00:06:14,520 --> 00:06:17,550
never ever ever open a zip file that is
password protected this is a Surefire
00:06:17,550 --> 00:06:17,560
password protected this is a Surefire
00:06:17,560 --> 00:06:20,390
password protected this is a Surefire
way to get infected antivirus doesn't
00:06:20,390 --> 00:06:20,400
way to get infected antivirus doesn't
00:06:20,400 --> 00:06:22,710
way to get infected antivirus doesn't
scan those protected files and this is
00:06:22,710 --> 00:06:22,720
scan those protected files and this is
00:06:22,720 --> 00:06:25,309
scan those protected files and this is
where malware is easily hidden you
00:06:25,309 --> 00:06:25,319
where malware is easily hidden you
00:06:25,319 --> 00:06:27,790
where malware is easily hidden you
should also enable safe browsing if
00:06:27,790 --> 00:06:27,800
should also enable safe browsing if
00:06:27,800 --> 00:06:30,430
should also enable safe browsing if
you're using Chrome go to your Google
00:06:30,430 --> 00:06:30,440
you're using Chrome go to your Google
00:06:30,440 --> 00:06:33,469
you're using Chrome go to your Google
accounts select on security then click
00:06:33,469 --> 00:06:33,479
accounts select on security then click
00:06:33,479 --> 00:06:36,029
accounts select on security then click
on enhance safe browsing for your
00:06:36,029 --> 00:06:36,039
on enhance safe browsing for your
00:06:36,039 --> 00:06:40,230
on enhance safe browsing for your
account and switch that on if any email
00:06:40,230 --> 00:06:40,240
account and switch that on if any email
00:06:40,240 --> 00:06:43,510
account and switch that on if any email
or website says anything like this is a
00:06:43,510 --> 00:06:43,520
or website says anything like this is a
00:06:43,520 --> 00:06:45,510
or website says anything like this is a
new version of the file so your anti
00:06:45,510 --> 00:06:45,520
new version of the file so your anti
00:06:45,520 --> 00:06:47,589
new version of the file so your anti
virus doesn't know about it yet just
00:06:47,589 --> 00:06:47,599
virus doesn't know about it yet just
00:06:47,599 --> 00:06:49,950
virus doesn't know about it yet just
disable it whilst you install the file
00:06:49,950 --> 00:06:49,960
disable it whilst you install the file
00:06:49,960 --> 00:06:52,790
disable it whilst you install the file
if you ever see anything like that never
00:06:52,790 --> 00:06:52,800
if you ever see anything like that never
00:06:52,800 --> 00:06:55,550
if you ever see anything like that never
ever do that the antivirus doesn't need
00:06:55,550 --> 00:06:55,560
ever do that the antivirus doesn't need
00:06:55,560 --> 00:06:58,230
ever do that the antivirus doesn't need
to know about every new version of every
00:06:58,230 --> 00:06:58,240
to know about every new version of every
00:06:58,240 --> 00:07:00,189
to know about every new version of every
file it will look at the file content
00:07:00,189 --> 00:07:00,199
file it will look at the file content
00:07:00,199 --> 00:07:03,029
file it will look at the file content
itself and find out if it is malicious
00:07:03,029 --> 00:07:03,039
itself and find out if it is malicious
00:07:03,039 --> 00:07:05,670
itself and find out if it is malicious
or not malicious this message is
00:07:05,670 --> 00:07:05,680
or not malicious this message is
00:07:05,680 --> 00:07:08,029
or not malicious this message is
nonsense I cannot tell you how many
00:07:08,029 --> 00:07:08,039
nonsense I cannot tell you how many
00:07:08,039 --> 00:07:09,550
nonsense I cannot tell you how many
people will click on a link that they
00:07:09,550 --> 00:07:09,560
people will click on a link that they
00:07:09,560 --> 00:07:11,990
people will click on a link that they
found on Google for the latest update to
00:07:11,990 --> 00:07:12,000
found on Google for the latest update to
00:07:12,000 --> 00:07:15,150
found on Google for the latest update to
a game or the latest Zoom version or
00:07:15,150 --> 00:07:15,160
a game or the latest Zoom version or
00:07:15,160 --> 00:07:17,950
a game or the latest Zoom version or
that pirated software and will disable
00:07:17,950 --> 00:07:17,960
that pirated software and will disable
00:07:17,960 --> 00:07:21,070
that pirated software and will disable
their antivirus just to get that latest
00:07:21,070 --> 00:07:21,080
their antivirus just to get that latest
00:07:21,080 --> 00:07:24,430
their antivirus just to get that latest
update don't do that and to be clear
00:07:24,430 --> 00:07:24,440
update don't do that and to be clear
00:07:24,440 --> 00:07:26,309
update don't do that and to be clear
complicated passwords along with two
00:07:26,309 --> 00:07:26,319
complicated passwords along with two
00:07:26,319 --> 00:07:29,670
complicated passwords along with two
Factor authentication are a must I am
00:07:29,670 --> 00:07:29,680
Factor authentication are a must I am
00:07:29,680 --> 00:07:31,550
Factor authentication are a must I am
not saying that we shouldn't have them
00:07:31,550 --> 00:07:31,560
not saying that we shouldn't have them
00:07:31,560 --> 00:07:33,749
not saying that we shouldn't have them
what I am saying is that we must not be
00:07:33,749 --> 00:07:33,759
what I am saying is that we must not be
00:07:33,759 --> 00:07:36,589
what I am saying is that we must not be
manipulated into clicking on attachment
00:07:36,589 --> 00:07:36,599
manipulated into clicking on attachment
00:07:36,599 --> 00:07:39,790
manipulated into clicking on attachment
and certainly never disable our security
00:07:39,790 --> 00:07:39,800
and certainly never disable our security
00:07:39,800 --> 00:07:42,670
and certainly never disable our security
features this is why so many companies
00:07:42,670 --> 00:07:42,680
features this is why so many companies
00:07:42,680 --> 00:07:45,230
features this is why so many companies
are rolling out pass Keys which is meant
00:07:45,230 --> 00:07:45,240
are rolling out pass Keys which is meant
00:07:45,240 --> 00:07:47,749
are rolling out pass Keys which is meant
to replace passwords and you can see all
00:07:47,749 --> 00:07:47,759
to replace passwords and you can see all
00:07:47,759 --> 00:07:50,830
to replace passwords and you can see all
about them in this video right over here
00:07:50,830 --> 00:07:50,840
about them in this video right over here
00:07:50,840 --> 00:07:52,749
about them in this video right over here
now before you head out don't forget to
00:07:52,749 --> 00:07:52,759
now before you head out don't forget to
00:07:52,759 --> 00:07:54,749
now before you head out don't forget to
hit that subscribe button give the video
00:07:54,749 --> 00:07:54,759
hit that subscribe button give the video
00:07:54,759 --> 00:07:58,790
hit that subscribe button give the video
a thumbs up I will see you in this video
00:07:58,790 --> 00:07:58,800
a thumbs up I will see you in this video
00:07:58,800 --> 00:08:02,240
a thumbs up I will see you in this video
Let's Go oh
34377
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.