All language subtitles for DO NOT open this email!

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranรฎ)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 00:00:00,240 --> 00:00:02,950 this simple email will bypass your 00:00:02,950 --> 00:00:02,960 this simple email will bypass your 00:00:02,960 --> 00:00:05,710 this simple email will bypass your complicated password and your two-factor 00:00:05,710 --> 00:00:05,720 complicated password and your two-factor 00:00:05,720 --> 00:00:07,670 complicated password and your two-factor authentication no matter how much 00:00:07,670 --> 00:00:07,680 authentication no matter how much 00:00:07,680 --> 00:00:09,950 authentication no matter how much protection you have hackers can get your 00:00:09,950 --> 00:00:09,960 protection you have hackers can get your 00:00:09,960 --> 00:00:12,150 protection you have hackers can get your credit card info access your bank 00:00:12,150 --> 00:00:12,160 credit card info access your bank 00:00:12,160 --> 00:00:14,789 credit card info access your bank account your email and anything else 00:00:14,789 --> 00:00:14,799 account your email and anything else 00:00:14,799 --> 00:00:17,310 account your email and anything else that you log into and there is nothing 00:00:17,310 --> 00:00:17,320 that you log into and there is nothing 00:00:17,320 --> 00:00:21,550 that you log into and there is nothing you can do to stop them what is going on 00:00:21,550 --> 00:00:21,560 you can do to stop them what is going on 00:00:21,560 --> 00:00:23,710 you can do to stop them what is going on this type of attack is called info 00:00:23,710 --> 00:00:23,720 this type of attack is called info 00:00:23,720 --> 00:00:26,550 this type of attack is called info Stealers and an info stealer as the name 00:00:26,550 --> 00:00:26,560 Stealers and an info stealer as the name 00:00:26,560 --> 00:00:29,790 Stealers and an info stealer as the name suggests steals information it used to 00:00:29,790 --> 00:00:29,800 suggests steals information it used to 00:00:29,800 --> 00:00:32,350 suggests steals information it used to be all about stealing your key strokes 00:00:32,350 --> 00:00:32,360 be all about stealing your key strokes 00:00:32,360 --> 00:00:34,830 be all about stealing your key strokes with a key logger and send all that 00:00:34,830 --> 00:00:34,840 with a key logger and send all that 00:00:34,840 --> 00:00:36,790 with a key logger and send all that information to the threat actor who 00:00:36,790 --> 00:00:36,800 information to the threat actor who 00:00:36,800 --> 00:00:38,670 information to the threat actor who would then look for username and 00:00:38,670 --> 00:00:38,680 would then look for username and 00:00:38,680 --> 00:00:41,110 would then look for username and passwords however with the introduction 00:00:41,110 --> 00:00:41,120 passwords however with the introduction 00:00:41,120 --> 00:00:44,029 passwords however with the introduction of two Factor authentication this became 00:00:44,029 --> 00:00:44,039 of two Factor authentication this became 00:00:44,039 --> 00:00:46,670 of two Factor authentication this became kind of useless as they would require 00:00:46,670 --> 00:00:46,680 kind of useless as they would require 00:00:46,680 --> 00:00:50,150 kind of useless as they would require that second factor to log in so over the 00:00:50,150 --> 00:00:50,160 that second factor to log in so over the 00:00:50,160 --> 00:00:52,670 that second factor to log in so over the years the info Stealers have evolved 00:00:52,670 --> 00:00:52,680 years the info Stealers have evolved 00:00:52,680 --> 00:00:54,709 years the info Stealers have evolved into stealing information from your 00:00:54,709 --> 00:00:54,719 into stealing information from your 00:00:54,719 --> 00:00:57,750 into stealing information from your browser all because of a simple thing 00:00:57,750 --> 00:00:57,760 browser all because of a simple thing 00:00:57,760 --> 00:01:00,950 browser all because of a simple thing that we all want and we all have 00:01:00,950 --> 00:01:00,960 that we all want and we all have 00:01:00,960 --> 00:01:03,110 that we all want and we all have convenience imagine having to put in 00:01:03,110 --> 00:01:03,120 convenience imagine having to put in 00:01:03,120 --> 00:01:05,109 convenience imagine having to put in your username and password and then your 00:01:05,109 --> 00:01:05,119 your username and password and then your 00:01:05,119 --> 00:01:06,270 your username and password and then your two-factor 00:01:06,270 --> 00:01:06,280 two-factor 00:01:06,280 --> 00:01:08,830 two-factor authentication every single time you 00:01:08,830 --> 00:01:08,840 authentication every single time you 00:01:08,840 --> 00:01:11,390 authentication every single time you want to check your email or every single 00:01:11,390 --> 00:01:11,400 want to check your email or every single 00:01:11,400 --> 00:01:12,789 want to check your email or every single time you want to quickly check your 00:01:12,789 --> 00:01:12,799 time you want to quickly check your 00:01:12,799 --> 00:01:15,070 time you want to quickly check your calendar or see what's going on on 00:01:15,070 --> 00:01:15,080 calendar or see what's going on on 00:01:15,080 --> 00:01:18,109 calendar or see what's going on on Facebook or the latest tweets that would 00:01:18,109 --> 00:01:18,119 Facebook or the latest tweets that would 00:01:18,119 --> 00:01:21,069 Facebook or the latest tweets that would be so irritating so what websites and 00:01:21,069 --> 00:01:21,079 be so irritating so what websites and 00:01:21,079 --> 00:01:24,270 be so irritating so what websites and online services do is remember you you 00:01:24,270 --> 00:01:24,280 online services do is remember you you 00:01:24,280 --> 00:01:26,789 online services do is remember you you log in once successfully therefore the 00:01:26,789 --> 00:01:26,799 log in once successfully therefore the 00:01:26,799 --> 00:01:28,830 log in once successfully therefore the next time you visit that site from the 00:01:28,830 --> 00:01:28,840 next time you visit that site from the 00:01:28,840 --> 00:01:31,789 next time you visit that site from the same computer and the same browser it 00:01:31,789 --> 00:01:31,799 same computer and the same browser it 00:01:31,799 --> 00:01:33,630 same computer and the same browser it knows that it's you and you don't have 00:01:33,630 --> 00:01:33,640 knows that it's you and you don't have 00:01:33,640 --> 00:01:35,990 knows that it's you and you don't have to keep putting in your credential it 00:01:35,990 --> 00:01:36,000 to keep putting in your credential it 00:01:36,000 --> 00:01:38,230 to keep putting in your credential it does this with a combination of cookies 00:01:38,230 --> 00:01:38,240 does this with a combination of cookies 00:01:38,240 --> 00:01:40,789 does this with a combination of cookies and authentication tokens now without 00:01:40,789 --> 00:01:40,799 and authentication tokens now without 00:01:40,799 --> 00:01:42,510 and authentication tokens now without getting into the technical details of 00:01:42,510 --> 00:01:42,520 getting into the technical details of 00:01:42,520 --> 00:01:44,870 getting into the technical details of each and when one is used over the other 00:01:44,870 --> 00:01:44,880 each and when one is used over the other 00:01:44,880 --> 00:01:47,310 each and when one is used over the other essentially it's a file that is stored 00:01:47,310 --> 00:01:47,320 essentially it's a file that is stored 00:01:47,320 --> 00:01:49,789 essentially it's a file that is stored on your computer and confirms that you 00:01:49,789 --> 00:01:49,799 on your computer and confirms that you 00:01:49,799 --> 00:01:52,469 on your computer and confirms that you have access to that website nice and 00:01:52,469 --> 00:01:52,479 have access to that website nice and 00:01:52,479 --> 00:01:55,350 have access to that website nice and convenient for us but with this 00:01:55,350 --> 00:01:55,360 convenient for us but with this 00:01:55,360 --> 00:01:57,310 convenient for us but with this understanding what would happen if I 00:01:57,310 --> 00:01:57,320 understanding what would happen if I 00:01:57,320 --> 00:01:59,990 understanding what would happen if I could grab this file from your computer 00:01:59,990 --> 00:02:00,000 could grab this file from your computer 00:02:00,000 --> 00:02:02,149 could grab this file from your computer and put it on mine I would access the 00:02:02,149 --> 00:02:02,159 and put it on mine I would access the 00:02:02,159 --> 00:02:04,469 and put it on mine I would access the same websites the website would look for 00:02:04,469 --> 00:02:04,479 same websites the website would look for 00:02:04,479 --> 00:02:06,670 same websites the website would look for that file it will see that it has all 00:02:06,670 --> 00:02:06,680 that file it will see that it has all 00:02:06,680 --> 00:02:08,990 that file it will see that it has all the right information that matches its 00:02:08,990 --> 00:02:09,000 the right information that matches its 00:02:09,000 --> 00:02:11,470 the right information that matches its internal system and therefore it will 00:02:11,470 --> 00:02:11,480 internal system and therefore it will 00:02:11,480 --> 00:02:14,630 internal system and therefore it will grant me access into your account as far 00:02:14,630 --> 00:02:14,640 grant me access into your account as far 00:02:14,640 --> 00:02:18,030 grant me access into your account as far as the website is concerned I am you so 00:02:18,030 --> 00:02:18,040 as the website is concerned I am you so 00:02:18,040 --> 00:02:20,350 as the website is concerned I am you so let's get back to that email it comes 00:02:20,350 --> 00:02:20,360 let's get back to that email it comes 00:02:20,360 --> 00:02:22,270 let's get back to that email it comes from somebody that you typically would 00:02:22,270 --> 00:02:22,280 from somebody that you typically would 00:02:22,280 --> 00:02:25,270 from somebody that you typically would know that just contains an attachment in 00:02:25,270 --> 00:02:25,280 know that just contains an attachment in 00:02:25,280 --> 00:02:27,830 know that just contains an attachment in this case it's a video file but the 00:02:27,830 --> 00:02:27,840 this case it's a video file but the 00:02:27,840 --> 00:02:29,910 this case it's a video file but the attachment could be anything it could be 00:02:29,910 --> 00:02:29,920 attachment could be anything it could be 00:02:29,920 --> 00:02:33,589 attachment could be anything it could be a PDF an image a word doc but of course 00:02:33,589 --> 00:02:33,599 a PDF an image a word doc but of course 00:02:33,599 --> 00:02:36,430 a PDF an image a word doc but of course it's none of those actual files what the 00:02:36,430 --> 00:02:36,440 it's none of those actual files what the 00:02:36,440 --> 00:02:38,910 it's none of those actual files what the threat actors do is create a file that 00:02:38,910 --> 00:02:38,920 threat actors do is create a file that 00:02:38,920 --> 00:02:41,509 threat actors do is create a file that looks like that video file PDF or any 00:02:41,509 --> 00:02:41,519 looks like that video file PDF or any 00:02:41,519 --> 00:02:44,229 looks like that video file PDF or any type of file that file even has the 00:02:44,229 --> 00:02:44,239 type of file that file even has the 00:02:44,239 --> 00:02:47,710 type of file that file even has the right icon for that type of file now 00:02:47,710 --> 00:02:47,720 right icon for that type of file now 00:02:47,720 --> 00:02:50,589 right icon for that type of file now when you open that attachment even if 00:02:50,589 --> 00:02:50,599 when you open that attachment even if 00:02:50,599 --> 00:02:52,710 when you open that attachment even if you open it in preview mode the 00:02:52,710 --> 00:02:52,720 you open it in preview mode the 00:02:52,720 --> 00:02:56,309 you open it in preview mode the malicious code inside that file runs the 00:02:56,309 --> 00:02:56,319 malicious code inside that file runs the 00:02:56,319 --> 00:02:58,309 malicious code inside that file runs the smart things that these threat actors do 00:02:58,309 --> 00:02:58,319 smart things that these threat actors do 00:02:58,319 --> 00:03:00,270 smart things that these threat actors do is they make it look like 00:03:00,270 --> 00:03:00,280 is they make it look like 00:03:00,280 --> 00:03:02,470 is they make it look like nothing happened you may even get a 00:03:02,470 --> 00:03:02,480 nothing happened you may even get a 00:03:02,480 --> 00:03:04,270 nothing happened you may even get a message on your screen saying something 00:03:04,270 --> 00:03:04,280 message on your screen saying something 00:03:04,280 --> 00:03:06,509 message on your screen saying something like the file is corrupt and cannot be 00:03:06,509 --> 00:03:06,519 like the file is corrupt and cannot be 00:03:06,519 --> 00:03:09,670 like the file is corrupt and cannot be run so you just move on with your day 00:03:09,670 --> 00:03:09,680 run so you just move on with your day 00:03:09,680 --> 00:03:12,229 run so you just move on with your day what you don't realize is that all your 00:03:12,229 --> 00:03:12,239 what you don't realize is that all your 00:03:12,239 --> 00:03:14,270 what you don't realize is that all your tokens and cookies and all that 00:03:14,270 --> 00:03:14,280 tokens and cookies and all that 00:03:14,280 --> 00:03:16,550 tokens and cookies and all that information from your browser has just 00:03:16,550 --> 00:03:16,560 information from your browser has just 00:03:16,560 --> 00:03:19,390 information from your browser has just been stolen and sent to that threat 00:03:19,390 --> 00:03:19,400 been stolen and sent to that threat 00:03:19,400 --> 00:03:22,190 been stolen and sent to that threat actor for all intents and purposes you 00:03:22,190 --> 00:03:22,200 actor for all intents and purposes you 00:03:22,200 --> 00:03:25,110 actor for all intents and purposes you are hacked you just don't know it now 00:03:25,110 --> 00:03:25,120 are hacked you just don't know it now 00:03:25,120 --> 00:03:27,390 are hacked you just don't know it now that they have your info they can load 00:03:27,390 --> 00:03:27,400 that they have your info they can load 00:03:27,400 --> 00:03:29,429 that they have your info they can load those files on their computer and are 00:03:29,429 --> 00:03:29,439 those files on their computer and are 00:03:29,439 --> 00:03:32,070 those files on their computer and are able to bypass your complicated password 00:03:32,070 --> 00:03:32,080 able to bypass your complicated password 00:03:32,080 --> 00:03:34,429 able to bypass your complicated password and your two-factor authentication what 00:03:34,429 --> 00:03:34,439 and your two-factor authentication what 00:03:34,439 --> 00:03:36,869 and your two-factor authentication what they do next is really anything that 00:03:36,869 --> 00:03:36,879 they do next is really anything that 00:03:36,879 --> 00:03:39,550 they do next is really anything that they want sometimes they run scams on 00:03:39,550 --> 00:03:39,560 they want sometimes they run scams on 00:03:39,560 --> 00:03:41,750 they want sometimes they run scams on your social media other times they log 00:03:41,750 --> 00:03:41,760 your social media other times they log 00:03:41,760 --> 00:03:44,110 your social media other times they log into your bank or your PayPal and try to 00:03:44,110 --> 00:03:44,120 into your bank or your PayPal and try to 00:03:44,120 --> 00:03:46,550 into your bank or your PayPal and try to transfer money they can even take out 00:03:46,550 --> 00:03:46,560 transfer money they can even take out 00:03:46,560 --> 00:03:49,149 transfer money they can even take out loans in your name run identity theft 00:03:49,149 --> 00:03:49,159 loans in your name run identity theft 00:03:49,159 --> 00:03:52,350 loans in your name run identity theft scams and basically ruin your digital 00:03:52,350 --> 00:03:52,360 scams and basically ruin your digital 00:03:52,360 --> 00:03:56,069 scams and basically ruin your digital life this is serious now John Hammond 00:03:56,069 --> 00:03:56,079 life this is serious now John Hammond 00:03:56,079 --> 00:03:58,149 life this is serious now John Hammond who is a security researcher actually 00:03:58,149 --> 00:03:58,159 who is a security researcher actually 00:03:58,159 --> 00:04:00,390 who is a security researcher actually shows how the code works if you want to 00:04:00,390 --> 00:04:00,400 shows how the code works if you want to 00:04:00,400 --> 00:04:02,149 shows how the code works if you want to check it out I'll have a link in the 00:04:02,149 --> 00:04:02,159 check it out I'll have a link in the 00:04:02,159 --> 00:04:04,630 check it out I'll have a link in the description below now it looks super 00:04:04,630 --> 00:04:04,640 description below now it looks super 00:04:04,640 --> 00:04:06,470 description below now it looks super complicated so you would think that in 00:04:06,470 --> 00:04:06,480 complicated so you would think that in 00:04:06,480 --> 00:04:08,670 complicated so you would think that in order to pull this off hackers will need 00:04:08,670 --> 00:04:08,680 order to pull this off hackers will need 00:04:08,680 --> 00:04:12,270 order to pull this off hackers will need to be some genius coders but that is not 00:04:12,270 --> 00:04:12,280 to be some genius coders but that is not 00:04:12,280 --> 00:04:15,110 to be some genius coders but that is not the case just like you can pay a monthly 00:04:15,110 --> 00:04:15,120 the case just like you can pay a monthly 00:04:15,120 --> 00:04:18,430 the case just like you can pay a monthly fee for Netflix there are maway services 00:04:18,430 --> 00:04:18,440 fee for Netflix there are maway services 00:04:18,440 --> 00:04:20,830 fee for Netflix there are maway services on the dark web well for a couple of 00:04:20,830 --> 00:04:20,840 on the dark web well for a couple of 00:04:20,840 --> 00:04:23,830 on the dark web well for a couple of hundred bucks you can get your own maway 00:04:23,830 --> 00:04:23,840 hundred bucks you can get your own maway 00:04:23,840 --> 00:04:26,469 hundred bucks you can get your own maway ready to go this is one of the reasons 00:04:26,469 --> 00:04:26,479 ready to go this is one of the reasons 00:04:26,479 --> 00:04:29,710 ready to go this is one of the reasons why we seeing this threat on the rise as 00:04:29,710 --> 00:04:29,720 why we seeing this threat on the rise as 00:04:29,720 --> 00:04:32,510 why we seeing this threat on the rise as info Steelers can literally be done by 00:04:32,510 --> 00:04:32,520 info Steelers can literally be done by 00:04:32,520 --> 00:04:35,550 info Steelers can literally be done by anyone in a couple of minutes and in an 00:04:35,550 --> 00:04:35,560 anyone in a couple of minutes and in an 00:04:35,560 --> 00:04:38,670 anyone in a couple of minutes and in an instant you lose access to your entire 00:04:38,670 --> 00:04:38,680 instant you lose access to your entire 00:04:38,680 --> 00:04:41,430 instant you lose access to your entire Digital Life so what can you do to 00:04:41,430 --> 00:04:41,440 Digital Life so what can you do to 00:04:41,440 --> 00:04:44,150 Digital Life so what can you do to protect yourself well firstly you should 00:04:44,150 --> 00:04:44,160 protect yourself well firstly you should 00:04:44,160 --> 00:04:46,710 protect yourself well firstly you should log out of important websites like your 00:04:46,710 --> 00:04:46,720 log out of important websites like your 00:04:46,720 --> 00:04:49,350 log out of important websites like your Google your banking website or anything 00:04:49,350 --> 00:04:49,360 Google your banking website or anything 00:04:49,360 --> 00:04:51,550 Google your banking website or anything else that you deem important then just 00:04:51,550 --> 00:04:51,560 else that you deem important then just 00:04:51,560 --> 00:04:54,029 else that you deem important then just log back in when you do that it 00:04:54,029 --> 00:04:54,039 log back in when you do that it 00:04:54,039 --> 00:04:56,710 log back in when you do that it invalidates any previous tokens which 00:04:56,710 --> 00:04:56,720 invalidates any previous tokens which 00:04:56,720 --> 00:04:59,629 invalidates any previous tokens which means that if anybody has those tokens 00:04:59,629 --> 00:04:59,639 means that if anybody has those tokens 00:04:59,639 --> 00:05:02,390 means that if anybody has those tokens they just became useless get into the 00:05:02,390 --> 00:05:02,400 they just became useless get into the 00:05:02,400 --> 00:05:04,150 they just became useless get into the habit of logging out of important 00:05:04,150 --> 00:05:04,160 habit of logging out of important 00:05:04,160 --> 00:05:07,390 habit of logging out of important websites once a month ideally more often 00:05:07,390 --> 00:05:07,400 websites once a month ideally more often 00:05:07,400 --> 00:05:10,310 websites once a month ideally more often yes it's a pain but definitely worth it 00:05:10,310 --> 00:05:10,320 yes it's a pain but definitely worth it 00:05:10,320 --> 00:05:13,310 yes it's a pain but definitely worth it to up your security level next if you 00:05:13,310 --> 00:05:13,320 to up your security level next if you 00:05:13,320 --> 00:05:16,350 to up your security level next if you typically get attachment in emails I 00:05:16,350 --> 00:05:16,360 typically get attachment in emails I 00:05:16,360 --> 00:05:18,629 typically get attachment in emails I highly recommend getting into the habit 00:05:18,629 --> 00:05:18,639 highly recommend getting into the habit 00:05:18,639 --> 00:05:20,870 highly recommend getting into the habit of asking the sender not to send the 00:05:20,870 --> 00:05:20,880 of asking the sender not to send the 00:05:20,880 --> 00:05:23,350 of asking the sender not to send the actual file as an attachment but to 00:05:23,350 --> 00:05:23,360 actual file as an attachment but to 00:05:23,360 --> 00:05:26,110 actual file as an attachment but to rather put that file into something like 00:05:26,110 --> 00:05:26,120 rather put that file into something like 00:05:26,120 --> 00:05:29,070 rather put that file into something like Google drive or Dropbox and then share 00:05:29,070 --> 00:05:29,080 Google drive or Dropbox and then share 00:05:29,080 --> 00:05:31,350 Google drive or Dropbox and then share the link this is because Google or 00:05:31,350 --> 00:05:31,360 the link this is because Google or 00:05:31,360 --> 00:05:33,870 the link this is because Google or Dropbox or those cloud storage services 00:05:33,870 --> 00:05:33,880 Dropbox or those cloud storage services 00:05:33,880 --> 00:05:36,870 Dropbox or those cloud storage services are simply not going to host malware so 00:05:36,870 --> 00:05:36,880 are simply not going to host malware so 00:05:36,880 --> 00:05:39,230 are simply not going to host malware so if it's legit you will get a link and 00:05:39,230 --> 00:05:39,240 if it's legit you will get a link and 00:05:39,240 --> 00:05:40,670 if it's legit you will get a link and then you know that it's already been 00:05:40,670 --> 00:05:40,680 then you know that it's already been 00:05:40,680 --> 00:05:43,110 then you know that it's already been scanned by Google and your antivirus 00:05:43,110 --> 00:05:43,120 scanned by Google and your antivirus 00:05:43,120 --> 00:05:45,670 scanned by Google and your antivirus will then do another scanned again now 00:05:45,670 --> 00:05:45,680 will then do another scanned again now 00:05:45,680 --> 00:05:48,309 will then do another scanned again now next if you get a random email from 00:05:48,309 --> 00:05:48,319 next if you get a random email from 00:05:48,319 --> 00:05:50,309 next if you get a random email from people you don't know and are not 00:05:50,309 --> 00:05:50,319 people you don't know and are not 00:05:50,319 --> 00:05:52,110 people you don't know and are not expecting and that email contains an 00:05:52,110 --> 00:05:52,120 expecting and that email contains an 00:05:52,120 --> 00:05:55,670 expecting and that email contains an attachment just delete it do not try to 00:05:55,670 --> 00:05:55,680 attachment just delete it do not try to 00:05:55,680 --> 00:05:58,550 attachment just delete it do not try to even open it in preview mode that will 00:05:58,550 --> 00:05:58,560 even open it in preview mode that will 00:05:58,560 --> 00:06:00,909 even open it in preview mode that will execute the code and no matter how 00:06:00,909 --> 00:06:00,919 execute the code and no matter how 00:06:00,919 --> 00:06:03,350 execute the code and no matter how tempting it is to open an email within 00:06:03,350 --> 00:06:03,360 tempting it is to open an email within 00:06:03,360 --> 00:06:07,070 tempting it is to open an email within only fans photos or confidential salary 00:06:07,070 --> 00:06:07,080 only fans photos or confidential salary 00:06:07,080 --> 00:06:11,629 only fans photos or confidential salary list attachment do not fall for it and 00:06:11,629 --> 00:06:11,639 list attachment do not fall for it and 00:06:11,639 --> 00:06:14,510 list attachment do not fall for it and never ever ever open a zip file that is 00:06:14,510 --> 00:06:14,520 never ever ever open a zip file that is 00:06:14,520 --> 00:06:17,550 never ever ever open a zip file that is password protected this is a Surefire 00:06:17,550 --> 00:06:17,560 password protected this is a Surefire 00:06:17,560 --> 00:06:20,390 password protected this is a Surefire way to get infected antivirus doesn't 00:06:20,390 --> 00:06:20,400 way to get infected antivirus doesn't 00:06:20,400 --> 00:06:22,710 way to get infected antivirus doesn't scan those protected files and this is 00:06:22,710 --> 00:06:22,720 scan those protected files and this is 00:06:22,720 --> 00:06:25,309 scan those protected files and this is where malware is easily hidden you 00:06:25,309 --> 00:06:25,319 where malware is easily hidden you 00:06:25,319 --> 00:06:27,790 where malware is easily hidden you should also enable safe browsing if 00:06:27,790 --> 00:06:27,800 should also enable safe browsing if 00:06:27,800 --> 00:06:30,430 should also enable safe browsing if you're using Chrome go to your Google 00:06:30,430 --> 00:06:30,440 you're using Chrome go to your Google 00:06:30,440 --> 00:06:33,469 you're using Chrome go to your Google accounts select on security then click 00:06:33,469 --> 00:06:33,479 accounts select on security then click 00:06:33,479 --> 00:06:36,029 accounts select on security then click on enhance safe browsing for your 00:06:36,029 --> 00:06:36,039 on enhance safe browsing for your 00:06:36,039 --> 00:06:40,230 on enhance safe browsing for your account and switch that on if any email 00:06:40,230 --> 00:06:40,240 account and switch that on if any email 00:06:40,240 --> 00:06:43,510 account and switch that on if any email or website says anything like this is a 00:06:43,510 --> 00:06:43,520 or website says anything like this is a 00:06:43,520 --> 00:06:45,510 or website says anything like this is a new version of the file so your anti 00:06:45,510 --> 00:06:45,520 new version of the file so your anti 00:06:45,520 --> 00:06:47,589 new version of the file so your anti virus doesn't know about it yet just 00:06:47,589 --> 00:06:47,599 virus doesn't know about it yet just 00:06:47,599 --> 00:06:49,950 virus doesn't know about it yet just disable it whilst you install the file 00:06:49,950 --> 00:06:49,960 disable it whilst you install the file 00:06:49,960 --> 00:06:52,790 disable it whilst you install the file if you ever see anything like that never 00:06:52,790 --> 00:06:52,800 if you ever see anything like that never 00:06:52,800 --> 00:06:55,550 if you ever see anything like that never ever do that the antivirus doesn't need 00:06:55,550 --> 00:06:55,560 ever do that the antivirus doesn't need 00:06:55,560 --> 00:06:58,230 ever do that the antivirus doesn't need to know about every new version of every 00:06:58,230 --> 00:06:58,240 to know about every new version of every 00:06:58,240 --> 00:07:00,189 to know about every new version of every file it will look at the file content 00:07:00,189 --> 00:07:00,199 file it will look at the file content 00:07:00,199 --> 00:07:03,029 file it will look at the file content itself and find out if it is malicious 00:07:03,029 --> 00:07:03,039 itself and find out if it is malicious 00:07:03,039 --> 00:07:05,670 itself and find out if it is malicious or not malicious this message is 00:07:05,670 --> 00:07:05,680 or not malicious this message is 00:07:05,680 --> 00:07:08,029 or not malicious this message is nonsense I cannot tell you how many 00:07:08,029 --> 00:07:08,039 nonsense I cannot tell you how many 00:07:08,039 --> 00:07:09,550 nonsense I cannot tell you how many people will click on a link that they 00:07:09,550 --> 00:07:09,560 people will click on a link that they 00:07:09,560 --> 00:07:11,990 people will click on a link that they found on Google for the latest update to 00:07:11,990 --> 00:07:12,000 found on Google for the latest update to 00:07:12,000 --> 00:07:15,150 found on Google for the latest update to a game or the latest Zoom version or 00:07:15,150 --> 00:07:15,160 a game or the latest Zoom version or 00:07:15,160 --> 00:07:17,950 a game or the latest Zoom version or that pirated software and will disable 00:07:17,950 --> 00:07:17,960 that pirated software and will disable 00:07:17,960 --> 00:07:21,070 that pirated software and will disable their antivirus just to get that latest 00:07:21,070 --> 00:07:21,080 their antivirus just to get that latest 00:07:21,080 --> 00:07:24,430 their antivirus just to get that latest update don't do that and to be clear 00:07:24,430 --> 00:07:24,440 update don't do that and to be clear 00:07:24,440 --> 00:07:26,309 update don't do that and to be clear complicated passwords along with two 00:07:26,309 --> 00:07:26,319 complicated passwords along with two 00:07:26,319 --> 00:07:29,670 complicated passwords along with two Factor authentication are a must I am 00:07:29,670 --> 00:07:29,680 Factor authentication are a must I am 00:07:29,680 --> 00:07:31,550 Factor authentication are a must I am not saying that we shouldn't have them 00:07:31,550 --> 00:07:31,560 not saying that we shouldn't have them 00:07:31,560 --> 00:07:33,749 not saying that we shouldn't have them what I am saying is that we must not be 00:07:33,749 --> 00:07:33,759 what I am saying is that we must not be 00:07:33,759 --> 00:07:36,589 what I am saying is that we must not be manipulated into clicking on attachment 00:07:36,589 --> 00:07:36,599 manipulated into clicking on attachment 00:07:36,599 --> 00:07:39,790 manipulated into clicking on attachment and certainly never disable our security 00:07:39,790 --> 00:07:39,800 and certainly never disable our security 00:07:39,800 --> 00:07:42,670 and certainly never disable our security features this is why so many companies 00:07:42,670 --> 00:07:42,680 features this is why so many companies 00:07:42,680 --> 00:07:45,230 features this is why so many companies are rolling out pass Keys which is meant 00:07:45,230 --> 00:07:45,240 are rolling out pass Keys which is meant 00:07:45,240 --> 00:07:47,749 are rolling out pass Keys which is meant to replace passwords and you can see all 00:07:47,749 --> 00:07:47,759 to replace passwords and you can see all 00:07:47,759 --> 00:07:50,830 to replace passwords and you can see all about them in this video right over here 00:07:50,830 --> 00:07:50,840 about them in this video right over here 00:07:50,840 --> 00:07:52,749 about them in this video right over here now before you head out don't forget to 00:07:52,749 --> 00:07:52,759 now before you head out don't forget to 00:07:52,759 --> 00:07:54,749 now before you head out don't forget to hit that subscribe button give the video 00:07:54,749 --> 00:07:54,759 hit that subscribe button give the video 00:07:54,759 --> 00:07:58,790 hit that subscribe button give the video a thumbs up I will see you in this video 00:07:58,790 --> 00:07:58,800 a thumbs up I will see you in this video 00:07:58,800 --> 00:08:02,240 a thumbs up I will see you in this video Let's Go oh 34377

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.