Afleveringen

  • Ransomware, one of the most insidious and personally invasive cybercrimes, is rapidly becoming a major threat to businesses and individuals alike. The question that often arises is - should we pay the ransom? Where does the money go? What role does cyber insurance play?In this enlightening session, we delve into these prickly topics, providing insights and guidance on how to navigate this frightening landscape. We reference a key article from Cybereason, which provides compelling reasons why you should never pay ransomware attackers.Cybersecurity Uncensored is dedicated to providing content and advice on all things cybersecurity and hacking. We focus on Information Security (“InfoSec”), the threats posed by malware (“Malicious Software”), and the increasing risk of ransomware. We offer specialized one-on-one presentations, keynotes, and services such as Ethical Hacking (via penetration testing and vulnerability assessments) as well as audit preparedness reviews for frameworks like ISO 27001 and the ASD/ACSC Essential Eight.Feel free to reach out anytime via the contact details on this page. Remember, it’s about Humanity, Not Machinery. Stay safe out there!#Ransomware #Cybersecurity #InfoSec #Tech #OnlineSafety #CyberInsurance #EthicalHackingRelevant Keywords: Ransomware, Cybersecurity, InfoSec, Technology, Online Safety, Cyber Insurance, Ethical Hacking, Penetration Testing, Vulnerability Assessment, ISO 27001, ASD/ACSC Essential Eight"This video aims to provide a balanced view to help you make an informed decision about dealing with ransomware. Presented aboard a cruise ship to a diverse audience, this session strives to deliver valuable information without being overly technical.Disclaimer: Title and description written with the assistance of AI.

  • Embark on an 'Unplugged Voyage' and discover the art of digital detoxification amidst the waves. Presented to a live audience aboard a majestic cruise ship, this session explores the crucial balance between technology and well-being. Learn how to reclaim your mental space and enhance your life by disconnecting from digital chains.🌊 **Session Highlights:**- Insights into the impact of technology on mental health- Practical steps to reduce digital dependency- Strategies for using technology as a life-enhancing tool, not a dictator📱 **Tech-Life Harmony:**- Embrace the present beyond the screen- Device sanitization tips for a cleaner digital environment- Small, meaningful actions to detach from the virtual and connect with the real🚢 **Cybersecurity Uncensored at Sea:**Join us in the serene setting of the ocean as we delve into cybersecurity and ethical hacking. We address Information Security (InfoSec) concerns, the dangers of malware and ransomware, and offer specialized services including ethical hacking through penetration testing and vulnerability assessments, as well as audit preparedness for standards like ISO 27001 and the ASD/ACSC Essential Eight.📞 **Connect with Us:**Reach out for bespoke presentations, keynotes, and cybersecurity services. Find our contact details on this page and let's navigate the digital seas together.Stay secure and grounded in the journey of life. It's about humanity, not machinery. *Disclaimer: This title and description were enhanced with the assistance of AI for optimal engagement.*#DigitalDetox #UnpluggedLife #MentalHealth #TechBreak #Mindfulness #Wellbeing #Cybersecurity #InfoSec #DigitalWellness #HealthyTechHabits #DisconnectToReconnect #LifeAtSeaRelevant Keywords: Digital detox, mental health, technology reliance, living in the present, device sanitization, cybersecurity, ethical hacking, information security, malware awareness, ransomware risks, tech-life balance, mindfulness.

  • Zijn er afleveringen die ontbreken?

    Klik hier om de feed te vernieuwen.

  • Welcome to Cybersecurity Uncensored, where we delve into the ever-evolving world of cybercrime. In this episode, we explore the ‘Evolution of Cybercrime’, shedding light on the rise of sophisticated digital threats and how we can stay one step ahead.As we journey into the unpredictable digital future, we’ll uncover trends and patterns that can help us evolve and maintain our security. Discover how Artificial Intelligence is birthing new forms of cybercrime and presenting unprecedented challenges. But fear not, we’ll also discuss how we can leverage technology to our advantage and safeguard ourselves.In this series, we provide expert advice on all things cybersecurity, with a focus on Information Security (InfoSec), the threats posed by malware, and the increasing risk posed by ransomware. We offer specialized one-on-one presentations, keynotes, and services such as Ethical Hacking (via penetration testing and vulnerability assessments), as well as audit preparedness reviews for frameworks such as ISO 27001 and the ASD/ACSC Essential Eight.This session, recorded on a cruise ship and presented to a diverse audience, aims to be informative yet accessible, offering practical advice on personal protection and what to watch out for in the cyber realm.Remember, it’s about Humanity, Not Machinery. Stay safe out there!For more information or to get in touch, please see the contact details on this page. Thank you for watching!"#CybersecurityUncensored #EvolutionOfCybercrime #AI #DigitalThreats #InfoSec #Malware #Ransomware #EthicalHacking #ISO27001 #ASDEssentialEightRelevant Keywords: Cybersecurity, Evolution of Cybercrime, Artificial Intelligence, Digital Threats, Information Security, Malware, Ransomware, Ethical Hacking, Penetration Testing, Vulnerability Assessments, ISO 27001, ASD Essential EightDisclaimer: Title and description written with the assistance of AI.

  • In the wake of the Optus outage in November 2023, which left millions disconnected and businesses in disarray, we're forced to confront the vulnerabilities of our increasingly digital society. This video delves into the lessons learned from the outage and explores strategies to fortify ourselves against similar disruptions, especially as we steer towards a cashless economy and witness a decline in traditional banking services.

    **Key Takeaways:**
    - Understand the **Optus outage impact** and its implications on daily life and commerce.
    - Learn about the **risks of a cashless society** and how outages can amplify these risks.
    - Discover **practical steps** to prepare for future telecommunications failures, including maintaining cash reserves and alternative communication methods.
    - Gain insights into **cybersecurity measures** and how they can safeguard against potential threats.

    **Cybersecurity Uncensored:**
    Your go-to source for candid discussions on cybersecurity, hacking, and information security. Offering specialized services such as Ethical Hacking, vulnerability assessments, and audit preparedness for standards like ISO 27001 and the ASD/ACSC Essential Eight.

    **Stay Informed, Stay Prepared:**
    Don't let the next outage catch you off guard. Equip yourself with knowledge and tools to navigate the uncertainties of our digital future.

    **Connect with Us:**
    For personalized advice and services, reach out through the contact details provided on this page.

    **Humanity Over Machinery:**
    Remember, in the face of technological failure, our human resilience prevails.

    *Disclaimer: This title and description were crafted with the assistance of AI.*

    #DigitalOutage #CashlessSociety #CyberResilience #InfoSec #TelecomSafety #FuturePrep #TechFailures #CybersecurityAwareness

    Additional Resources & References:

    2023 Optus outage - Wikipedia. https://en.wikipedia.org/wiki/2023_Optus_outage.

    What caused Optus's nationwide outage, and how long was it down for .... https://www.abc.net.au/news/2023-11-08/optus-outage-mobile-phones-internet-what-happened/103077180.

    Outage response | Optus. https://www.optus.com.au/notices/outage-response.

    Bombshell as Optus boss quits just months after nationwide network outage disrupted 10million customers. https://www.dailymail.co.uk/news/article-13175861/Bombshell-Optus-boss-quits-just-months-nationwide-network-outage-disrupted-10million-customers.html.

    Optus head of networks resigns months after lengthy outage in Australia. https://www.datacenterdynamics.com/en/news/optus-head-of-networks-resigns-months-after-lengthy-outage-in-australia/.

    Singtel dismisses reports it is looking to sell Optus: ‘We are committed to Australia for the long term’. https://mumbrella.com.au/singtel-dismisses-reports-it-is-looking-to-sell-optus-we-are-committed-to-australia-for-the-long-term-819700.

    Relevant Keywords: Optus outage 2023, Telecommunications failure, Preparing for digital disruptions, Cashless economy risks, Cybersecurity strategies, Backup communication methods, Banking service alternatives, Emergency preparedness

  • 🔍 Digital Clean-Up: Your Blueprint to Online Privacy 🔍

    In the vast ocean of the internet, our digital footprints can be as revealing as footprints in the sand. This video is your guide to understanding and managing your digital exhaust, footprints, and shadows. Join us as we dive into the world of Cybersecurity Uncensored, where we unravel the mysteries of your online presence and teach you how to perform a digital ‘spring cleaning’ to safeguard your data from cybercriminals.

    🛡️ What You’ll Learn:

    The significance of your digital footprint and how it impacts your privacy.
    Practical steps to minimize your digital exhaust and reduce your vulnerability.
    Strategies for managing your digital shadows to keep your personal information secure.

    👨‍💻 Cybersecurity Expertise: With a focus on Information Security (InfoSec), we explore the evolving threats of malware and ransomware. Our specialized services include Ethical Hacking through penetration testing and vulnerability assessments, as well as audit preparedness for standards like ISO 27001 and the ASD/ACSC Essential Eight.

    📞 Stay Connected: For personalized advice and presentations on cybersecurity, reach out via the contact details provided on this page.

    Remember, it’s about protecting Humanity, Not Machinery.

    Disclaimer: The title and description were crafted with the assistance of AI.

    #DigitalPrivacy #OnlineSecurity #CyberCleanUp #DataProtection #EthicalHacking #InfoSecTips #CyberAwareness #TechSavvy #RansomwareDefense #MalwareAlert

    Relevant Keywords: Digital Footprint, Digital Shadow, Cybersecurity, Information Security, Malware, Ransomware, Data Privacy, Internet Safety, Ethical Hacking, ISO 27001

  • Welcome aboard the S.S. Cyber Love! In the vast ocean of online dating, there are plenty of fish, but how do you avoid the sharks? This video is your lifeboat, offering you a survival guide to navigate the choppy waters of digital romance.

    We’ll dive into the deep end of the dating pool, exploring the good, the bad, and the downright scary aspects of online dating. From the dazzling dolphins to the sneaky catfish, we’ll help you identify “who’s who” in the online dating zoo.

    Remember, it’s not just about finding the right one, but also about avoiding the wrong ones. So, we’ll share tips on how to spot scams and stay safe while searching for love in the cyber sea.

    But remember, you’re not alone in this journey. If you ever feel like you’re drowning, reach out for help. There are lifelines available, and we’ve listed some below.

    Stay safe, have fun, and remember - you’re not just a drop in the ocean, you’re the entire ocean in a drop. So, let’s set sail on this adventure together!

    Humanity, Not Machinery.

    #OnlineDatingSafety #CyberLove #DigitalRomance #LoveBytes #InfoSec #CyberSecurity #Tech #Ransomware

    Relevant Keywords: Online Dating, Cyber Security, Safety Tips, Scams, Digital Age, Single Life, InfoSec, Tech, Ransomware

  • Embark on a journey with confidence as 'Tech-Savvy Traveler' guides you through the essentials of traveling with technology. From pre-trip preparations to on-the-go tips and post-travel practices, learn how to stay connected, charge your devices, capture memories, and enjoy entertainment—all while keeping your data secure.

    🌐 **Before You Go:**
    - Preparing your devices for travel
    - Security checks and data backups
    - Essential apps for navigation and communication

    🔋 **While Traveling:**
    - Finding safe charging spots
    - Keeping your devices secure in public spaces
    - Best practices for using public Wi-Fi

    🔒 **After Your Return:**
    - Checking for security breaches
    - Updating passwords and reviewing permissions
    - Syncing and storing travel memories

    🛡️ **Cybersecurity Uncensored:**
    Your compass in the world of cybersecurity. We cover everything from Information Security (InfoSec) to ethical hacking, and provide specialized services such as penetration testing, vulnerability assessments, and audit preparedness for standards like ISO 27001 and the ASD/ACSC Essential Eight.

    📞 **Connect With Confidence:**
    For personalized cybersecurity advice or services, reach out via the contact details on this page. Let's ensure your digital journey is as safe as it is thrilling.

    Stay safe and connected, wherever your travels take you. Remember, it's about humanity, not machinery.

    *Disclaimer: The title and description for this video were created with the assistance of AI to ensure comprehensive and engaging content.*

    #TravelTech #SafeTravel #DigitalNomad #TechTips #ConnectedTraveler #CyberSecurity #DataProtection #TravelHacks #SmartTravel #TechSavvy #SecureJourney #InfoSec

    Relevant Keywords: Traveling with technology, staying connected, device security, travel tips, cybersecurity, data protection, tech-savvy traveler, digital safety, smart travel hacks, online security, tech travel guide, secure travel

  • Set sail on the 'Social Seas' and embark on a journey to secure your online presence. Presented live on a cruise ship, this session steers you through the turbulent waters of social media, highlighting the importance of vigilance against scams and hackers. Discover how to enjoy the fun and connectivity of platforms like Facebook, Instagram, TikTok, Snapchat, and more, while safeguarding your digital footprint.🌐 **In This Session:**- Identifying the dark side of social media- Practical tips to stay safe and maintain privacy- Techniques to spot and avoid online scams and hackers🛳️ **Cybersecurity Uncensored at Sea:**Amidst the serene backdrop of a voyage from Singapore to Sydney, we delve into the essentials of cybersecurity. Our focus spans Information Security (InfoSec), combating malware, and mitigating ransomware risks. We offer a treasure trove of knowledge through specialized presentations, keynotes, and services such as Ethical Hacking, penetration testing, vulnerability assessments, and compliance reviews for frameworks like ISO 27001 and the ASD/ACSC Essential Eight.📞 **Connect With Us:**For personalized cybersecurity advice or services, please reach out via the contact details provided on this page. Let's chart a course to a safer digital world together.Stay secure and enjoy the voyage of life, both online and off. Remember, it's about humanity, not machinery.*Disclaimer: This title and description were formulated with the assistance of AI to ensure the content is engaging and informative.*#SocialMediaSafety #OnlineScams #CyberAwareness #DigitalSecurity #ScamPrevention #HackerDefense #SafeSocial #CyberAtSea #InfoSec #TechSafety #PrivacyProtection #CyberSecurityAwarenessRelevant Keywords: Social media safety, online scams, hacker awareness, digital security, scam prevention, cybersecurity, privacy protection, safe social networking, information security, technology safety, online privacy, cyber defense strategies.

  • Cyber At Sea Session 1: Information, Access, & Control: What Hackers Want (Anatomy Of A Cyber Attack)

    Streamed live from P&O Cruises Australia's "Pacific Adventure" while sailing between Singapore and Indonesia.Synopsis: Learn the lifecycle of a data breach and how hackers weaponise the data they steal - and that we give away for free - to conduct their nefarious activities. We'll explore the anatomy of a hack and how we can react and respond to meet our digital adversaries at every step of the way.A list of data breaches is available here (referenced in video): https://www.webberinsurance.com.au/data-breaches-list#twentytwo Other links from the video:IDCare: idcare.orgASD / ACSC: cyber.gov.auScamwatch: scamwatch.gov.auCybersecurity Uncensored is my way to provide content and advice on all things cyber security and hacking, with a focus on Information Security (commonly referred to as "InfoSec"), the threats posed by malware (a portmanteau of "Malicious" and "Software", and the increasing risk posed by ransomware. I provide specialised one-on-one presentations, keynotes, and services such as Ethical Hacking (via penetration testing and vulnerability assessments) as well as audit preparedness reviews for frameworks such as ISO 27001 and the ASD/ACSC Essential Eight.Please contact me any time via the contact details on this page.Stay safe out there!Humanity, Not Machinery.DISCLAIMER: I have no business association with any of the companies or products mentioned and am not paid by any of these businesses. Any brands or companies spoken of are for reference purposes only, and may be products I use personally and are my personal preference. Always do your research to work out what is best for your situation.#cybersecurity #infosec #security #tech #ransomware

  • Password managers are essential to help us manage many unique, complex passwords, but are they secure? Have password managers been hacked? How can I secure my password manager? Are there any password managers to be wary of?

    Password managers, like most tools, must be used correctly and must be kept up to date like any software. Examples in this episode include the multiple breaches of LastPass, the software flaw in KeePass, the compromise of Norton LifeLock, and the attempt to phish users of 1Password and BitWarden.

    Fortunately, with a secure master password and multi-factor authentication enabled, using a password manager is your best bet to manage all of your unique, complex passwords.

    Other Videos In This Series:

    This Video: https://youtu.be/JQSCbRO1TdY

    Password Manager 1: https://youtu.be/UlUBuZ0kDd4

    Password Manager 2: https://youtu.be/NoKsW3l_aFc

    Password Episode: https://youtu.be/JSzV2LQIr88

    Stay safe out there.

    #humanitynotmachinery #password #passwords #passwordmanager #nortonlifelock #bitwarden #1password #lastpass #keepass #mfa #multifactorauthentication

  • As we move into the final weeks of the year, many of us are attending the obligatory office Christmas parties. In addition to dealing with the same work hierarchies, power dynamics, and office politics with additional stress and alcohol factored in, we may be exposing our employer to additional risks. Do you trust the staff at the venue? What about the other patrons? How about the partners of colleagues? Even people from other parts of the business may see and hear things they have no business being exposed to, and some of your conversations may even be recorded by accident or on purpose.

    The busiest day of the year for HR may be the day after the company party, but with a bit of thinking, you can keep it from being the busiest day of the year for your cyber team!

    Enjoy, but be mindful of what you share and with whom you're sharing

    Stay safe out there.

    Video Link: https://youtu.be/XsS74pzVzV4

    #humanitynotmachinery #cyberuncensored #cybersecurityuncensored #christmasparty #workparty #workfunction #privacy #confidentiality

  • On November 8, 2023, the entire Optus network crashed, leaving millions of customers and thousands of businesses unable to comminicate or transact on landline, broadband, or mobile services, even impacting emergency services. To some degree, the closure of bank branches and the erosion of in-branch services and a transition to online services and a cashless society contributed to our frustration and presented a real barrier.

    In this video, I provide a few tips that we as individuals as well as businesses can use to try and stay connected and transacting during an outage. These few things can help us no matter which carrier goes down. How did you manage during the Optus outage? Do you have any advice you can share?

    Stay safe out there.

    Video Link: https://youtu.be/xPdWqTq4UwU

    #telecommunications #telco #optus #telstra #vodafone #bank #banking #cash

  • While we're all screaming for blood from Optus (well, really just some bloody compensation) we must ask if we're owed anything, and if so, how much? Who should be compensated and who should only get the bare minimum Optus offers, if anything? How do we determine how much to demand in compensation? And knowing this will happen again, what are some things we as individuals and businesses can do to prepare? Please note this is an opinion piece only and I don't have all the answers, but would love to work with you to figure them out. This also does not touch on the fact how emergency services and healthcare and the like was impacted as I feel that would be best addressed by the authorities.

    Stay safe out there!

    Video Link: https://youtu.be/BEHhUvSyxJQ

    #humanitynotmachinery #optus #telco #telecommunications #systemfailure #systemoutage #Cybersecurity #Cybercrime #Phishing #SocialEngineering #Security #Education #Awareness #Hacker #DataBreach #Exploit #Compromise #IncidentManagement #IncidentResponse #Malware #Ransomware #Cryptolocker #Cloudsecurity #Deepfake #VoiceCloning #AI #Hacking #Password #MFA #NetworkSecurity #Privacy #SocialMedia #technology #infosec #ethicalhacking #tech #cyber #hackers #informationsecurity #cyberattack #cybersecurityawareness #datasecurity #dataprotection #hack #it #computerscience #pentesting #informationtechnology #business #cloud

  • Our emotions are weaponised against us. When you are upset and angry, or otherwise stressed, you can be manipulated by cybercriminals into reacting in their favour by clicking links, installing software, and giving away your personal information. The recent Optus outage, followed by the wave of scams seeking to capitalise on your outrage is only the most recent example of how being in am emotional state is used against us. Our education and awareness training for cybersecurity is good, but it lacks a critical element and that's dealing with how humans react and respond to emotional manipulation by cybercriminals. In this video, I provide a few examples and pos a question about how can we improve our security by improving how we train for and react to situations.

    Videos on Information, Access, and Control: https://youtube.com/playlist?list=PL4vhlTTyVuauNqKl3BqO5EWn6Dyj2dEZw&si=26XTvcMra4kkUdOO

    #emotional #manipulation #anger #reaction #optus #Cybersecurity #Cybercrime #Phishing #SocialEngineering #Security #Education #Awareness #Hacker #DataBreach #Exploit #Compromise #IncidentManagement #IncidentResponse #Malware #Ransomware #Cryptolocker #Cloudsecurity #Deepfake #VoiceCloning #AI #Hacking #Password #MFA #NetworkSecurity #Privacy #SocialMedia #technology #infosec #ethicalhacking #tech #cyber #hackers #informationsecurity #cyberattack #cybersecurityawareness #datasecurity #dataprotection #hack #it #computerscience #pentesting #informationtechnology #business #cloud

  • The challenge with managing unique, complex passwords for every account is how to remember them. Coupled with a solid password strategy and multi-factor authentication, a solid password manager can make life so much easier, and WAY more secure.

    This Video: https://youtu.be/NoKsW3l_aFc

    Password Video: https://youtu.be/JSzV2LQIr88

    Password Reuse, Overuse, and Abuse Video: https://youtu.be/ZRaD6KNwnOE

    Credential Stuffing Video: https://youtu.be/NUTawpZY0qY

    #password #passwordmanager #credentials #1password #Cybersecurity #Cybercrime #Phishing #SocialEngineering #Security #Education #Awareness #Hacker #DataBreach #Exploit #Compromise #IncidentManagement #IncidentResponse #Malware #Ransomware #Cryptolocker #Cloudsecurity #Deepfake #VoiceCloning #AI #Hacking #Password #MFA #NetworkSecurity #Privacy #SocialMedia #technology #infosec #ethicalhacking #tech #cyber #hackers #informationsecurity #cyberattack #cybersecurityawareness #datasecurity #dataprotection #hack #it #computerscience #pentesting #informationtechnology #business #cloud

  • When an attacker inserts themselves into a "private" conversation, they can cause all kinds of mayhem. From overhearing confidential information like financial details and passwords, to "replaying" the information to gain access, to "relaying" the information with modifications or even to another attacker, we must be aware of our surreoundings and connections. We never know who or what is watching and listening. Evesdropping attacks, like relay and replay attacks, are still common, even with encryption, and when combined with sophisticated phishing attacks, skilled attackers can gain access to your confidential communications.

    https://youtu.be/qkwai_ScwD0

    #relay #replay #evesdropping #Cybersecurity #Cybercrime #Phishing #SocialEngineering #Security #Education #Awareness #Hacker #DataBreach #Exploit #Compromise #IncidentManagement #IncidentResponse #Malware #Ransomware #Cryptolocker #Cloudsecurity #Deepfake #VoiceCloning #AI #Hacking #Password #MFA #NetworkSecurity #Privacy #SocialMedia #technology #infosec #ethicalhacking #tech #cyber #hackers #informationsecurity #cyberattack #cybersecurityawareness #datasecurity #dataprotection #hack #it #computerscience #pentesting #informationtechnology #business #cloud

  • You have secure, unique, complex passwords and Multi-Factor Authentication enabled. Surely you must be secure! Not so fast! Cybercriminals are evolving and finding ways around our defences and a lot require tricking us using new twists and combinations of old-school attacks. Combining phishing with adversary-in-the-middle techniques, cybercriminals are skilled at tricking us out of our login credentials and even our MFA codes. In this video, we share a bit about how these work and give some tips on what can be done.

    Video Link: https://youtu.be/3PnhEyukK88

    #Cybersecurity #Cybercrime #Phishing #SocialEngineering #Security #Education #Awareness #Hacker #DataBreach #Exploit #Compromise #IncidentManagement #IncidentResponse #Malware #Ransomware #Cryptolocker #Cloudsecurity #Deepfake #VoiceCloning #AI #Hacking #Password #MFA #NetworkSecurity #Privacy #SocialMedia #technology #infosec #ethicalhacking #tech #cyber #hackers #informationsecurity #cyberattack #cybersecurityawareness #datasecurity #dataprotection #hack #it #computerscience #pentesting #informationtechnology #business #cloud

  • Passwords are the keys to our kingdoms, so wy are we so bad at managing them? Excessive use of the same password across accounts opens us up to credential stuffing where one breach can equal everything breached. We use weak passwords that are easily guessable and easily crackable. We share passwords in plain sight on sticky notes, insecure files, and sent via email and text, often together. In this video, I offer up my view of passwords and what we can do to make them secure and manageable.

    Video Link: https://youtu.be/JSzV2LQIr88

    #Cybersecurity #Cybercrime #Phishing #SocialEngineering #Security #Education #Awareness #Hacker #DataBreach #Exploit #Compromise #IncidentManagement #IncidentResponse #Malware #Ransomware #Cryptolocker #Cloudsecurity #Deepfake #VoiceCloning #AI #Hacking #Password #MFA #NetworkSecurity #Privacy #SocialMedia #technology #infosec #ethicalhacking #tech #cyber #hackers #informationsecurity #cyberattack #cybersecurityawareness #datasecurity #dataprotection #hack #it #computerscience #pentesting #informationtechnology #business #cloud

  • We all do it even though we know we shouldn't! Password reuse can get us into a ton of trouble in a hurry no matter how good the password is. If we use the same password everywhere, from work, school, and home, and on every account we own, a criminal only needs to compromise one account to gain access to every account. Valid credentials, used everywhere by criminals, is Credential Stuffing. In this video, I discuss what password use is, why it's bad, and what you can go to stay safe online.

    Video Link: https://youtu.be/ZRaD6KNwnOE

    Credential Stuffing Video: https://youtu.be/NUTawpZY0qY

    Phishing Video Playlist:https://www.youtube.com/playlist?list=PL4vhlTTyVuavzWRsEvoFNirg8NDf8ogcx

    Have I Been Pwned: https://haveibeenpwned.com/

    #password #passwords #passwordreuse #passwordabuse #login #credentials #Cybersecurity #Cybercrime #Phishing #SocialEngineering #Security #Education #Awareness #Hacker #DataBreach #Exploit #Compromise #IncidentManagement #IncidentResponse #Malware #Ransomware #Cryptolocker #Cloudsecurity #Deepfake #VoiceCloning #AI #Hacking #Password #MFA #NetworkSecurity #Privacy #SocialMedia #technology #infosec #ethicalhacking #tech #cyber #hackers #informationsecurity #cyberattack #cybersecurityawareness #datasecurity #dataprotection #hack #it #computerscience #pentesting #informationtechnology #business #cloud

  • Merry Scam-mas! The holidays are just around the corner, and so is the inevitable tsunami of criminal activity looking to take advantage of your goodwill, kindness, and generous nature. In reality, criminals are scouring the internet for every bit of information they can to exploit you and your desperation for the perfect holiday. From the must-have hot-ticket items, to the need to travel, to the lonely among us, criminals are looking to exploit us with phishing, spambots, FOMOScamming, and more, hoping to catch you in a moment of weakness. In this episode of Cybersecurity Uncensore, I take a look at some holiday scams, and make you aware these happen year round for any special occasion, and some tips on what to do. Stay safe out there!

    Video Link: https://youtu.be/8FKgjzJXuYM

    #spambots #fomoscamming #cyberuncensored #humanitynotmachinery #Cybersecurity #Cybercrime #Phishing #SocialEngineering #Security #Education #Awareness #Hacker #DataBreach #Exploit #Compromise #IncidentManagement #IncidentResponse #Malware #Ransomware #Cryptolocker #Cloudsecurity #Deepfake #VoiceCloning #AI #Hacking #Password #MFA #NetworkSecurity #Privacy #SocialMedia #technology #infosec #ethicalhacking #tech #cyber #hackers #informationsecurity #cyberattack #cybersecurityawareness #datasecurity #dataprotection #hack #it #computerscience #pentesting #informationtechnology #business #cloud