2.1 Introduction - UA

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
2 hours 25 minutes
Difficulty
Beginner
CEU/CPE
3
Video Transcription
00:00
and last year's of videos. We saw what USB drop tax are and why they were so effective.
00:05
And these series of videos will be digging a little deeper and seeing what different types of us be. Drop tax There are.
00:12
So first we'll look at the USB human interface device moving attack these air devices that emulate keyboards. The second type attack is a malicious file slash code attack, and these thieves use everyday flash drives.
00:27
Next, we'll be looking at social sharing link attack, and these can use every day flash drives or
00:32
H i D devices. So we'll take a look. That one, uh, the next one will be us be killed devices these air rather nasty on. I'll show you why in a moment
00:43
the last one is thes zero day attack that uses zero day vulnerabilities already, So let's get into it.
Up Next