3 hours 35 minutes
Hello and welcome to P C Security Intermediate course.
And this lesson. I will continue talking about
some of the deck collectors that are used when people are attacking PC's. So you have heard in the previous lesson about fishing and how phishing mail can contain linked to militias pages. So
in the email clients, you can disable HTML reading so that you view your emails in just them
a plain text format, which prevents the malicious code that is inserted in the body of the email message to be executed. However, when you're browsing the Internet, everything is HTML and you cannot disable it. So
you have seen in green the list
off. Just a small portion of the list of direct recording and documented documented the malicious sites.
Um, and you have to just go to any of these sides to infect your PC. That's it.
if you are asking yourself, why cannot these sites be taken off the Internet? Well, it's a complicated thing, and nobody is bothering because they will just pop up under another name.
and it's ah, it's not happening. We just have to live with it and avoid thes addresses.
So the next tech, the tech director is to programs because programs can contain malware. So if you're using a legitimate program to install viewfin installing legitimate program, for example, like Microsoft Office Package on your PC, there is a fair
chance that it's not infected by any Mauer.
At least it has never happened before. However, if you download the installation from
online by using Torrent client,
then there is no guarantee that what you're downloading is not infected. And as a matter of fact, my personal experience tells me that
maybe more than 1/3 off everything, all the content that is being diluted by Tauron clients is
infected with something. If nothing else, then maybe some
simple adware or something like that.
the second way that you can get infected software or program on your PC is through updates off legitimate, softer that sits on that store so you can have ah application that sits on a appstore.
And if it's an app, store off the manufacturer operating system like play store or
Apple store or
whatever, uh, this dissed or a is the programs there have been checked and double checked by the owner of the store, so there
very likely. Okay.
However, sometimes the update off that software is not going through the process of being wetted by the owner of the store. And unlike the installation of Softer in which you go to the store and the world content, the
update is being done
by your PC connecting directly to the
owner off the software,
and in that case it can be
compromised. It can be intentionally compromised. And we had cases in the past that this waas something that was happening, but mostly for mobile phones. But today you can. You
you can find these things happening even when it's not intentional. So somebody has managed to
compromise the company that is making the softer and insert some kind of malware in their updates.
You know, many ways to do it in one of the example is something that is called supplying chain attack,
and the most famous one is non petty attack that happened in Ukraine
a few years ago.
Basically, the hacking group that did this attack infiltrated the company that was making accounting software for that was used by most of government agencies in Ukraine,
and they have managed to insert non PETA Moloch wear in them.
The update of the softer and because everybody and this is this was also government owned company. So everybody had the full trust in what's coming from them.
They didn't have that
good security. So these people managed to infiltrate, Insert the Melber,
and the aftermath was that more than 60,000 PC's were infected and virtually rendered useless within a little bit over two hours, so the entire network went down. It even managed to spread outside the government sector in Ukraine and hid some
companies in other countries that we're doing business with these
entities in your crane.
So this is about programs. And now let's talk about the operating systems by themselves.
So we have been witness in years before
or or a couple of firm. That's a last 10 years that there have been flow after flow security flow in all off operating systems that are used today on PC. So both in Windows both in Mac OS X, A built Lennox,
and you can go online and find these lists, and they're huge. In just one year, there is always over 10 or 20
on the security flaws But does it mean it means that if somebody has managed to exploit security floor that that security flow before operating system manufacturer has managed to patch it with the operating system update, then they can use it to
attack your PC's.
And these things were happening on a daily basis, the floors of being discovered there being patched. But it's a game of cat and mouse, essentially.
And the reason
behind this is because first of all, operating systems today are extremely complex. Their list of requirements that is posed upon them in order to do good for the users is huge.
And, of course, Ah, nobody is developing new versions operating system saying Okay, first of all, let's see
is the secure and then implemented. No marketing department goes to the users. They do the survey, they say, Okay, we need these futures, and then programmers get the task off developing these features. And then in the end, it's checked for security, but
So this is all about the tax collectors on the the pieces.
The last was about these exploits of the operating system, and now let's do a short landing check about this lesson, The question is, was technique is used to hide malware in J pic files and potential answers is morphing, compiling or steganography, and the correct answer is
Compiling and morphing have nothing to do with hiding
malware and pictures.
So in this lesson you have learned about some of the attack collectors on PCs, and in the next one, I'm going to do a short review or what are actually the goals off PC security
Intermediate Endpoint Security
In this course, students will learn the importance of endpoint security. The course will ...
3 CEU/CPE Hours Available
Certificate of Completion Offered
Cloud computing test helps to gauge whether the candidate is skilled enough to work as ...