-
adam
at March 11,2016
This was awesome. So many videos talk about how malware works and they almost always devolve into a diatribe on social engineering. This one, at least, showed some investigative techniques that could be useful to the layman watcher. I also was very enlightened by the statistics at the end describing youth computer users who were very good a using technology but had little idea about how it actually worked.
-
tcmahony
at March 16,2016
This is one of the better TED talks I have seen. He really drives home that there are massive amounts of malware out on the internet and that is grossly outpaces the number of internet users. Additionally it was great to see how the speaker wrapped up the video stating if more people did the "basics", we would all be much more secure. And if the attackers depicted in this video did the basics as well when it came to opsec they might not have been caught by this company.
-
mcoates1
at April 11,2016
I remember for one of the lab assignments, we were able to view the GPS location of the photos that we were given. I didn't even see that as a security or privacy issue on social media platforms. This makes me want to reconsider what I post or at least make sure location services are turned off by default on my phone.
-
fpazdzin
at April 17,2016
I didn’t know that a mobile phone sends out all of the previous wireless connections that it has saved. I can see how that could be useful to someone, especially if they are targeting someone specific. They can use the list of wireless connections to track where that person might go or give them a list of open networks that the phone connects to so they can attack that way. This was a very interesting video. The individual is the weakest link when it comes to securing a computer system. Everyone needs to know the basics on how to keep their electronic devices secure.
-
danielm8
at April 19,2016
Wow, everything is traceable. I never knew cellphones leaked wifi information that could tell everything about you. People who feel a need to share everything and give status updates on twitter and Instagram are easily target-able because their daily routine and location are easy to find. As people involved in Computer Forensics, we must know a little bit of everything about computer security.