Nowyoudon't havetobe a programmingnerdorah, computergeektobeabletohackintosomeone's computer.
Now a personwithminimalcomputerknowledgecancarryoutmajorcybercrimeusingtheseexploitkids.
So I thinkit's veryimportantthatweknowaboutthesekids, whattechnologytheyusetobypassyourtraditionalsecuritymechanismandalsowhatstepswecantaketosaveguardovercomputersfromtheseattacks.
Sonowyouhave a legitimatedomainwithmalicioussubduemeans, whichisprettydifficulttoidentifybyregularSecurityService's andanglerhasknowntousethousandsoff.
Thesesubduemeansnow.
Onceanglerhassuccessfullycompromised a computer, itcanbeconfiguredtodomanythings.
Forexample, itcouldinstall a ransomwaretoyourcomputer, scriptingallyourdataandthendemanding a ransomtogiveyouthedecryptionkey.
Itcouldinstall a bankingmalvotocollectyourfinancialinformation, likecreditcardinformationoronlinebankingpassword.
Now, apartfromhaving a goodantivirusandkeepingitupdatedandhaving a fireball, themostimportantstepistoupdateorpatchyoursystem.
Immediatelyofanyvulnerabilityisdiscovered, and a passionforitisavailable.
AngerexploitKithasknowntoexploitvulnerabilitieshoursafterit's discoveredandthedevelopersoffthesekidsareawarethatusersusuallypatchedthesystemweeklyormonthly, soalwayskeepyoursystemuptodate, andyoucanalsoinstall a scriptblockerPluginforyourWebbrowsersothatyougetquickinformationonallthescriptsthatarerunninginthebackgroundwhenyouvisit a websiteandblockanyscriptifyouwantto.
Allright, sothatwasallfortoday, guys.
I justwantedtodo a videoonthistopicbecause I thinkthesecurityofficer, ithasbecome a hugeconcernnowthatitisevermoreeasyforsomeonetobuytheseadvancekitandcarryoutcybercrime.