Social Engineering Principles
Most hackers are very socially aware. They’re very good at manipulating conversations and talking to people to get them to reveal information. Many stereotypes depict…
Most hackers are very socially aware. They’re very good at manipulating conversations and talking to people to get them to reveal information. Many stereotypes depict…
We’re going to talk about a very important security technique, backups. There are many different types of attacks used by hackers that can infect your…
Spyware is any type of malware that is used to record or monitor user activities. This can include browsing activities, mouse movement, executed programs, and…
A Trojan is named after the Trojan horse, which was a stratagem used in an ancient war between Greece and Troy. The Greeks were unsuccessful…
Ransomware is a type of malware that encrypts a victim’s data and then displays a ransom message to the victim demanding payment in exchange for…
The CompTIA Security+ exam is CompTIA’s flagship certification. The certification is updated about every three years. Each iteration is numbered according to a series: SY0-301,…
In today’s study session, we delve into three different cloud threat reports that cover 2020. With the pandemic, companies have been forced to support more…
These videos are part of our brand new WordPress Security Course, on sale now!
A worm is a form of self replicating malware. Worms will replicate themselves and send copies across a network. Worms employ a wide variety of…
CompTIA Security+ Study Session 18 November 2020 Malware is malicious software that executes unwanted actions. Depending on the hacker’s goal, malware can perform many different…