Won't Get Fooled Again - The Expected Future of IoT Malware and What to Do About It

Won't Get Fooled Again - The Expected Future of IoT Malware and What to Do About It

via YouTube Direct link

Malware Detection Techniques

13 of 24

13 of 24

Malware Detection Techniques

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Won't Get Fooled Again - The Expected Future of IoT Malware and What to Do About It

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Creeper and Reaper (1971)
  3. 3 Brain (1986)
  4. 4 Concept (1995)
  5. 5 Blaster (2003)
  6. 6 Stuxnet (2010)
  7. 7 History of Malware Evasion
  8. 8 Growth of Evasive Malware
  9. 9 Morris Worm (1988)
  10. 10 Polymorphic Viruses (1990's)
  11. 11 Blue Pill (2006) - Joanna Rutkowska
  12. 12 lot Worm (2016) - Ronen, O'Flynn, Shamir, Weingarten
  13. 13 Malware Detection Techniques
  14. 14 Malware Evasion - Static
  15. 15 Malware Evasion - Dynamic
  16. 16 Categories of Motive
  17. 17 Motive: Proof of Concept
  18. 18 Creeper (1971) – Bob Thomas
  19. 19 Motive: Destructive
  20. 20 CIH (1998)
  21. 21 Motive: Profit
  22. 22 Motive: Cyber Operations
  23. 23 Malware and lot
  24. 24 Prediction: Malware will evade anti-malware

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.