Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
This Play by Play will explore "the Internet of vulnerabilities", that is to draw awareness to how fundamentally flawed much of the Internet is.
We're seeing a lot of attacks against large online assets that are being successfully executed by very under-skilled adversaries, very often children. Much of the reason behind this is due to very low-hanging vulnerabilities that are easily exploited combined with a prevalence of tools that make it a simple task for anyone with a bit of curiosity. In this Play by Play, you'll explore "the Internet of vulnerabilities", that is to draw awareness to how fundamentally flawed much of the Internet is.
We're seeing a lot of attacks against large online assets that are being successfully executed by very under-skilled adversaries, very often children. Much of the reason behind this is due to very low-hanging vulnerabilities that are easily exploited combined with a prevalence of tools that make it a simple task for anyone with a bit of curiosity. In this Play by Play, you'll explore "the Internet of vulnerabilities", that is to draw awareness to how fundamentally flawed much of the Internet is.