Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Demystifying the Ransomware and IoT Threat

LASCON via YouTube

Overview

Explore the intricacies of ransomware attacks and IoT-based DDoS threats in this comprehensive LASCON conference talk. Delve into the stages of ransomware attacks, including deployment, installation, encryption, payment, and decryption methods. Gain insights into IoT-based DDoS attacks, examining the breakdown of IoT malware and its potential for future exploitation. Learn about analysis techniques for handling each stage of these cyber threats. Discover the alarming possibility of combined ransomware and IoT attacks becoming a major future security concern. Investigate specific topics such as HDA files, social media tactics, SVG files, and the Mirai botnet. Understand the timeline of these threats and acquire practical advice on securing IoT devices and changing passwords to enhance cybersecurity.

Syllabus

Introduction
HDA Files
Alerting
Attackers
The Host
Social Media
SVG
Red Dot
Grandma
What Sam saw
Special price
Try before buy
Downloading the file
Testing the file
Fake sales reports
Words of advice
IRS Scam
Mirai
How does Mirai work
Mirai source code is public
Dying DDoS attack
Timeline
Securing IoT devices
Changing device passwords

Taught by

LASCON

Reviews

Start your review of Demystifying the Ransomware and IoT Threat

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.