Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Behind Enemy Lines

Hack In The Box Security Conference via YouTube

Overview

Explore the evolving landscape of online threats in this 58-minute conference talk from the Hack In The Box Security Conference. Delve into the world of cybercrime as Mikko Hypponen, Chief Research Officer for F-Secure, categorizes attackers into three main groups: criminals, hacktivists, and nation-states. Gain insights into their motivations and future trajectories. Examine real-world examples of cyber attacks, including DNS Changer, ransomware, and banking trojans. Investigate government-sponsored attacks, advanced persistent threats (APTs), and high-profile cases like Stuxnet and Flame. Learn about the intersection of cybersecurity with law enforcement, military action, and critical infrastructure protection. Understand the complexities of modern digital threats and the ongoing battle to secure the online world.

Syllabus

Intro
Why would anyone do this
What would be the motive
Attacks
FSecure
Criminals
Activists
Cyber terrorism
Criminal activity
DNS Changer
Russian TV Clip
Kvapil
Web
Blackhole
Java
Criminal ads
New features
Ransom Trojans
Biggest cases
Ring Zero
Brazil
Crosssite request forgery
Banking Trojans
Banking Trojan Manual
Nikolas
Government Attacks
Police Trojans
APTs
Military action
Atomic energy
Iran
Stuxnet
Flame
Microsoft
Zeus
James Bond

Taught by

Hack In The Box Security Conference

Reviews

Start your review of Behind Enemy Lines

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.