Follow Mark on LinkedIn Follow @marknca on Twitter Follow marknca on YouTube
marknca

Mornings With Mark
no. // 0 0 0 1

Cybersecurity Basics #6 - Malware

Subscribe to the podcast.

Watch the episode here

Join the discussion on LinkedIn

Tweet about this episode

Full machine generated transcript follows

Good morning, everybody. How you doing today with another episode This Time Again talking about cyber security basics for moving into a little more of what security until episode 6 of the basics could start talking about something that most people think are associated with cybersecurity and I think these theoretical ways of reaching systems spend too much time talking about software now we started using the name 15 years ago.

One is experiments found and it was a design to see how systems between systems in the eighties and early nineties assistant started to be more connected because if you can remember for the internet if you wanted to share software, you physically had to give somebody a floppy disk floppy disk and they had to go to their system and install it and we started calling on software that affected other computer viruses now virus affect the computer when a certain program was executed if you tried to install that tired of game and yes, it started with a lot of pirated software way back actually surprising that there was a virus program on that saw on that disk found there wasn't so much.

Cybercrime Enterprise, but it wasn't long before criminals figure this out. Especially as computers got connected. So now I called self propagate. It will start to push itself to other systems or a virus had to be installed or run from my appointed infection on every machine wears a kind of figures itself and it warms its way through a network of connected computers right makes total sense.

But since then we started some different types of malware pop-up North Bernard viruses are viruses or viral really depends on the computer mice in computer. Hardware software is designed to spy on your activities. This is normally disguised, Oregon. We actually two marketing campaigns and sort of the of the intention was either of force copyright or its software that pushes ads down to you non-stop, of course in 2016, 2015.

We start to see the rise of ransomware malicious software malware that infects your computer and encrypt your data. It locks you out of your own data and it tries to sell you back the key in I just talked to these you're going to have to pay me three to $600 and you shouldn't be paying cybercriminals MN encouraging them because this is a profit-driven visit but ransomware is another one of the malware family has a lot of different types of it than where we seen you types all the time.

We see a cybercriminals i me to work on things called exploit them generate new take advantage of vulnerabilities. There's a whole host of them and wild groups tell you something as a Defender as I'm concerned I 2 user the malware's malicious software. It's designed to do something that you don't want it to do.

So, that's the term hours that make sense. You let me know hit me up on the comments down below. Toys are for podcast listeners, and for everybody else. You can hit me up on email me at Market. What's your favorite sub suffix example that you would kind of dawn on you that I was a real big problem.

That was Slammer. Maybe that was the Morris worm way back. When is a different interesting historical fact that it took 6 episodes of basic stackolee start to get onto the stuff that most people think is the coolest and let me know. I hope you're set up for fantastic day.

I am off for the next few days. I'm back on 2018. Enjoy your I hope you will talk to me soon because they have a fantastic weekend and we'll see you next week. Good morning, everybody. How you doing today with another episode This Time Again talking about cyber security basics for moving into a little more of what security until episode 6 of the basics could start talking about something that most people think are associated with cybersecurity and I think these theoretical ways of reaching systems spend too much time talking about software now we started using the name 15 years ago.

One is experiments found and it was a design to see how systems between systems in the eighties and early nineties assistant started to be more connected because if you can remember for the internet if you wanted to share software, you physically had to give somebody a floppy disk floppy disk and they had to go to their system and install it and we started calling on software that affected other computer viruses now virus affect the computer when a certain program was executed if you tried to install that tired of game and yes, it started with a lot of pirated software way back actually surprising that there was a virus program on that saw on that disk found there wasn't so much.

Cybercrime Enterprise, but it wasn't long before criminals figure this out. Especially as computers got connected. So now I called self propagate. It will start to push itself to other systems or a virus had to be installed or run from my appointed infection on every machine wears a kind of figures itself and it warms its way through a network of connected computers right makes total sense.

But since then we started some different types of malware pop-up North Bernard viruses are viruses or viral really depends on the computer mice in computer. Hardware software is designed to spy on your activities. This is normally disguised, Oregon. We actually two marketing campaigns and sort of the of the intention was either of force copyright or its software that pushes ads down to you non-stop, of course in 2016, 2015.

We start to see the rise of ransomware malicious software malware that infects your computer and encrypt your data. It locks you out of your own data and it tries to sell you back the key in I just talked to these you're going to have to pay me three to $600 and you shouldn't be paying cybercriminals MN encouraging them because this is a profit-driven visit but ransomware is another one of the malware family has a lot of different types of it than where we seen you types all the time.

We see a cybercriminals i me to work on things called exploit them generate new take advantage of vulnerabilities. There's a whole host of them and wild groups tell you something as a Defender as I'm concerned I 2 user the malware's malicious software. It's designed to do something that you don't want it to do.

So, that's the term hours that make sense. You let me know hit me up on the comments down below. Toys are for podcast listeners, and for everybody else. You can hit me up on email me at Market. What's your favorite sub suffix example that you would kind of dawn on you that I was a real big problem.

That was Slammer. Maybe that was the Morris worm way back. When is a different interesting historical fact that it took 6 episodes of basic stackolee start to get onto the stuff that most people think is the coolest and let me know. I hope you're set up for fantastic day.

I am off for the next few days. I'm back on 2018. Enjoy your I hope you will talk to me soon because they have a fantastic weekend and we'll see you next week.