- 193
- 167 690
Security and Privacy Academy
Germany
Приєднався 28 гру 2022
Videos about security and privacy: Current events, theory, and history.
Contact: secprivaca@proton.me
Contact: secprivaca@proton.me
The Most Important Cloud Breaches in History
Today's video is about three historic cloud breaches that have impacted how we view Cloud security today. The list is inspired from Cloud Security Weekly, and I suggest you subscribe to their news letter for weekly cloud security news.
Become a member and receive exclusive videos and other advantages:
ua-cam.com/channels/KgGHXziaIZZUIWSAU3DENQ.htmljoin
You can also buy me a coffee here:
buymeacoffee.com/secprivaca
Become a member and receive exclusive videos and other advantages:
ua-cam.com/channels/KgGHXziaIZZUIWSAU3DENQ.htmljoin
You can also buy me a coffee here:
buymeacoffee.com/secprivaca
Переглядів: 8
Відео
Sensitive Data Leaks into Generative AI
Переглядів 1907 годин тому
harmonic Report: www.harmonic.security/resources/from-payrolls-to-patents-the-spectrum-of-data-leaked-into-genai Harmonic looked into chatGPT, Copilot, Gemini, Claude and Perplexity prompts to identify sensitive prompts. Their findings are alarming. Become a member and receive exclusive videos and other advantages: ua-cam.com/channels/KgGHXziaIZZUIWSAU3DENQ.htmljoin You can also buy me a coffee...
Should TikTok Be Banned? The Pros, Cons, and Controversies
Переглядів 4419 годин тому
Today, we dive into one of the most heated debates in tech and politics: should TikTok be banned? Is it a legitimate national security threat, or is it an overreach that compromises free speech? In this video, we’ll unpack the pros and cons, explore allegations of Chinese government influence, and examine what this means for your privacy and freedom. Become a member and receive exclusive videos...
U.S. Treasury Department Cyberattack by Chinese APT Actors
Переглядів 8021 день тому
Become a member and receive exclusive videos and other advantages: ua-cam.com/channels/KgGHXziaIZZUIWSAU3DENQ.htmljoin You can also buy me a coffee here: buymeacoffee.com/secprivaca
Chrome Extensions Hacked: Data Theft and Risks
Переглядів 10828 днів тому
For the article and a complete list of extensions see: thehackernews.com/2024/12/16-chrome-extensions-hacked-exposing.html You can buy me a coffee here: buymeacoffee.com/secprivaca Become a member and receive exclusive videos and other advantages: ua-cam.com/channels/KgGHXziaIZZUIWSAU3DENQ.htmljoin
Deepfake and Synthetic Identity Fraud: The New Face of Cybercrime
Переглядів 78Місяць тому
Imagine a world where anyone’s face or voice can be convincingly imitated-where video evidence can no longer be trusted, and online identities are built from fragments of truth mixed with fiction. This isn’t science fiction; this is our reality today. In this video, we’ll dive into the alarming rise of deepfake technology and synthetic identity fraud, how these two threats intertwine, and what ...
Recent Advances in Quantum Computing and Their Implications for Password Security and Bitcoin
Переглядів 59Місяць тому
Today we’re diving into a cutting-edge topic: quantum computing and its implications for password security and Bitcoin. - Quantum computing has made headlines recently, with Google unveiling its *Willow processor*, a significant leap forward in quantum technology. But what does this mean for your passwords, digital assets, and the cryptography we rely on daily? - Stick around to understand the ...
Understanding Supply Chain Attacks: Basics, Recent Cases, and Prevention Techniques
Переглядів 72Місяць тому
Imagine a single weak link in a supply chain compromising the security of an entire organization. Supply chain attacks are among the most dangerous and stealthy cybersecurity threats today. In this video, we’ll explore the basics of supply chain attacks, examine recent high-profile cases, and share actionable strategies to protect your systems and data. Become a member and receive exclusive vid...
Hamas Hacking Group WRITE Targeting Israel
Переглядів 1722 місяці тому
Today's video is about a hacker group that is affiliated with Hamas, adding another layer to the war in the middle east. The threat actor is called WRITE, and they are typically associated with espionage activities. Become a member and receive exclusive videos and other advantages: ua-cam.com/channels/KgGHXziaIZZUIWSAU3DENQ.htmljoin You can also buy me a coffee here: buymeacoffee.com/secprivaca
European Digital Markets Act (DMA)
Переглядів 922 місяці тому
Today, we're diving into the European Digital Markets Act, or DMA, a landmark regulation from the European Union that aims to reshape how major digital platforms operate in Europe. Become a member and receive exclusive videos and other advantages: ua-cam.com/channels/KgGHXziaIZZUIWSAU3DENQ.htmljoin You can also buy me a coffee here: buymeacoffee.com/secprivaca
Privacy Issues in Smart Homes: What Devices Know About You
Переглядів 672 місяці тому
Today, we’re talking about smart homes and explore the privacy risks these devices pose. From your smart speakers to connected thermostats, our homes are filled with devices that know more about us than we may realize Become a member and receive exclusive videos and other advantages: ua-cam.com/channels/KgGHXziaIZZUIWSAU3DENQ.htmljoin You can also buy me a coffee here: buymeacoffee.com/secprivaca
Privacy Risks in Everyday Technology: What You Need to Know
Переглядів 2803 місяці тому
Today, we’ll explore privacy risks tied to the tech we use daily. With the rise of devices like smartphones and smart home gadgets, our lives are more connected-and vulnerable-than ever. We’ll discuss how data collection, facial recognition, smart devices, and legislative gaps impact your privacy. Become a member and receive exclusive videos and other advantages: ua-cam.com/channels/KgGHXziaIZZ...
Iranian Cyber Actors' Attack on Critical Infrastructure
Переглядів 533 місяці тому
Today, we're diving into a significant cybersecurity incident involving Iranian cyber actors and their recent attacks on critical infrastructure sectors. Let's break down what happened, what went wrong, and what can be done to prevent such attacks in the future. Become a member and receive exclusive videos and other advantages: ua-cam.com/channels/KgGHXziaIZZUIWSAU3DENQ.htmljoin You can also bu...
GDPR and Privacy by Design - Compliance and Common Pitfalls
Переглядів 713 місяці тому
Today, we’re diving into the General Data Protection Regulation, or GDPR, and the concept of Privacy by Design (PbD). These principles are vital for businesses in ensuring data protection and compliance. We’ll also highlight some common pitfalls organizations fall into when navigating these complex requirements. Become a member and receive exclusive videos and other advantages: ua-cam.com/chann...
Psychology of Security - The Human in the Loop
Переглядів 563 місяці тому
Today we talk about an important often overlooked factor in security: The human in the loop. We cover Ryan Wests' Paper "Psychology of Security" as well as Tversky and Kahneman's "Rational Choice and the Framing of Decisions". Become a member and receive exclusive videos and other advantages: ua-cam.com/channels/KgGHXziaIZZUIWSAU3DENQ.htmljoin You can also buy me a coffee here: buymeacoffee.com...
Cybersecurity Awareness: The Human Element in Security Protocols
Переглядів 614 місяці тому
Cybersecurity Awareness: The Human Element in Security Protocols
How To Keep Your Children Safe Online
Переглядів 294 місяці тому
How To Keep Your Children Safe Online
EU fines Google and Apple $2.7 Billion and $14 Billion, respectively.
Переглядів 2814 місяці тому
EU fines Google and Apple $2.7 Billion and $14 Billion, respectively.
How Researchers Used SQL Injections to Bypass the TSA
Переглядів 1034 місяці тому
How Researchers Used SQL Injections to Bypass the TSA
Understanding the European AI Act: What It Means for AI Developers and Businesses
Переглядів 674 місяці тому
Understanding the European AI Act: What It Means for AI Developers and Businesses
Deep Dive into Dark Web Marketplaces: What Really Happens There?
Переглядів 795 місяців тому
Deep Dive into Dark Web Marketplaces: What Really Happens There?
Top 8 Cybersecurity Tools You Should Know
Переглядів 685 місяців тому
Top 8 Cybersecurity Tools You Should Know
The Ultimate Guide to Messenger Privacy and Security
Переглядів 1625 місяців тому
The Ultimate Guide to Messenger Privacy and Security
Great discussion points, good video. This is certainly a much wider issue across so many platforms and the power they have gained
Indeed. Zuboff wrote a great book about it some years ago: ua-cam.com/video/ypqifxBcGMs/v-deo.html
get a better microphone. good video tho
The audio improved on my more recent videos, I hope
Hey i have a vpn have i2p name is invisible pro.🎉
Thank you ! Very useful
thanks for the video, very helpful
i swear to god i dont understand anything anymore , i have an gigantic confusion why we have this, why we have hex , why we have utf , tf is all these about ? you said to be used by protocols that can process plain text , tf is that meaning ? computers process only binary numbers so whats all this dude
Computers process 0 and 1, i.e., power on and off. Protocols process whatever they are designed to process. In the case of MIME (e-mail protocol) it can only process plain text, hence, images or other attachments have to be coded into some kind of textual representation. Base64 is just a very convenient way to do so and is now established.
SkyNet is online. 😁
Not yet
Went completely over my head.
It's a bit of a complicated concept. Can you elaborate which parts you didn't understand?
So is this CAPTCHA and those boards of images that you are meant to click on? Is that the challenge in the challenge/response?
No. These are just to detect bots.
Question, can't we still uniquely identify these individuals at 2:57 based on disease? since every disease is unique?
Yes, but the point is that you don't know who these individuals are. You are touching on an important point though and that is the non-diversity of the diseases. This has been solved somewhat using L-diversity. See my video about it here: ua-cam.com/video/GNhb3PcmjmA/v-deo.htmlsi=0Z4hb33aSwypwPzt
Straight to the point. ❤
Clearly explained! Well done!
understood!
Well explained, if we just knew 🫠
Man, great video, love it
thank you for the overview of DMA. I think investments into european education, innovation, communication, and business infrastructure would be a better future direction, rather than regulation. Big tech has the resources to overcome these regulations in the end, but heavy regulation can make the difference between a small business or freelancer just not even trying to innovate in the first place. I hope I'm wrong.
It's the usual problem with the EU. Reasonable ideas but only time will tell whether the regulations will actually solve any problems. They usually make everything more complicated and the fact that almost no innovation happens within the EU is a telling sign.
Thanks. I prefer Threma but nobody wants to pay them... Im sick of others usuals social medias that people dont know about privacy and you have to download them for everything...
I personally use Signal. What do you think of Europe's DMA which forces messengers to be interoperable between one another? As far as I know, the secure messengers themselves (Threema, Signal) do not like it.
@SecPrivAca me either. But everybody use other this social medias that arent sechre and you are obligate to download them because they dont use this apps
great explanation!
thank you!
Great video!
Glad, you liked it!
Awesome job on these vids! Only just found this channel, well done 👏🏼 I’ll be checking out any other videos you have! 👍🏼
Great! Thanks for watching and I'm glad you like my videos!
I really liked your videos and had a high opinion of you, this video kinda changed it... Apple paid close to zero corporate tax in the EU while making huge profits, thats just not fair. There is a wiki article which many details: en.wikipedia.org/wiki/Apple's_EU_tax_dispute
Taxation in Europe is a joke, IMO. But I guess we just disagree on this fact. Thanks for watching my videos anyways!
@@SecPrivAca IMO too, thats why all the big corps pay almost no taxes while the workers do...
@@Vipaldi I think both (workers and corporations) pay too much
Great explanation! Clear and easy to understand!
Thanks for the detailed look at GDPR and PbD. Are small business treated differently by the regulation? If not, I think that leads to less innovation, as the legislative burden is too high.
The burden is indeed very high, and there are some exemptions. If the company is small and the processing of personal information does not pose a risk than they are exempt from some of the regulations. But as soon as you have any medical data, for example, the law will affect you. That was also a huge point of contagion between small businesses and the EU. Of course the law targets primarily Apple, Google and the like; however, one of the many unintended consequences of the GDPR is that it is a huge burden on small businesses as well, unfortunately.
This was a great overview of current privacy issues, thank you. What do you think is the most effective approach to educate the public about privacy?
I think that awareness is heightened if there is a big news cycle about an incident and then informational videos on UA-cam or other social media can make a big impact. We saw this during the Recall-mess. Other than that I'm afraid we have not yet found a practical way to spread awareness. Daniel Solove creates child-friendly comics to instill privacy-awareness from a young age; I think this is a great way. teachprivacy.com/the-eyemonger-my-new-childrens-book-about-privacy/
Thank you for the video. Can you please explain "add salary and noise values" result. The salary for gastritis was 5k, noise value in the table is -6. How did you get 3k(2.37 timestamp). Thank you!
Before applying the noise 3K is the minimal salary in the table. Therefore, when you apply the noise, you do not go below that if doing so would break the analysis. In the case of Gastritis, it would be -1k which is obvious nonsense and not a valid salary and therefore would break any kind of statistical analysis.
First of all, thank you for creating this presentation! I had a question: In step#6, for encryption, when choosing sets of random elements of the public key K (in this example, for (bits==0), K[1] and K[3], and for (bits==1), K[1] and K[2]), are the choices of sets known *publicly* also? In other words, is that selection known to everybody? It just seems confusing to me because it seems like if an adversary knew which sets were chosen, he could deduce what the original plaintext was from the resulting tuples, so I feel like I'm missing an important concept here. Thanks again!
Hello! Great question and I should have clarified this in the video. The choices are NOT public. You are completely right and the encryption scheme would fail if it was.
thank you for the comprehensive overview.
Cheers!
I think of phishing more a branch of social engineering than another subject.
Yes, in my video on social engineering, I focus more on Cialdini's book. That's why I separate them in this video.
Very informative. But the audio on this video is really weird. Some pretty odd stereo stuff going on here. Anyways, thank you.
Thanks for the info. I hope the audio on my later videos is better.
ChatGpt has an app for download in Playstore by OpenAi released on 28 Jul 2023. It should be the genuine one. Its free to use but with an option to a paid subscription
both of them should write on same level but only Bell-LaPadula can read down ? did i get it right
Correct.
Why should they bother with europe? Cause they have a monopoly, can charge prices like they want and these fines are a drop in the bucket to these tech giants. Europe is for example almost one third of Googles revenue.
We'll see. I think Asia will overtake Europe in the near future
This was helpful - i dont like the Biba model 😢
BIBA has very limited applicability.
thx for the explanation
you are a legend
Prepared Statements were covered in a book (by Tim Bunce) in early 2000. Lame devs still fielding injection seem not to have read a book in over 20 years. I don't even think you'd fix CASS by taking away the sandwich.
It is really the easiest vulnerability to find and fix..
@@SecPrivAca en.wikipedia.org/wiki/Cass_Elliot "Elliot did not die from choking on a ham sandwich."
@@PMA65537 Indeed, injecting has always been very common
Do you have the script
Nope
I've more confidence of faults and backdoors being found in actual metal hardware. Obviously cost of changing keys features there. (Aware these may be bad too, see lockpickinglawyer among others.)
Funny choices in some ways ... Splunk is a data management tool not specific to security. Nothing was included for host-based vulnerability detection (which can catch a lot of stuff not known to network scans). Nothing on automating software updates. Nothing on backup and recovery. Nothing on improved access control approaching POLA. Nothing on reverse engineering (or is there some of that in Metasploit?). Nothing on filtering mail and web (except if Snort covers some of that?). I think it would have been better to outline some security roles first and then list the tools helpful in each role.
Run Kali Linux as a virtual machine on top of virtualbox
That's what I do
You are a legend!
wonder if Putin was extra nice with their spies because he remembered his good ol' days
New targets already planned
Can this attack be prevented by enabling dhcp snooping on the network? (Of course if it’s just a random public network, a user cannot manage that but still curious if dhcp snooping can stop this)
I think you are spot-on. This probably would prevent this attack, as untrusted DHCP servers can not interfere.
DSA IS Big huge SHIT !!! For Germany And EU !
My right ear gig not get it.
Sorry for the audio issues
The Trojan horse is not mentioned in the Iliad, as the Iliad finishes before anyone even thinks of building the horse.
Indeed, the quote is from Aeneid. My bad.
Your videos are outstanding. I recently completed that specific playlist and found it extremely valuable. I would love to see more content on the t-closeness methodology and an in-depth discussion on the Privacy Budget in your Differential Privacy video. Another fascinating topic for a future video could be Record Linkage. I am a researcher and currently, I have started working with Data Anonymization Techniques, your videos are really helpful. Please continue the excellent work you’re doing. I would be delighted to buy you a coffee in appreciation (I've seen this option available on UA-cam) Looking forward to your next video!
Thank you for your kind words. Based on your suggestion I opend a buymeacoffee account: buymeacoffee.com/secprivaca I will look into the topics you suggested!
Anything about xmpp + omemo ?
Looks interesting. I will definitely look into it.
@@SecPrivAca would be good to see your opinion .
In this video one understands why naming variables seems to be one of the most complicated things to do in programming :) ... qis, si, mid, ranks, partition ... OMG .. really?
Probably should have used better names for a tutorial :D
@@SecPrivAca Not only for tutorials. Your code might survive you and is part of your heritage.