Security and Privacy Academy
Security and Privacy Academy
  • 193
  • 167 690
The Most Important Cloud Breaches in History
Today's video is about three historic cloud breaches that have impacted how we view Cloud security today. The list is inspired from Cloud Security Weekly, and I suggest you subscribe to their news letter for weekly cloud security news.
Become a member and receive exclusive videos and other advantages:
ua-cam.com/channels/KgGHXziaIZZUIWSAU3DENQ.htmljoin
You can also buy me a coffee here:
buymeacoffee.com/secprivaca
Переглядів: 8

Відео

Sensitive Data Leaks into Generative AI
Переглядів 1907 годин тому
harmonic Report: www.harmonic.security/resources/from-payrolls-to-patents-the-spectrum-of-data-leaked-into-genai Harmonic looked into chatGPT, Copilot, Gemini, Claude and Perplexity prompts to identify sensitive prompts. Their findings are alarming. Become a member and receive exclusive videos and other advantages: ua-cam.com/channels/KgGHXziaIZZUIWSAU3DENQ.htmljoin You can also buy me a coffee...
Should TikTok Be Banned? The Pros, Cons, and Controversies
Переглядів 4419 годин тому
Today, we dive into one of the most heated debates in tech and politics: should TikTok be banned? Is it a legitimate national security threat, or is it an overreach that compromises free speech? In this video, we’ll unpack the pros and cons, explore allegations of Chinese government influence, and examine what this means for your privacy and freedom. Become a member and receive exclusive videos...
U.S. Treasury Department Cyberattack by Chinese APT Actors
Переглядів 8021 день тому
Become a member and receive exclusive videos and other advantages: ua-cam.com/channels/KgGHXziaIZZUIWSAU3DENQ.htmljoin You can also buy me a coffee here: buymeacoffee.com/secprivaca
Chrome Extensions Hacked: Data Theft and Risks
Переглядів 10828 днів тому
For the article and a complete list of extensions see: thehackernews.com/2024/12/16-chrome-extensions-hacked-exposing.html You can buy me a coffee here: buymeacoffee.com/secprivaca Become a member and receive exclusive videos and other advantages: ua-cam.com/channels/KgGHXziaIZZUIWSAU3DENQ.htmljoin
Deepfake and Synthetic Identity Fraud: The New Face of Cybercrime
Переглядів 78Місяць тому
Imagine a world where anyone’s face or voice can be convincingly imitated-where video evidence can no longer be trusted, and online identities are built from fragments of truth mixed with fiction. This isn’t science fiction; this is our reality today. In this video, we’ll dive into the alarming rise of deepfake technology and synthetic identity fraud, how these two threats intertwine, and what ...
Recent Advances in Quantum Computing and Their Implications for Password Security and Bitcoin
Переглядів 59Місяць тому
Today we’re diving into a cutting-edge topic: quantum computing and its implications for password security and Bitcoin. - Quantum computing has made headlines recently, with Google unveiling its *Willow processor*, a significant leap forward in quantum technology. But what does this mean for your passwords, digital assets, and the cryptography we rely on daily? - Stick around to understand the ...
Understanding Supply Chain Attacks: Basics, Recent Cases, and Prevention Techniques
Переглядів 72Місяць тому
Imagine a single weak link in a supply chain compromising the security of an entire organization. Supply chain attacks are among the most dangerous and stealthy cybersecurity threats today. In this video, we’ll explore the basics of supply chain attacks, examine recent high-profile cases, and share actionable strategies to protect your systems and data. Become a member and receive exclusive vid...
Hamas Hacking Group WRITE Targeting Israel
Переглядів 1722 місяці тому
Today's video is about a hacker group that is affiliated with Hamas, adding another layer to the war in the middle east. The threat actor is called WRITE, and they are typically associated with espionage activities. Become a member and receive exclusive videos and other advantages: ua-cam.com/channels/KgGHXziaIZZUIWSAU3DENQ.htmljoin You can also buy me a coffee here: buymeacoffee.com/secprivaca
European Digital Markets Act (DMA)
Переглядів 922 місяці тому
Today, we're diving into the European Digital Markets Act, or DMA, a landmark regulation from the European Union that aims to reshape how major digital platforms operate in Europe. Become a member and receive exclusive videos and other advantages: ua-cam.com/channels/KgGHXziaIZZUIWSAU3DENQ.htmljoin You can also buy me a coffee here: buymeacoffee.com/secprivaca
Privacy Issues in Smart Homes: What Devices Know About You
Переглядів 672 місяці тому
Today, we’re talking about smart homes and explore the privacy risks these devices pose. From your smart speakers to connected thermostats, our homes are filled with devices that know more about us than we may realize Become a member and receive exclusive videos and other advantages: ua-cam.com/channels/KgGHXziaIZZUIWSAU3DENQ.htmljoin You can also buy me a coffee here: buymeacoffee.com/secprivaca
Privacy Risks in Everyday Technology: What You Need to Know
Переглядів 2803 місяці тому
Today, we’ll explore privacy risks tied to the tech we use daily. With the rise of devices like smartphones and smart home gadgets, our lives are more connected-and vulnerable-than ever. We’ll discuss how data collection, facial recognition, smart devices, and legislative gaps impact your privacy. Become a member and receive exclusive videos and other advantages: ua-cam.com/channels/KgGHXziaIZZ...
Iranian Cyber Actors' Attack on Critical Infrastructure
Переглядів 533 місяці тому
Today, we're diving into a significant cybersecurity incident involving Iranian cyber actors and their recent attacks on critical infrastructure sectors. Let's break down what happened, what went wrong, and what can be done to prevent such attacks in the future. Become a member and receive exclusive videos and other advantages: ua-cam.com/channels/KgGHXziaIZZUIWSAU3DENQ.htmljoin You can also bu...
GDPR and Privacy by Design - Compliance and Common Pitfalls
Переглядів 713 місяці тому
Today, we’re diving into the General Data Protection Regulation, or GDPR, and the concept of Privacy by Design (PbD). These principles are vital for businesses in ensuring data protection and compliance. We’ll also highlight some common pitfalls organizations fall into when navigating these complex requirements. Become a member and receive exclusive videos and other advantages: ua-cam.com/chann...
Psychology of Security - The Human in the Loop
Переглядів 563 місяці тому
Today we talk about an important often overlooked factor in security: The human in the loop. We cover Ryan Wests' Paper "Psychology of Security" as well as Tversky and Kahneman's "Rational Choice and the Framing of Decisions". Become a member and receive exclusive videos and other advantages: ua-cam.com/channels/KgGHXziaIZZUIWSAU3DENQ.htmljoin You can also buy me a coffee here: buymeacoffee.com...
Cybersecurity Awareness: The Human Element in Security Protocols
Переглядів 614 місяці тому
Cybersecurity Awareness: The Human Element in Security Protocols
How To Keep Your Children Safe Online
Переглядів 294 місяці тому
How To Keep Your Children Safe Online
EU fines Google and Apple $2.7 Billion and $14 Billion, respectively.
Переглядів 2814 місяці тому
EU fines Google and Apple $2.7 Billion and $14 Billion, respectively.
How Researchers Used SQL Injections to Bypass the TSA
Переглядів 1034 місяці тому
How Researchers Used SQL Injections to Bypass the TSA
Understanding the European AI Act: What It Means for AI Developers and Businesses
Переглядів 674 місяці тому
Understanding the European AI Act: What It Means for AI Developers and Businesses
Backdoors in Chinese Key Cards
Переглядів 685 місяців тому
Backdoors in Chinese Key Cards
Deep Dive into Dark Web Marketplaces: What Really Happens There?
Переглядів 795 місяців тому
Deep Dive into Dark Web Marketplaces: What Really Happens There?
Top 8 Cybersecurity Tools You Should Know
Переглядів 685 місяців тому
Top 8 Cybersecurity Tools You Should Know
The Ultimate Guide to Messenger Privacy and Security
Переглядів 1625 місяців тому
The Ultimate Guide to Messenger Privacy and Security
Cyber Security News - Week 32, 2024
Переглядів 755 місяців тому
Cyber Security News - Week 32, 2024
Cyber Security News - Week 31, 2024
Переглядів 545 місяців тому
Cyber Security News - Week 31, 2024
Record Linkage Explained
Переглядів 3546 місяців тому
Record Linkage Explained
Cyber Security News - Week 30, 2024
Переглядів 306 місяців тому
Cyber Security News - Week 30, 2024
Cyber Security News - Week 29, 2024
Переглядів 226 місяців тому
Cyber Security News - Week 29, 2024
Cyber Security News - Week 28, 2024
Переглядів 436 місяців тому
Cyber Security News - Week 28, 2024

КОМЕНТАРІ

  • @whitewolf7127
    @whitewolf7127 7 днів тому

    Great discussion points, good video. This is certainly a much wider issue across so many platforms and the power they have gained

    • @SecPrivAca
      @SecPrivAca 7 днів тому

      Indeed. Zuboff wrote a great book about it some years ago: ua-cam.com/video/ypqifxBcGMs/v-deo.html

  • @theratcometh9866
    @theratcometh9866 11 днів тому

    get a better microphone. good video tho

    • @SecPrivAca
      @SecPrivAca 10 днів тому

      The audio improved on my more recent videos, I hope

  • @carlalfarro6105
    @carlalfarro6105 19 днів тому

    Hey i have a vpn have i2p name is invisible pro.🎉

  • @noahvanhorenbeke2761
    @noahvanhorenbeke2761 20 днів тому

    Thank you ! Very useful

  • @lifelover69
    @lifelover69 21 день тому

    thanks for the video, very helpful

  • @exe.m1dn1ght
    @exe.m1dn1ght 22 дні тому

    i swear to god i dont understand anything anymore , i have an gigantic confusion why we have this, why we have hex , why we have utf , tf is all these about ? you said to be used by protocols that can process plain text , tf is that meaning ? computers process only binary numbers so whats all this dude

    • @SecPrivAca
      @SecPrivAca 22 дні тому

      Computers process 0 and 1, i.e., power on and off. Protocols process whatever they are designed to process. In the case of MIME (e-mail protocol) it can only process plain text, hence, images or other attachments have to be coded into some kind of textual representation. Base64 is just a very convenient way to do so and is now established.

  • @TawDrago
    @TawDrago Місяць тому

    SkyNet is online. 😁

  • @1stRanger
    @1stRanger Місяць тому

    Went completely over my head.

    • @SecPrivAca
      @SecPrivAca Місяць тому

      It's a bit of a complicated concept. Can you elaborate which parts you didn't understand?

  • @Henbot
    @Henbot Місяць тому

    So is this CAPTCHA and those boards of images that you are meant to click on? Is that the challenge in the challenge/response?

    • @SecPrivAca
      @SecPrivAca Місяць тому

      No. These are just to detect bots.

  • @SA-yx6ci
    @SA-yx6ci Місяць тому

    Question, can't we still uniquely identify these individuals at 2:57 based on disease? since every disease is unique?

    • @SecPrivAca
      @SecPrivAca Місяць тому

      Yes, but the point is that you don't know who these individuals are. You are touching on an important point though and that is the non-diversity of the diseases. This has been solved somewhat using L-diversity. See my video about it here: ua-cam.com/video/GNhb3PcmjmA/v-deo.htmlsi=0Z4hb33aSwypwPzt

  • @Fife_knight
    @Fife_knight 2 місяці тому

    Straight to the point. ❤

  • @ibrahimalrayes5136
    @ibrahimalrayes5136 2 місяці тому

    Clearly explained! Well done!

  • @scoffer2150
    @scoffer2150 2 місяці тому

    understood!

  • @DAVE_ICEMAN
    @DAVE_ICEMAN 2 місяці тому

    Well explained, if we just knew 🫠

  • @DAVE_ICEMAN
    @DAVE_ICEMAN 2 місяці тому

    Man, great video, love it

  • @lifelover69
    @lifelover69 2 місяці тому

    thank you for the overview of DMA. I think investments into european education, innovation, communication, and business infrastructure would be a better future direction, rather than regulation. Big tech has the resources to overcome these regulations in the end, but heavy regulation can make the difference between a small business or freelancer just not even trying to innovate in the first place. I hope I'm wrong.

    • @SecPrivAca
      @SecPrivAca 2 місяці тому

      It's the usual problem with the EU. Reasonable ideas but only time will tell whether the regulations will actually solve any problems. They usually make everything more complicated and the fact that almost no innovation happens within the EU is a telling sign.

  • @DenilsonSilvérioPedro
    @DenilsonSilvérioPedro 2 місяці тому

    Thanks. I prefer Threma but nobody wants to pay them... Im sick of others usuals social medias that people dont know about privacy and you have to download them for everything...

    • @SecPrivAca
      @SecPrivAca 2 місяці тому

      I personally use Signal. What do you think of Europe's DMA which forces messengers to be interoperable between one another? As far as I know, the secure messengers themselves (Threema, Signal) do not like it.

    • @DenilsonSilvérioPedro
      @DenilsonSilvérioPedro 2 місяці тому

      @SecPrivAca me either. But everybody use other this social medias that arent sechre and you are obligate to download them because they dont use this apps

  • @christophkrass6929
    @christophkrass6929 2 місяці тому

    great explanation!

  • @jafeta.7553
    @jafeta.7553 2 місяці тому

    Great video!

    • @SecPrivAca
      @SecPrivAca 2 місяці тому

      Glad, you liked it!

  • @whitewolf7127
    @whitewolf7127 2 місяці тому

    Awesome job on these vids! Only just found this channel, well done 👏🏼 I’ll be checking out any other videos you have! 👍🏼

    • @SecPrivAca
      @SecPrivAca 2 місяці тому

      Great! Thanks for watching and I'm glad you like my videos!

  • @Vipaldi
    @Vipaldi 3 місяці тому

    I really liked your videos and had a high opinion of you, this video kinda changed it... Apple paid close to zero corporate tax in the EU while making huge profits, thats just not fair. There is a wiki article which many details: en.wikipedia.org/wiki/Apple's_EU_tax_dispute

    • @SecPrivAca
      @SecPrivAca 2 місяці тому

      Taxation in Europe is a joke, IMO. But I guess we just disagree on this fact. Thanks for watching my videos anyways!

    • @Vipaldi
      @Vipaldi 2 місяці тому

      @@SecPrivAca IMO too, thats why all the big corps pay almost no taxes while the workers do...

    • @SecPrivAca
      @SecPrivAca 2 місяці тому

      @@Vipaldi I think both (workers and corporations) pay too much

  • @aboli-chavan
    @aboli-chavan 3 місяці тому

    Great explanation! Clear and easy to understand!

  • @lifelover69
    @lifelover69 3 місяці тому

    Thanks for the detailed look at GDPR and PbD. Are small business treated differently by the regulation? If not, I think that leads to less innovation, as the legislative burden is too high.

    • @SecPrivAca
      @SecPrivAca 3 місяці тому

      The burden is indeed very high, and there are some exemptions. If the company is small and the processing of personal information does not pose a risk than they are exempt from some of the regulations. But as soon as you have any medical data, for example, the law will affect you. That was also a huge point of contagion between small businesses and the EU. Of course the law targets primarily Apple, Google and the like; however, one of the many unintended consequences of the GDPR is that it is a huge burden on small businesses as well, unfortunately.

  • @lifelover69
    @lifelover69 3 місяці тому

    This was a great overview of current privacy issues, thank you. What do you think is the most effective approach to educate the public about privacy?

    • @SecPrivAca
      @SecPrivAca 3 місяці тому

      I think that awareness is heightened if there is a big news cycle about an incident and then informational videos on UA-cam or other social media can make a big impact. We saw this during the Recall-mess. Other than that I'm afraid we have not yet found a practical way to spread awareness. Daniel Solove creates child-friendly comics to instill privacy-awareness from a young age; I think this is a great way. teachprivacy.com/the-eyemonger-my-new-childrens-book-about-privacy/

  • @yuliastolerman9329
    @yuliastolerman9329 3 місяці тому

    Thank you for the video. Can you please explain "add salary and noise values" result. The salary for gastritis was 5k, noise value in the table is -6. How did you get 3k(2.37 timestamp). Thank you!

    • @SecPrivAca
      @SecPrivAca 3 місяці тому

      Before applying the noise 3K is the minimal salary in the table. Therefore, when you apply the noise, you do not go below that if doing so would break the analysis. In the case of Gastritis, it would be -1k which is obvious nonsense and not a valid salary and therefore would break any kind of statistical analysis.

  • @aurorastarfury
    @aurorastarfury 3 місяці тому

    First of all, thank you for creating this presentation! I had a question: In step#6, for encryption, when choosing sets of random elements of the public key K (in this example, for (bits==0), K[1] and K[3], and for (bits==1), K[1] and K[2]), are the choices of sets known *publicly* also? In other words, is that selection known to everybody? It just seems confusing to me because it seems like if an adversary knew which sets were chosen, he could deduce what the original plaintext was from the resulting tuples, so I feel like I'm missing an important concept here. Thanks again!

    • @SecPrivAca
      @SecPrivAca 3 місяці тому

      Hello! Great question and I should have clarified this in the video. The choices are NOT public. You are completely right and the encryption scheme would fail if it was.

  • @lifelover69
    @lifelover69 3 місяці тому

    thank you for the comprehensive overview.

  • @derroz3157
    @derroz3157 3 місяці тому

    Cheers!

  • @PMA65537
    @PMA65537 4 місяці тому

    I think of phishing more a branch of social engineering than another subject.

    • @SecPrivAca
      @SecPrivAca 4 місяці тому

      Yes, in my video on social engineering, I focus more on Cialdini's book. That's why I separate them in this video.

  • @permanentlypatriotic
    @permanentlypatriotic 4 місяці тому

    Very informative. But the audio on this video is really weird. Some pretty odd stereo stuff going on here. Anyways, thank you.

    • @SecPrivAca
      @SecPrivAca 4 місяці тому

      Thanks for the info. I hope the audio on my later videos is better.

  • @amirmd
    @amirmd 4 місяці тому

    ChatGpt has an app for download in Playstore by OpenAi released on 28 Jul 2023. It should be the genuine one. Its free to use but with an option to a paid subscription

  • @mehd-q1w
    @mehd-q1w 4 місяці тому

    both of them should write on same level but only Bell-LaPadula can read down ? did i get it right

  • @Arathreas
    @Arathreas 4 місяці тому

    Why should they bother with europe? Cause they have a monopoly, can charge prices like they want and these fines are a drop in the bucket to these tech giants. Europe is for example almost one third of Googles revenue.

    • @SecPrivAca
      @SecPrivAca 4 місяці тому

      We'll see. I think Asia will overtake Europe in the near future

  • @seanhallett7156
    @seanhallett7156 4 місяці тому

    This was helpful - i dont like the Biba model 😢

    • @SecPrivAca
      @SecPrivAca 4 місяці тому

      BIBA has very limited applicability.

  • @animeamv1666
    @animeamv1666 4 місяці тому

    thx for the explanation

  • @b5108
    @b5108 4 місяці тому

    you are a legend

  • @PMA65537
    @PMA65537 4 місяці тому

    Prepared Statements were covered in a book (by Tim Bunce) in early 2000. Lame devs still fielding injection seem not to have read a book in over 20 years. I don't even think you'd fix CASS by taking away the sandwich.

    • @SecPrivAca
      @SecPrivAca 4 місяці тому

      It is really the easiest vulnerability to find and fix..

    • @PMA65537
      @PMA65537 4 місяці тому

      @@SecPrivAca en.wikipedia.org/wiki/Cass_Elliot "Elliot did not die from choking on a ham sandwich."

    • @SecPrivAca
      @SecPrivAca 4 місяці тому

      @@PMA65537 Indeed, injecting has always been very common

  • @EjsFilm
    @EjsFilm 4 місяці тому

    Do you have the script

  • @PMA65537
    @PMA65537 5 місяців тому

    I've more confidence of faults and backdoors being found in actual metal hardware. Obviously cost of changing keys features there. (Aware these may be bad too, see lockpickinglawyer among others.)

  • @PMA65537
    @PMA65537 5 місяців тому

    Funny choices in some ways ... Splunk is a data management tool not specific to security. Nothing was included for host-based vulnerability detection (which can catch a lot of stuff not known to network scans). Nothing on automating software updates. Nothing on backup and recovery. Nothing on improved access control approaching POLA. Nothing on reverse engineering (or is there some of that in Metasploit?). Nothing on filtering mail and web (except if Snort covers some of that?). I think it would have been better to outline some security roles first and then list the tools helpful in each role.

  • @jbizzle1966
    @jbizzle1966 5 місяців тому

    Run Kali Linux as a virtual machine on top of virtualbox

  • @the-dark-matter
    @the-dark-matter 5 місяців тому

    You are a legend!

  • @PiniiXever
    @PiniiXever 5 місяців тому

    wonder if Putin was extra nice with their spies because he remembered his good ol' days

    • @SecPrivAca
      @SecPrivAca 5 місяців тому

      New targets already planned

  • @juhanakaarlehto7754
    @juhanakaarlehto7754 5 місяців тому

    Can this attack be prevented by enabling dhcp snooping on the network? (Of course if it’s just a random public network, a user cannot manage that but still curious if dhcp snooping can stop this)

    • @SecPrivAca
      @SecPrivAca 5 місяців тому

      I think you are spot-on. This probably would prevent this attack, as untrusted DHCP servers can not interfere.

  • @davidg9473
    @davidg9473 6 місяців тому

    DSA IS Big huge SHIT !!! For Germany And EU !

  • @baumkuchen6543
    @baumkuchen6543 6 місяців тому

    My right ear gig not get it.

    • @SecPrivAca
      @SecPrivAca 6 місяців тому

      Sorry for the audio issues

  • @migueldecarvalho8012
    @migueldecarvalho8012 6 місяців тому

    The Trojan horse is not mentioned in the Iliad, as the Iliad finishes before anyone even thinks of building the horse.

    • @SecPrivAca
      @SecPrivAca 6 місяців тому

      Indeed, the quote is from Aeneid. My bad.

  • @grigorispapapostolou8188
    @grigorispapapostolou8188 6 місяців тому

    Your videos are outstanding. I recently completed that specific playlist and found it extremely valuable. I would love to see more content on the t-closeness methodology and an in-depth discussion on the Privacy Budget in your Differential Privacy video. Another fascinating topic for a future video could be Record Linkage. I am a researcher and currently, I have started working with Data Anonymization Techniques, your videos are really helpful. Please continue the excellent work you’re doing. I would be delighted to buy you a coffee in appreciation (I've seen this option available on UA-cam) Looking forward to your next video!

    • @SecPrivAca
      @SecPrivAca 6 місяців тому

      Thank you for your kind words. Based on your suggestion I opend a buymeacoffee account: buymeacoffee.com/secprivaca I will look into the topics you suggested!

  • @Lc-op7yz
    @Lc-op7yz 6 місяців тому

    Anything about xmpp + omemo ?

    • @SecPrivAca
      @SecPrivAca 6 місяців тому

      Looks interesting. I will definitely look into it.

    • @Lc-op7yz
      @Lc-op7yz 6 місяців тому

      @@SecPrivAca would be good to see your opinion .

  • @RealEstate3D
    @RealEstate3D 6 місяців тому

    In this video one understands why naming variables seems to be one of the most complicated things to do in programming :) ... qis, si, mid, ranks, partition ... OMG .. really?

    • @SecPrivAca
      @SecPrivAca 6 місяців тому

      Probably should have used better names for a tutorial :D

    • @RealEstate3D
      @RealEstate3D 6 місяців тому

      @@SecPrivAca Not only for tutorials. Your code might survive you and is part of your heritage.