What is Ransomware?

  Рет қаралды 48,262

IBM Technology

IBM Technology

Күн бұрын

Пікірлер: 34
@tannerschumacher9269
@tannerschumacher9269 2 жыл бұрын
Brad's speaking style really makes these subjects easy to listen to. Every one of his videos I thoroughly look forward to.
@PranavBhattarai
@PranavBhattarai 3 жыл бұрын
Wow. Amazing flow and confidence. Loved it. I want IBM Cloud to make more videos and ignore the view counts. Sending my love from Nepal.
@IBMTechnology
@IBMTechnology 3 жыл бұрын
Thank you for the great feedback, Pranav! 🙏 We will certainly keep doing more videos like this, be sure to stay subscribed!
@jeandy4495
@jeandy4495 2 жыл бұрын
I'm surprised that he did not speak about the human dimension. In a company, workers may open emails and download attachments which contain malicious code. For example an Excel file with macros. In this case scenario, the machine is not the problem, but the user.
@Oscar-x3m
@Oscar-x3m Жыл бұрын
Thank you for sharing and appreciate your flow and effort on posting this great content. I encourage you to keep posting IT related videos more.
@garethjohn8931
@garethjohn8931 2 жыл бұрын
I take it the Under armour logo is on your left side? Either that or you're amazing at writing backwards.
@maddieg5759
@maddieg5759 3 жыл бұрын
This the best vedio for introduction on Ransomware !! Thank you 😊
@IBMTechnology
@IBMTechnology 3 жыл бұрын
Thanks for the appreciation, Maddie, and you're welcome! 😀
@omhe63927
@omhe63927 3 жыл бұрын
Wow, Great... Is there a way or a pattern on which, the victim could know which Backup is prior to the Vulnerability Injection?
@bradleyknapp2909
@bradleyknapp2909 3 жыл бұрын
Omar, unfortunately, you need to do a manual examination of your backups after determining the kind/type of malware to determine if a backup is clean before restoring it. That said, the most important step (after confirming a clean backup) is making sure that the machine you are restoring is OFFLINE and the vulnerabilities that allowed for the installation of the malware are patched before bringing the machine back fully online and restoring to production use.
@dhanushkohlinagaraj5176
@dhanushkohlinagaraj5176 2 жыл бұрын
@@bradleyknapp2909 great!!
@elmarius77
@elmarius77 2 жыл бұрын
Yes, using Cybersense (full content analytics) in a Cyber Recovery Vault.
@evolvemga
@evolvemga 3 жыл бұрын
This is great! Anyone who is looking for more info on ransomware should check the video out
@IBMTechnology
@IBMTechnology 3 жыл бұрын
Thanks for the appreciation! 👍
@r4jjin
@r4jjin 3 жыл бұрын
Nice explanation 👍
@davidanam7509
@davidanam7509 3 жыл бұрын
What do you do when the company does not want to spend on backups?
@EngineeringChampion
@EngineeringChampion 2 жыл бұрын
I enjoyed this video! Thank you!
@Njs1211
@Njs1211 2 жыл бұрын
How to check if my backup already have Ransomeware?
@jeandy4495
@jeandy4495 2 жыл бұрын
This is hard to tell. You kind of have to check manually through all the files if you don't have weird ones or if weird processes are running. You'd notice if your backup has the ransomware if after some time, your system gets encrypted again.
@nhlanngwe1
@nhlanngwe1 Жыл бұрын
great explanation .thank you!
@9411841905
@9411841905 2 жыл бұрын
Thanks, you have explained it well.
@irfankhan-hd6it
@irfankhan-hd6it 2 жыл бұрын
how to recover the encrypted files by "woit"
@RushikeshJoshi8
@RushikeshJoshi8 3 жыл бұрын
In today's increasingly online world advancements also mean more vulnerabilities and loopholes to exploit, which makes it easier for malicious software to take control of the systems running older versions of the software or OS, thank you IBM for educating everyone about this as this can have severe consequences if left unchecked, kudos!!
@Thebassguru84
@Thebassguru84 2 жыл бұрын
Uuuuu77777
@mikeh7476
@mikeh7476 2 жыл бұрын
How is this guy writing backwards tho
@horsepower523
@horsepower523 2 жыл бұрын
Ah yes, that's the real question isn't it lol
@jeandy4495
@jeandy4495 2 жыл бұрын
Hope it's not disappointing, but he actually writes normally and they mirror the image in post-prod
@arislopez411
@arislopez411 2 жыл бұрын
Excellent
@berserkerwolf7674
@berserkerwolf7674 3 жыл бұрын
I got hit with ransomware last week. I logged on to my FB, but its locked. Can ransomware hack my social media accounts?
@jeandy4495
@jeandy4495 2 жыл бұрын
As the hacker has access to your computer, he may execute and do whatever he wants, including accessing your accounts if the credentials were saved. But this is not the goal of a ransomware.
@ВячеславПойденко
@ВячеславПойденко 3 жыл бұрын
Хорошо рассказал. Спасибо
@sharky9493
@sharky9493 2 жыл бұрын
Don´t use Windows 95, use XP. and you are safe!!!😂
Cybersecurity and Zero Trust
17:59
IBM Technology
Рет қаралды 88 М.
Wana Decrypt0r (Wanacry Ransomware) - Computerphile
15:19
Computerphile
Рет қаралды 1,5 МЛН
The Ultimate Sausage Prank! Watch Their Reactions 😂🌭 #Unexpected
00:17
La La Life Shorts
Рет қаралды 9 МЛН
УДИВИЛ ВСЕХ СВОИМ УХОДОМ!😳 #shorts
00:49
Кто круче, как думаешь?
00:44
МЯТНАЯ ФАНТА
Рет қаралды 6 МЛН
Ransomware Is An Epidemic And It's Getting Worse | Cryptoland
24:19
Understanding Hackers
10:41
IBM Technology
Рет қаралды 33 М.
Infiltrating ransomware gangs on the dark web
6:20
60 Minutes
Рет қаралды 39 М.
Cybersecurity Architecture:  Data Security
14:48
IBM Technology
Рет қаралды 59 М.
Dealing with a Ransomware Attack: A full guide
10:01
The PC Security Channel
Рет қаралды 489 М.
What is SD WAN (and why it's replacing MPLS)
15:26
Steve Murphy
Рет қаралды 104 М.
Cybersecurity Architecture: Response
16:57
IBM Technology
Рет қаралды 43 М.
RaaS Services On The Dark Web
43:38
CYBER RANGES
Рет қаралды 2,9 М.
The Ultimate Sausage Prank! Watch Their Reactions 😂🌭 #Unexpected
00:17
La La Life Shorts
Рет қаралды 9 МЛН