How Hackers Get Into Every Device!

How Hackers Get Into Every Device!

Channel:
Subscribers:
920,000
Published on ● Video Link: https://www.youtube.com/watch?v=8C7ouESJyfM



Duration: 21:42
118,474 views
6,345


Have you ever heard the sentence that every device can be hacked? I have talked to several security researchers who have experience in hacking Browsers, iPhones and more, to figure out if this is true. And if it's true, should you be worried?

You should worry more about Phishing: https://www.youtube.com/watch?v=NWtm4X6L_Cs

@steventseeley: https://twitter.com/steventseeley
@s1guza: https://twitter.com/s1guza
@itszn13: https://twitter.com/itszn13
@xerub: https://twitter.com/xerub
@gf_256: https://twitter.com/gf_256 / https://www.youtube.com/channel/UCmYAXMxue6UdEPfAPxA0E8w

---

00:00 - Can Every Device Get Hacked?
00:53 - Collaboration
02:24 - Law of Security: The More Complexity, The More Insecure
03:20 - Proof #1: Zerodium
04:55 - Proof #2: Phone Vendor Security Updates
05:33 - Proof #3: Hacking Competitions
06:28 - "Can You Find The Vulnerabilities Alone?"
09:27 - "Weaponized" (or Operationalized) Exploits
10:35 - The Original Question Is Useless
11:18 - Risk Of Your Device Getting Hacked?
12:32 - The Economics Of The Attacker
14:30 - Who Should Be Worried About 0days?
15:11 - Attack On Security Researchers
16:06 - What Can You Do Against Hackers?
18:15 - Trick Against Smartphone Hacking
19:22 - Summary and Conclusion
21:21 - Outro

-=[ ❤️ Support ]=-

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ 🐕 Social ]=-

→ Twitter: https://twitter.com/LiveOverflow/
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/







Tags:
Live Overflow
liveoverflow
hacking tutorial
how to hack
exploit tutorial
0day
zero day
pegasus
malware
trojan
hacking
hack every device
state sponsored
security research
vulnerability research
iOS
iPhone
android
chrome
firefox
safari
webkit
browser exploitation
jailbreak