Tracking Malware: IOCs and Hashing
This is the introduction video for a potential tutorial series on various cybersecurity concepts.
This video aims at getting you acquainted with the general terminology used when talking about malware and answers questions like, How do you find malware for testing? how do you look for a specific threat, how do you track it?
Topics covered: Indicators of Compromise and Hashing
https://en.wikipedia.org/wiki/MD5
https://en.wikipedia.org/wiki/Cryptographic_hash_function
https://en.wikipedia.org/wiki/SHA-1
-------------------------------------------
Thanks for watching! If you like what you see, check out the links below.
Patreon: https://www.patreon.com/tpsc
Forum: https://forum.thepcsecuritychannel.com/
Twitter: https://twitter.com/leotpsc
Facebook: https://www.facebook.com/tpscyt
Other Videos By PC Security Channel
2017-10-31 | Bitdefender 2018 Review |
2017-10-26 | Bad Rabbit Ransomware | Early Halloween? |
2017-10-20 | What is Encryption? You use it daily! |
2017-10-18 | NordVPN Review | After extended use |
2017-10-11 | Trend Micro Internet Security Review |
2017-10-07 | Make Windows Updates less annoying! |
2017-09-23 | Avira Free Antivirus 2018 | New UI |
2017-09-22 | Bitcoin Miner Malware | Incredibly Stealthy! |
2017-09-20 | CCleaner hacked, Replaced by Malware! |
2017-09-18 | Avira Free Antivirus Review |
2017-09-14 | Tracking Malware: IOCs and Hashing |
2017-09-09 | WannaCry vs Petya | No Kidding |
2017-08-29 | Security vs Freedom | Can you have too much security? |
2017-08-27 | Fake Docs | Excel Phishing Advisory |
2017-08-19 | Declutter Windows 10 |
2017-08-11 | Is Windows Defender good enough? |
2017-07-28 | Kaspersky Free Antivirus 2017 Review |
2017-07-24 | Bam! Ransomware |
2017-07-16 | Fake Ransomware | Petya & WannaCry Imitations |
2017-07-03 | Regarding my Job/Emsisoft Reviews |
2017-06-28 | Global Ransomware Attack | Petya/NotPetya |