What is Phishing

  Рет қаралды 33,434

IBM Technology

IBM Technology

Жыл бұрын

Learn more about phishing→ ibm.biz/BdPyE9
Set up Quad9 Secure VPN for free → www.quad9.net/
We've all received text messages like "Please verify your login or your account will be suspended" or promises that you've won a prize. Don't fall for it! In this video, security expert Jeff Crume explains the attackers' strategy, whether it's phishing, spearfishing or whaling -- and how to avoid falling for their traps.
Get started for free on IBM Cloud → ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → ibm.biz/subscribe-now

Пікірлер: 23
@Catzzye
@Catzzye 11 ай бұрын
The drawing on the screen effect is insane
@IBMTechnology
@IBMTechnology 11 ай бұрын
See ibm.biz/write-backwards
@carlosandresoliverosmarin4845
@carlosandresoliverosmarin4845 Жыл бұрын
Great information and advices! Thanks for the tips.
@donasaha1936
@donasaha1936 Жыл бұрын
Very calm n precise information ❤
@myname9695
@myname9695 Жыл бұрын
thanks for explaining
@alexandregamarano5853
@alexandregamarano5853 Жыл бұрын
Amazing video, thanks!!!
@PinkYellowGreen2023
@PinkYellowGreen2023 8 ай бұрын
Thank you for explaining! God bless you😊
@jeffcrume
@jeffcrume 3 ай бұрын
Thank you for watching!
@labitnelsonlangan4478
@labitnelsonlangan4478 7 күн бұрын
Thanks for the information
@favouronwuchekwa
@favouronwuchekwa Жыл бұрын
Good one
@Islam.our.religion
@Islam.our.religion 8 ай бұрын
Thx for the great video
@jeffcrume
@jeffcrume 3 ай бұрын
Thanks for watching!
@mansurtxafapapaias3517
@mansurtxafapapaias3517 Жыл бұрын
CRS Forgetry , XSS vs BB.DD
@danselpaddymhaka
@danselpaddymhaka 2 ай бұрын
when i grow up i want to be like you sir!
@DavidCzuba
@DavidCzuba Жыл бұрын
This is great information I will share with my studenets (citing the source). How is he writing backwards, that's what I want to know.
@IBMTechnology
@IBMTechnology Жыл бұрын
Search on "lightboard videos".
@juleszubee882
@juleszubee882 Жыл бұрын
Any difference between whaling and BEC please?
@jeffcrume
@jeffcrume 11 ай бұрын
Whaling targets high level executives within an organization (as in going after the “big fish”). Business email compromise is a broader category that affects all levels potentially
@EnchiladaBoredom
@EnchiladaBoredom 16 күн бұрын
Where is it?
@koinijosepholemomboshi7121
@koinijosepholemomboshi7121 Ай бұрын
I have learnt
@user-ft9tb6le1h
@user-ft9tb6le1h 2 ай бұрын
gr8
@rogerlapin9809
@rogerlapin9809 Жыл бұрын
Good stuff, but as a longterm IBM exec I don't think we need one of our distinguished engineers to to explain this.
Social Engineering - How Bad Guys Hack Users
14:58
IBM Technology
Рет қаралды 41 М.
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
17:34
OMG 😨 Era o tênis dela 🤬
00:19
Polar em português
Рет қаралды 10 МЛН
Chips evolution !! 😔😔
00:23
Tibo InShape
Рет қаралды 41 МЛН
The most impenetrable game in the world🐶?
00:13
LOL
Рет қаралды 28 МЛН
когда достали одноклассники!
00:49
БРУНО
Рет қаралды 1,8 МЛН
Understanding Hackers
10:41
IBM Technology
Рет қаралды 29 М.
2024 Cybersecurity Trends
7:57
IBM Technology
Рет қаралды 149 М.
How To Recognize and Avoid Phishing Scams | Explained
8:55
CyberNews
Рет қаралды 30 М.
Ransomware Dilemma - Should You Pay?
9:26
IBM Technology
Рет қаралды 6 М.
Denial of Service Attacks Explained
9:52
IBM Technology
Рет қаралды 49 М.
Cybersecurity and Zero Trust
17:59
IBM Technology
Рет қаралды 76 М.
Tech Talk: What is Public Key Infrastructure (PKI)?
9:22
IBM Technology
Рет қаралды 100 М.
What is DNS (Domain Name System)?
7:25
IBM Technology
Рет қаралды 106 М.
OMG 😨 Era o tênis dela 🤬
00:19
Polar em português
Рет қаралды 10 МЛН