Skip to player
Skip to main content
Skip to footer
Search
Connect
Recommended
11:29
|
Up next
Cybersecurity Expert Answers Hacking Questions From Twitter
WIRED
11/19/2019
25:23
Hacker Explains One Concept in 5 Levels of Difficulty
WIRED
7/20/2020
3:30
5 easy ways to protect yourself from being hacked, according to a former NSA hacker
Insider
7/15/2020
5:48
HACKING | Protect Yourself From Hackers | The Dr Binocs Show | Peekaboo Kidz
Peekaboo
2/22/2023
0:55
ethical hacking
LuckyCat
3/24/2021
3:01
Man Duped Over Rs. 3 Lakh Via Fake Vodafone Customer Care Agent: How To Stay Safe?
Gizbot
1/13/2020
2:42
Hacker shows how easy it is to 'hack' a business
National World - National Videos
11/26/2024
2:26
How to Protect Yourself After a Massive Corporate Hack
WIRED
12/8/2017
5:22
Car Hacks | Digging Deeper
Kenpopsanporm
1/26/2016
26:46
Cybersecurity Expert Answers Hacking History Questions
WIRED
5/24/2025
6:09
The most surprising hacks are here to help! 🔥
MetDaan Creative
4/19/2025
21:14
Hacker Breaks Down 26 Hacking Scenes From Movies & TV
WIRED
11/13/2018
13:38
Ethical Hackers Ki Duniya Me Famous Pakistani Rafay Baloch Cyber Security Companies Me Kese Pahuncha
UrduPoint.com
4/14/2022
23:23
Hacker Breaks Down Hacking Scenes From Movies & TV
WIRED
4/29/2021
14:30
How to begin hacking with the YARD Stick One - Hak5 1908
Hak5
10/8/2015
4:12
Inside the mind of a hacker
Financial Times
1/11/2016
0:30
Simple and useful hacks for you to know!
MetDaan DIY
6/2/2025
10:14
Top 10 Reasons You NEED to Be Watching Hacks
MsMojo
9/19/2021
0:29
Pet lion escapes and attacks a woman and two children in the street
The Independent
yesterday
1:52
Emotional fans react after watching Ozzy Osbourne’s last ever show
The Independent
yesterday
0:24
Woman mauled by lion in zoo enclosure airlifted to hospital
The Independent
yesterday
1:12
Breastfeeding Shouldn't Be a Shame
FYI News
8/1/2018
1:24
The Story Behind Vibrators
FYI News
7/2/2018
1:09
Facts About Ramadan
FYI News
8/12/2017
0:44
Sea otter shows off rock to fisherman
Brut America
6/27/2025
Watch fullscreen
Like
Comments
Bookmark
Share
Add to Playlist
Report
5 simple questions on ethical hacking
Brut America
Follow
3/25/2025
What is white-hat hacking? What is ransomware?
5 simple questions on ethical hacking answered.
Category
🤖
Tech
Transcript
Display full video transcript
00:00
One of the biggest cyber attacks in history. The most disruptive
00:04
and destructive series of computer attacks ever attributed to a single group.
00:17
Ethical hacking is the legal profession of breaking into computer systems. Typically,
00:24
it's into an organization's network of computer systems. And essentially, you're getting paid
00:29
to do it. So it's a pretty cool job if you could go. White hat hacking refers to someone that
00:43
is hired or paid by an organization to try and find vulnerabilities in their systems or networks.
00:49
A black hat hacker does it illegally. It's the example of trying to hack someone's Instagram
00:54
account or maybe stealing their WhatsApp chat history. Gray hat is actually more interesting.
01:00
It sits in between the two. They're not directly hired by an organization to hack their systems,
01:07
but they do sometimes operate within that realm. You're seeing a lot more application of gray hat
01:13
hacking, given that these cyber attacks on the rise, there is a continuing growth of hackers
01:20
who are sort of trying to figure out ways or other alternate ways to increase their income.
01:28
Our communication is all digital. So it's almost open the scope of a possibility for hackers and
01:36
data exploitation to be possible. Governments actually care
01:39
or understand that this is now a national security priority.
01:44
The experts are saying that this has been one of the worst years ever, if not the worst year ever
01:52
for ransomware. I want to update everyone on the ransomware cyber attack that
01:58
impacted on the colonial pipeline over this past week.
02:01
To explain ransomware, first, you have to understand what malware is. Malware is software
02:06
where its intent is to harm someone's computer system or network. And so that includes everything
02:14
from viruses to worms to spyware. Ransomware is quite new. This is a very specific type of malware
02:25
that encrypts a victim's data. So say, for example, you have your laptop and someone's
02:31
injected some ransomware onto your system. What that will do is it will lock all of the
02:36
data on your system, making it inaccessible for you. And the idea is that the hacker won't release
02:43
that lock unless you pay a ransom. I think this is more interesting, less so for, you know,
02:49
me and yourself. It's more interesting for organizations. Data is essentially,
02:54
for many of these companies, their product. It's really important for them to retain their users,
02:58
their users' trust, so that they continue sharing their activity data on these apps.
03:03
So it's often a choice between, okay, do we pay this small amount in the grand scheme of things
03:08
in order to retain, you know, what is our entire company or do we let it go?
03:17
Even as American companies are getting clobbered by the hackers, they're also struggling
03:21
to find enough people to defend themselves. Demand for cyber workers
03:24
hits a historic high this quarter. It's more important than ever, especially for organizations
03:30
to invest in their own infrastructure to protect the data that they have, simply relying on their
03:37
own internal workforce to guarantee the security of their own systems is quite silly, to put it
03:44
frankly. And I think now you have a lot more bounty programs in place by these big tech companies,
03:48
Google, Microsoft, Facebook, they actually pay you if you find a vulnerability in their system.
03:54
I know Verizon Digital Media actually just passed $7 million in bounties paid.
04:00
Uber has paid out over $2 million.
04:02
And that's to compensate for your efforts, but also to make sure that you don't
04:06
go ahead and exploit the system.
04:10
Unfortunately, there isn't an easy, clear career path for becoming an ethical hacker.
04:17
Unlike software engineering, there aren't clear and organized structures in place to be able to
04:22
facilitate programs where, you know, students can then go on to work in the industry. Networking
04:28
plays a much bigger role than it does compared to other industries. And so there is something
04:33
called CTFs. If you've played a first person shooter before, you know, capture the flag,
04:38
capture the flags are a kind of ethical hacking game. And most often it's sponsored by organizations,
04:44
depending on what team you're on, you might be attacking the system, or you might be defending
04:49
the system. But the underlying point is CTF is a security competition, and it allows you to practice
04:54
your skills again in a legal and safe environment. But also, that's the place where a lot of
04:59
organizations are starting to sponsor and also recruit from.
Recommended
11:29
|
Up next
Cybersecurity Expert Answers Hacking Questions From Twitter
WIRED
11/19/2019
25:23
Hacker Explains One Concept in 5 Levels of Difficulty
WIRED
7/20/2020
3:30
5 easy ways to protect yourself from being hacked, according to a former NSA hacker
Insider
7/15/2020
5:48
HACKING | Protect Yourself From Hackers | The Dr Binocs Show | Peekaboo Kidz
Peekaboo
2/22/2023
0:55
ethical hacking
LuckyCat
3/24/2021
3:01
Man Duped Over Rs. 3 Lakh Via Fake Vodafone Customer Care Agent: How To Stay Safe?
Gizbot
1/13/2020
2:42
Hacker shows how easy it is to 'hack' a business
National World - National Videos
11/26/2024
2:26
How to Protect Yourself After a Massive Corporate Hack
WIRED
12/8/2017
5:22
Car Hacks | Digging Deeper
Kenpopsanporm
1/26/2016
26:46
Cybersecurity Expert Answers Hacking History Questions
WIRED
5/24/2025
6:09
The most surprising hacks are here to help! 🔥
MetDaan Creative
4/19/2025
21:14
Hacker Breaks Down 26 Hacking Scenes From Movies & TV
WIRED
11/13/2018
13:38
Ethical Hackers Ki Duniya Me Famous Pakistani Rafay Baloch Cyber Security Companies Me Kese Pahuncha
UrduPoint.com
4/14/2022
23:23
Hacker Breaks Down Hacking Scenes From Movies & TV
WIRED
4/29/2021
14:30
How to begin hacking with the YARD Stick One - Hak5 1908
Hak5
10/8/2015
4:12
Inside the mind of a hacker
Financial Times
1/11/2016
0:30
Simple and useful hacks for you to know!
MetDaan DIY
6/2/2025
10:14
Top 10 Reasons You NEED to Be Watching Hacks
MsMojo
9/19/2021
0:29
Pet lion escapes and attacks a woman and two children in the street
The Independent
yesterday
1:52
Emotional fans react after watching Ozzy Osbourne’s last ever show
The Independent
yesterday
0:24
Woman mauled by lion in zoo enclosure airlifted to hospital
The Independent
yesterday
1:12
Breastfeeding Shouldn't Be a Shame
FYI News
8/1/2018
1:24
The Story Behind Vibrators
FYI News
7/2/2018
1:09
Facts About Ramadan
FYI News
8/12/2017
0:44
Sea otter shows off rock to fisherman
Brut America
6/27/2025