All language subtitles for 7. Spyware, Adware, Scareware, PUPs & Browser hijacking

af Afrikaans
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:01,110 --> 00:00:08,610 Continued with types of malware you also have spyware as the name suggests its main purpose is to gather 2 00:00:08,610 --> 00:00:11,250 information and send it back to the attacker. 3 00:00:11,290 --> 00:00:18,330 Well to spy the attackers don't generally want to cause damage directly but want to compromise your 4 00:00:18,330 --> 00:00:25,830 privacy and anonymity based on some agenda that they've got spyware is intelligence gathering malware 5 00:00:26,310 --> 00:00:31,260 corporations and hacker groups create these as well as governments. 6 00:00:31,380 --> 00:00:38,070 You can see the article here of alleged U.S. government spyware from the Telegraph worth mentioning 7 00:00:38,070 --> 00:00:38,760 actually. 8 00:00:38,940 --> 00:00:42,530 Don't get too hung upon the names and classifications of the malware. 9 00:00:42,530 --> 00:00:49,170 By the way that we've gone through these are not strict taxonomies for example a rootkit can also be 10 00:00:49,170 --> 00:00:53,460 a Trojan Horse someone could call spyware virus. 11 00:00:53,460 --> 00:01:00,200 The point is just to understand the variants that exist and the possible purpose of the malware and 12 00:01:00,200 --> 00:01:07,890 other one is and where which some people consider to be a form of spyware is undesirable software. 13 00:01:07,890 --> 00:01:10,410 The forces advertise on you. 14 00:01:10,410 --> 00:01:13,950 There are millions of different variants of this. 15 00:01:14,040 --> 00:01:21,300 One of the most annoying and destructive form of adware is called Kou web search. 16 00:01:21,330 --> 00:01:27,570 You may even encounter it yourself but there's nothing cool about it at all it hijacks your default 17 00:01:27,570 --> 00:01:31,170 search engine it displays ads in the browser. 18 00:01:31,350 --> 00:01:37,770 When you click on links it sometimes takes you to places that it want you to go to instead of where 19 00:01:37,770 --> 00:01:45,450 you want to actually go to and it actively defends itself from being removed and getting rid of it. 20 00:01:45,480 --> 00:01:48,240 So it's particularly hard to shift. 21 00:01:48,240 --> 00:01:54,600 And there are many many variants of it that were affected millions of people when an ad where all malware 22 00:01:54,600 --> 00:01:59,290 takes over your browser in this way is known as browser hijacking. 23 00:01:59,490 --> 00:02:05,130 And you might hear that term more throughout the course you should always pay particular attention when 24 00:02:05,130 --> 00:02:14,580 installing software because often a software install includes optional installs such as this browser 25 00:02:14,580 --> 00:02:16,770 highjacker that we've just mentioned. 26 00:02:16,830 --> 00:02:17,950 So you can see here. 27 00:02:17,970 --> 00:02:25,250 Optional installs and what you've got here is installs that are going to be potential Ad-Aware. 28 00:02:25,650 --> 00:02:28,470 So be very careful what you agree to install. 29 00:02:28,470 --> 00:02:31,500 Always opt for the custom installation and de-select. 30 00:02:31,500 --> 00:02:38,520 Anything that is not familiar especially optional software that you never wanted to download and install 31 00:02:38,520 --> 00:02:39,830 in the first place. 32 00:02:39,900 --> 00:02:44,220 It goes without saying that you should not install software that you don't trust. 33 00:02:44,310 --> 00:02:48,680 Sometimes your device might come with and where pre-installed. 34 00:02:48,690 --> 00:02:56,400 If you're particularly on Lucky One of the worst cases was Lenovo pre-install ING's superficies adware 35 00:02:56,880 --> 00:03:03,250 that only served you add that based on what it knew about you from spying on you. 36 00:03:03,270 --> 00:03:10,970 It also included a self-signed certificate allowing your browser TLR and SSL encryption to be bypassed. 37 00:03:10,980 --> 00:03:17,580 So not very good over and over by our Never bile and over laptop again after that and all the rest of 38 00:03:17,580 --> 00:03:20,770 the things that were never done scare away. 39 00:03:20,890 --> 00:03:27,360 Skyway is a type of social engineering attack to trick a person into believing in a threat that isn't 40 00:03:27,360 --> 00:03:28,520 really real. 41 00:03:28,800 --> 00:03:36,600 So a common example is fake security software claiming that you have malware infections or something 42 00:03:36,600 --> 00:03:37,430 like that. 43 00:03:37,470 --> 00:03:42,810 Often they want you to pay something in order to fix the fake problem. 44 00:03:42,810 --> 00:03:46,050 These scams have been extremely successful. 45 00:03:46,050 --> 00:03:53,840 You can see here personal anti-virus software identifying all these fake their abilities and then is 46 00:03:53,850 --> 00:03:55,070 going to keep popping up. 47 00:03:55,080 --> 00:04:02,160 It's going to keep causing problems on the machine and then people are fooled into paying for something 48 00:04:02,160 --> 00:04:05,390 to remove the fake viruses. 49 00:04:05,520 --> 00:04:08,400 And finally we have this catch all term. 50 00:04:08,520 --> 00:04:12,330 If it's something that you might not have wanted. 51 00:04:12,450 --> 00:04:19,710 These are called potentially wanted programs or pull ups that could potentially be monitored because 52 00:04:19,770 --> 00:04:24,660 the antivirus companies and people the attempt to remove these things aren't quite sure whether you 53 00:04:24,660 --> 00:04:25,880 want them or not. 54 00:04:26,010 --> 00:04:31,350 Most often you don't want them and they're annoying the things bundled them with software. 55 00:04:31,350 --> 00:04:36,090 So again they are often bundling with the software when you install. 56 00:04:36,090 --> 00:04:42,720 So you must make sure when you install software you go to the custom install and make sure you remove 57 00:04:42,750 --> 00:04:44,370 any of these pops. 6178

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.