The Spampionship, the PWN2OWN unicorn, and how Target was breached - 60 Sec Security [VIDEO]

Filed Under: Data loss, Featured, Malware, Security threats, Spam, Video, Vulnerability

60 Second Security:

• Where do you find Extreme Spammers?

• Can you find the exploit unicorn?

• And how did Target get breached?

Find all the answers in 60 Second Security for 08 February 2014.

→ Can't view the video on this page? Watch directly from YouTube. Can't hear the audio? Click on the Captions icon for closed captions.

Previous three episodes:

"3-step"
01 Feb 2014
"Mac malware"
25 Jan 2014
"Thermostat"
18 Jan 2014

In this episode:

, , , , , , , , , , , , , , , , , ,

You might like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

About the author

Paul Ducklin is a passionate security proselytiser. (That's like an evangelist, but more so!) He lives and breathes computer security, and would be happy for you to do so, too. Paul won the inaugural AusCERT Director's Award for Individual Excellence in Computer Security in 2009. Follow him on Twitter: @duckblog