1:36Critical WordPress Vulnerability Actively ExploitedSecurity and Privacy Academy161 views·6 months ago
6:06SIM Swapping How Hackers Steal Your Phone Number and How to Stop ThemSecurity and Privacy Academy199 views·8 months ago
1:4117 Steps to Cybersecurity. Part 3 Steps 16 and 17 (Increased Protection Needs)Security and Privacy Academy80 views·9 months ago
4:0717 Steps to Cybersecurity. Part 2 Steps 10 to 15 (Standard Protection)Security and Privacy Academy56 views·9 months ago
4:3417 Steps to Cybersecurity. Part 1 Steps 1 to 9 (Basic Protection)Security and Privacy Academy108 views·9 months ago
2:38Notepad++ Vulnerability Lets Attacker Gain Complete System ControlSecurity and Privacy Academy280 views·10 months ago
5:46How Kraken Outsmarted a North Korean Hacker Trying to Infiltrate Their CompanySecurity and Privacy Academy230 views·1 year ago
4:16The EU Digital Identity Wallet Revolution or RiskSecurity and Privacy Academy826 views·1 year ago
3:23AWS S3 Ransomware Crisis 1,200 Stolen Keys ExploitedSecurity and Privacy Academy50 views·1 year ago
3:38Florida’s Encryption Backdoor Law Dangerous & DumbSecurity and Privacy Academy58 views·1 year ago
5:34Seven Risks of Central Bank Digital Currency (CBDC)Security and Privacy Academy238 views·1 year ago
5:12Central Bank Digital Currency (CBDC) - Privacy, Power, and the FutureSecurity and Privacy Academy288 views·1 year ago