I'd like to add 'spearphishing' to the list, where phishing attacks are generally sent to a demographic or pool of targets, spearphising is tailored to an individual, and typically magnitudes harder to catch than a typical phishing attack. Love the video :)
@@Kitty-xi1sb yea but malware is too general and have many different types but different types of phishing are very similar so spearphishing doesnt need to be put on the list because its just phishing for a specific person
@creammando ill agree to disagree with on this one as the social engineering that goes into phishing varies greatly depending on status level of an individual within a company. Whaling is commonly done via spoofing email/documents that appear to be circulating internally on a more "need to know" basis and lean in on personalization while general spearfishing targeting larger groups of grunts within a company can be anything from "are you happy at work" and "see salary ranges for your position" to "fill out this survey, love HR". Grunts expect very "all hands" generalized emails while higher ups tend to be cc'd for inclusion or are the email target for very specific groups of information.
@@vinnysworkshop omg that's so scary, thats literally what I'm doing rn, the whole laptop got into full screen and a beeping sound that scared me, it said it was infected w 5 viruses or something and that my free trial ended but I don't remember even starting it cuz I've never thought about it
@@sweetmimosamommysaranghae3163 I got my viruses when playing one of Geoguessr's geography games on a Windows 11 Desktop. It was a game about guessing the names of given countries on a world map. A few seconds in, I was prompted with a McAfee screen saying that I was infected, and my computer was spewing notifications about being infected. I have turned notifications off on my computer but am still haunted with the possibility of more serious things happening.
@@HikariSakaihappened to me.. I got a rat and they controlled my pc tryna access my gmail. Luclikly I managed to factory reset it before they could do anything bad
5:43 These softwares are horrifying. One time I tried to get an autoclicker but clicked the fake download link(I didn’t have an adblocker at the time) and this fake software installed an entirely new taskbar, deleting the old one! Huge search engine bar, with ads popping up ON THE AREA WHERE THE TASKBAR WAS!!! This incident will never not scare me.
@@souyakawata9449you got that yahoo browser hijack as well? I had some fun trying to figure that out but luckily I was able to find a anti malware software to scan my computer and it went away after. Not that many problems since
Amazing video! I think its worth mentioning that rootkits often wont target antiviruses at all, as many modern day antiviruses have anti hijacking detection built in. More often than not rootkits disguise themselves as other regularly installed programs or modifying the task manager / process viewer to skip the memory space where the rootkit resides, hiding it from both user and antiviruses. 10/10 video tho
@justsomeone282The only unmodifiable view is one done via a kernel module looking at the data structures directly. Sysinternals RootkitRevealer demonstrates the technique.
Correction on rootkit: Rootkits themselves are not inherently designed to give a malicious actor remote access to a computer, but can do so. Rootkits are designed to be stealthy and concealed, and usually are used to protect other pieces of more specialized malware (like keyloggers) from traditional security measures. The term "root" in rootkit is named after the "root" permission level of unix-based operating systems (administrator/system on windows). Rootkits usually operate at ring 0 (kernel) and can be very difficult to detect, but some are only run in the userspace. Some special types of rootkits can overwrite the master boot record (mbr) or hijack other parts of the boot process. This type of rootkit is called a "bootkit" and be very difficult to detect and remove, even surviving drive wipes. While technically a rootkit can be bundled with a RAT or have RAT functionality, rootkits are often designed to maintain high permission levels on a computer, as well interfere with standard security measures. As such, rootkits are nasty pieces of malware which can bring great harm to a system or network if designed correctly. No hate! Just wanted to clear this up! :)
The last one is the one that sounds the mildest but it's quite the opposite. Quoting another guy, imagine you work at a high end software developing agency. At lunch, someone casually approaches you and says "hey I'm hungry but I don't know the place yet, can you recommend me some good place to eat?" While it sounds like an innocent question, you're pretty much telling him what places you and your colleagues go for lunch, and where he can find potential targets for whatever devious things he wants to do.
@@OlympusGames-zv2rs Or imagine that the guy just leaves a USB key on a table. Someone will be like "what is this USB", they put it in a computer but there's malware on the USB.
There's many more sub types and more are likely being created as we speak. Technology advances at a rapid pace so there's likely new ones being developed. Cyber security is a constant cat and mouse game.
Yo, don't worry! They won't target you too much because you aren't famous or wealthy or whatever. When someone gets hacked, the hacker probably sells their info on the dark web. But low chances of someone buying the info if they're a nobody ¯\_(ツ)_/¯ Try not to click on random links or adverts. If you pirate things, be very cautious because you have a higher chance of getting a virus or being hacked. Pirate and get all of your software in general, from trusted sources ONLY. Some more advice I have is to keep up with the latest security vulnerabilities and learn how to avoid them. If you're still scared, it's okay because being hacked isn't fun.
Word of advice about rat viruses (from experience) If it's the direct kind and not the stealthy type, and you catch the hacker in the act, disable your network and boot the computer in safe mode until you find where the virus is. Some systems will show recently downloaded and modified files so it should be rather easy to locate the rat as I had to do that
download an antivirus or scan every file before installing/opening it, if you have an adblocker and is mostly downloading data from trusted sites then you should be fine
I feel like keylogging could be stopped by typing into multiple fields at once, one part at a time, randomizing how many characters in each part, and adding other irrelevant data that you delete anyways.
@@logiebogieboo_currI understand you got confused with the bios and the kernel but they aren’t the same thing the kernel is located in the OS meaning that it’s stored in the storage drive not the motherboard
@@creammando It is not. You can try it yourself honestly. Make a dual boot system, install a rootkit and you will notice that the rootkit has access to both operating systems.
@@бастин-д9й dual booting is a different story, i dont know much about how it works but im assuming both oses are connected in some way but thats not a good example, you can search it up, and at least do research like i did to verify your claims because im 100% sure the kernel is in the OS just like how kernel drivers are in the OS so if you wipe out the os and install a new one the kernel drivers go with it since its inside of the OS
You might also wanna know that DDoS stands for Distributed Denial of Service. In this example, it show rather a DoS, since the Distributed warrant flooding from lots of other devices (in particular to make tracing harder)
DoS is a single server flooding requests to a target and DDoS is multiple servers flooding requests to a target (most of the time being part of a botnet) and no its not to make tracing harder its to make the denial of service more effective especially against strong servers.
Sadly, I was a victim of the web browser virus. I started to use another web browser, and like a few months later, my computer got physical damage, and I erased it, and by the time I repaired it, the virus was gone.
the fact that the app zoom has a rat in it, literally with the user’s permission someone can control your mouse, etc (its a feature idk if its still there or not)
No lol thats not a rat, a RAT (explained in the video btw) is a Remote Access Trojan that gives the attacker access to your computer (shell, screen view or both) and they can do whatever they want your pc as programmed into their RAT, for example some RATs dont have it programmed where they can control your mouse, also zoom cant control your mouse and stuff without your permission, that would be illegal and would be detected by antiviruses
My heart stop beating when my computer (almost) got diagnosed with 5 entire freaking viruses just because I wanted to get an extension to hide my mouse pointer for my game and I knew dang well I had to renew the McAfee crap but I guess I didn't need to (So I didn't)
i literally just got down with a playthrough of a game ABOUT viruses. what a coincidence! edit: the game was plague inc. edit 2: so i found a game on steam called "Entodrive". it's about computer viruses. gonna play that soon.
SQL injection: One of the most common ways to get hacked. By not properly sanitizing data sent by a user (such as a search form), an attacker can run arbitrary code on your database.
There's another you missed, called the "Touchscreen Water RAT". After washing your hands and shaking them off to dry them, there is a chance that a droplet will land on your smartphone that you placed near the sink and it will start making the touchscreen go haywire. Usually it's harmless, swiping left, right, up, down but if not stopped in time, it may open up random apps, open up messaging, start texting your ex...
It's also called ghost touching i think My old ipad air 1 did that last year in around june It did it this year too around March and april but it has stopped doing it (for now) I did not put any water or anything near it and i always made sure it was clean Idk why it happened, but the ipad air 1 model is like 10 years old so that must be the problem xx
i once had an encounter with rogue security software that led to me calling a number and downloading a RAT. i never fully got rid of it, but i was so young at the time and it was such a traumatizing experience because i was too afraid to involve my parents.
Cant wait for ramsonware people to hack my pc like "heh heh time to earn bank" then realize all I have is useless images of memes that i wont miss being encrypted
I think you underestimate their determination. If they have no use for you, theyll just fuck around on it or whatever till you do become useful. Or just exploit the next person that is of use to them. I dont think it affects their mental state like that knowing they hacked into a machine of no value to them when all it takes it one person to make their bank.
I unfortunately caught a RAT on my computer recently by getting tricked by a user on discord. Thankfully they only screwed with my discord account and nothing else, but it was still utterly terrifying, especially given I lost access to many friends contacts and servers.
so your more worried of losing contact to your friends and your discord servers then them potentially getting all your passwords and credential information off you
browser highjacking scares me now, as everytime i open firefox, bing will open. i usually just press new tap and firefox opens then close bing but now knowing it could be an issue scares me
i once had a virus that deleted every direct access on my computer and didn't let me use the search feature for searching programs, it happened everytime my computer was turned off, so i did a factory reset (i think they're called that) on my computer and it was gone, but now after like 1-2 years after the incident now my command thing randomly opens up for a split second and then closes
Yeah the cmd prompt opening for a split second is just for windows or the app you are using to run some scripts so they dont get blocked by antivirus or firewall (this does NOT mean the app you are using is a virus)
Maybe 5 of these aren’t technically viruses, but I’m happy you added these tools and processes to inform the general public. You explained them all pretty well and precise, too!
I heard a girl on a TH-cam video talk about how she got malware on her computer and contacted the person who "made" it I suppose. And he asked for a bunch of money so she could fix it, like how can you destroy someones computer then ask for money? 😔
I got rouge security software as my first virus and I was trying to buy “mcafee” or “Norton” or whatever until I went downstairs to ask my mom and she said that that is the virus- been paranoid on the internet ever since 💀
You forgot about one unique type of malware, Rensenware. It doesn’t ask for money, it asks for a score of 200,000,000 in Touhou 12 in its hardest difficulty mode, arguably the hardest of the Touhou games. Of course the coder coded and released a decryptor because he Rensenware’d himself. Problem is… you provide the copy of Touhou 12.
2006 WoW was some dark times when they didn't have authenticator downloading an addon was playing roulette praying that you didn't download a keylogger
i believe i had an adware on my pc at one point. randomly, and without my permission, it would open a thing for McAfee or whatever, with the worlds smallest close button, only able to be clicked on a certain page. my cousin also had this at one point, and i dont know if my pc is further compromised. thank you a ton for the video, to keep us all safe.
5:45 actually happened to my old computer once that sneaky little installer program changed the actual Mozilla Firefox shortcut on the start menu and the desktop so that every time I would click on it, it would open the hijacked home page it took me several months to figure out how to remove
I agree with changing it to malware instead of virus but I don’t think there are enough cyber terms to say “cyber attacks” which was also my first thought after hearing DDoS
Cyberattacks is about right here, 'malware' applies where the attack is some form of software e.g. worm/virus/trojan, pretty much everything before RAM scraping. Most of the things afterwards are either network-based or just methods to describe an attack but not really an attack itself. Social engineering is sort of an umbrella term for other things mentioned in the video that play on the human and may/may not lead to malware infection i.e. phishing, adware, malvertising. Regardless of any pedantic wording necessities, vid's accurate :)
1:09 THERE WAS VERY SCARY WORM THAT JUST: -FOUND A COMPUTER -GETS INSIDE -BREAKS IT WITHOUT BEING AS A LIST AND WITHOUT OPENING IT -REPLICATES ITSELF -SENDS TO OTHERS -REPEATS
Sending this to my grandmother
Haha good one 😂
She will get another virus opening this video
Lol
She will get another one trying to open a laptop
So she could more efficiently get viruses? Genius
I find computer viruses so intriguing. I’ve been testing malware in controlled environments since my late teens!
Same! I find malware interesting. My dad owns a small computer repair business and he sees all sorts of malware
Omg it’s you! I love watching your videos! Viruses are very intriguing and I hope to never accidently get one
IM A FAN PLEASE REPLY
OMG CRYPTO NWO!!!
Hi @CryptoNWO , I really love ya videos where you absolutely torture your laptop/computer
I'd like to add 'spearphishing' to the list, where phishing attacks are generally sent to a demographic or pool of targets, spearphising is tailored to an individual, and typically magnitudes harder to catch than a typical phishing attack.
Love the video :)
It goes into the group of phishing attacks so its not really needed to be put in
@creammando I mean, a good portion of the stuff in the video falls under malware
@@Kitty-xi1sb yea but malware is too general and have many different types but different types of phishing are very similar so spearphishing doesnt need to be put on the list because its just phishing for a specific person
They are a few malware terms here that are not pursuant to the Comptia rules.
@creammando ill agree to disagree with on this one as the social engineering that goes into phishing varies greatly depending on status level of an individual within a company. Whaling is commonly done via spoofing email/documents that appear to be circulating internally on a more "need to know" basis and lean in on personalization while general spearfishing targeting larger groups of grunts within a company can be anything from "are you happy at work" and "see salary ranges for your position" to "fill out this survey, love HR".
Grunts expect very "all hands" generalized emails while higher ups tend to be cc'd for inclusion or are the email target for very specific groups of information.
4:42 i really like how the hacker has a horrendous posture
Bro fr said "Ima be a camel"
Well since the hacker is an actually HACKER he probably spend years on their computer like discord Mods..... except he showers and eats less.
His monitor and keyboard are floating
just like in real life, its accurate
Bro really said "£"
Video idea: Every Martial arts styles explained.
Love all of your videos!
Great idea!
Cool idea! I did Taekwondo at one point!
@@Pupper626same here with Karate
@@Agriz1210 But there are lots of karate styles, so many you could make an entire video about them.
@@directorofnolearning I now have the sudden urge to learn all of the styles of karate in order to get the platinum trophy for karate
Have you heard of the hacker that escaped the cops, they say he ransomware far away
The 36 winged roach will find you
lol you got me
lol
😂
Cybersec comedy gold 🥇
Love how diverse these topics are
Is zip bomb a trojan?
@@kormannn1hmmm
@@kormannn1....
@@kormannn1....
148.2.12h7h
For some reason I expected there would be a sponsored segment promoting some antivirus software or a VPN.
me too kkkkk
@@Miotopi48 ⚠🚨 BRASILEIRO DETECTADO
@@Miotopi48 🚨 BRASILEIRO DETECTADO 🚨
@@Miotopi48 ⚠️ BRASILEIRO DETECTADO ⚠️
@@Miotopi48 🚨 brasileiro DETECTADO 🚨
When you open a pirated game and the cmd window appers for a split second: 🤨
😂😂😂😂😂
Heart skips a beat when that happens.
What site u use
@@JohnathanJohaisen TotallyNotaVirus.Dox
@@JohnathanJohaisenobviously shitty one
I dont know why but hearing about computer viruses gives me some fear
Then you should develop a threat model to actually understand your needs.
me 2 bro im scare of linux penguin error
I am watching this on a virus-infected computer right now. No issues so far.
@@vinnysworkshop omg that's so scary, thats literally what I'm doing rn, the whole laptop got into full screen and a beeping sound that scared me, it said it was infected w 5 viruses or something and that my free trial ended but I don't remember even starting it cuz I've never thought about it
@@sweetmimosamommysaranghae3163 I got my viruses when playing one of Geoguessr's geography games on a Windows 11 Desktop. It was a game about guessing the names of given countries on a world map. A few seconds in, I was prompted with a McAfee screen saying that I was infected, and my computer was spewing notifications about being infected. I have turned notifications off on my computer but am still haunted with the possibility of more serious things happening.
how to give 400k internet users anxiety in 8 minutes
You'll be fine
Hello your computer has virus
If youre not stupid or 70+ years old youre not gonna get a virus
@@HikariSakaihappened to me.. I got a rat and they controlled my pc tryna access my gmail. Luclikly I managed to factory reset it before they could do anything bad
*Windows users.
The worst thing is when you delete a computer virus but then your pants start slipping
huh🤨
@@006kll iykyk
Lmao elite reference
i was searching around the internet
Damn didn’t think anyone remembered that meme lmao
5:43
These softwares are horrifying. One time I tried to get an autoclicker but clicked the fake download link(I didn’t have an adblocker at the time) and this fake software installed an entirely new taskbar, deleting the old one! Huge search engine bar, with ads popping up ON THE AREA WHERE THE TASKBAR WAS!!! This incident will never not scare me.
had the same shit, easiest virus to deinstall, suddenly yahoo popped up and yeah thats the moment the virus got backshots from anti malware
@@souyakawata9449you got that yahoo browser hijack as well? I had some fun trying to figure that out but luckily I was able to find a anti malware software to scan my computer and it went away after. Not that many problems since
I downloaded a game on my mom's phone and it did the exact thing except there was a chance of ads each action
one time i tried to get an auto clicker and it downloaded a random web browser 💀
@@Millie.K.G YES BRO THAT WAS WHAT HAPPENED
Test: starts in 30 minutes and i haven’t studied.
Me asf: all computer viruses explained
Bruh moment
Same wtf
wth
Amazing video! I think its worth mentioning that rootkits often wont target antiviruses at all, as many modern day antiviruses have anti hijacking detection built in. More often than not rootkits disguise themselves as other regularly installed programs or modifying the task manager / process viewer to skip the memory space where the rootkit resides, hiding it from both user and antiviruses.
10/10 video tho
@justsomeone282The only unmodifiable view is one done via a kernel module looking at the data structures directly. Sysinternals RootkitRevealer demonstrates the technique.
Correction on rootkit: Rootkits themselves are not inherently designed to give a malicious actor remote access to a computer, but can do so. Rootkits are designed to be stealthy and concealed, and usually are used to protect other pieces of more specialized malware (like keyloggers) from traditional security measures. The term "root" in rootkit is named after the "root" permission level of unix-based operating systems (administrator/system on windows). Rootkits usually operate at ring 0 (kernel) and can be very difficult to detect, but some are only run in the userspace. Some special types of rootkits can overwrite the master boot record (mbr) or hijack other parts of the boot process. This type of rootkit is called a "bootkit" and be very difficult to detect and remove, even surviving drive wipes. While technically a rootkit can be bundled with a RAT or have RAT functionality, rootkits are often designed to maintain high permission levels on a computer, as well interfere with standard security measures. As such, rootkits are nasty pieces of malware which can bring great harm to a system or network if designed correctly.
No hate! Just wanted to clear this up! :)
@@sandwan4845 no, he said rootkits provide remote access, not all rootkits do. They gain full control over a computer.
nerdddd Xxx
@@Millie.K.G You watched the video too. 🤷♂
@@justsomeweirdduck3311 That’s cuz i’m a nerd too 🤣💀
@@Millie.K.G why I watched it in the first place too. :)
This is actually pretty scary. I didn't know there were so many
There is way more sub-terms and more specialized attacks both hardware and software
The last one is the one that sounds the mildest but it's quite the opposite. Quoting another guy, imagine you work at a high end software developing agency. At lunch, someone casually approaches you and says "hey I'm hungry but I don't know the place yet, can you recommend me some good place to eat?" While it sounds like an innocent question, you're pretty much telling him what places you and your colleagues go for lunch, and where he can find potential targets for whatever devious things he wants to do.
@@OlympusGames-zv2rs Or imagine that the guy just leaves a USB key on a table. Someone will be like "what is this USB", they put it in a computer but there's malware on the USB.
@@gabor6259 thats actually a real attack which is concerning
There's many more sub types and more are likely being created as we speak. Technology advances at a rapid pace so there's likely new ones being developed. Cyber security is a constant cat and mouse game.
This is honestly more useful than the "hacking" software you see in most Cyberpunk games.
Sure
Ew woke cyberpunk game
@@TheRealName7I mean it’s set in the future
@@TheRealName7cry about it
Video idea: every military rank (general, lieutenant) explained in 8 minutes
Edit: sorry I know basically nothing about military
Why 8 minutes
Boring
Wouldn't work as even within NATO the ranks and associated responsibility can vary wildly.
this is a cool idea
seniority can vary a lot between countries, and even between branches. For example, a lieutenant in the navy ranks higher than one in the army.
6:34 POV mcaffee
Omg this is so true, it actually happened to me once
No, McAfee is Not that bad
It is installed it my security by default in my phone
fr
Fr
The tidbit that ads themselves are an inherent security vulnerability is kinda funny
Im getting increasingly paranoid of getting hacked
dont worry just dont do stupid things and you'll be fine
Just don't install things you shouldn't, don't click on links and never get pressured to act immediately.
You'll be fine. 👍
That's what a threat model is for
Yo, don't worry!
They won't target you too much because you aren't famous or wealthy or whatever.
When someone gets hacked, the hacker probably sells their info on the dark web. But low chances of someone buying the info if they're a nobody ¯\_(ツ)_/¯
Try not to click on random links or adverts. If you pirate things, be very cautious because you have a higher chance of getting a virus or being hacked. Pirate and get all of your software in general, from trusted sources ONLY.
Some more advice I have is to keep up with the latest security vulnerabilities and learn how to avoid them.
If you're still scared, it's okay because being hacked isn't fun.
just don't do dumb stuff, if you want to download something do it from an official website and do research abt it
Word of advice about rat viruses (from experience)
If it's the direct kind and not the stealthy type, and you catch the hacker in the act, disable your network and boot the computer in safe mode until you find where the virus is. Some systems will show recently downloaded and modified files so it should be rather easy to locate the rat as I had to do that
What about GOAT files?
@@Mitzi-chan224MD
This is actually a nice run through of everything. Well done mate!
According to the way you described spyware, google is spyware because all the things you described fits google perfectly
Does anyone know where I can get Windows legally, since no antivirus is working for me and I think it's a problem with the operating system?
I got it from BNH Software and it could be a system problem but you have to try it first
From microsoft directly? You dont have to have a license key to use windows you know...
I'm legitimately concerned about my internet searches now...
Dont worry at the end of the day we live on a floating rock
We are noone anyway, big people have the access this way or another
Searching is fine, watching is fine..
Just don't download things you shouldn't. 🙂
download an antivirus or scan every file before installing/opening it, if you have an adblocker and is mostly downloading data from trusted sites then you should be fine
"how to hide my cuts"
I feel like keylogging could be stopped by typing into multiple fields at once, one part at a time, randomizing how many characters in each part, and adding other irrelevant data that you delete anyways.
No
@@DevDoge_ oh
I like how well you interact with your community ❤ and make their ideas come true
3:29 One observation though, the Kernel is not in the OS, the OS is in the kernel
No, the Kernel is IN the Operating System
No, the kernel is is the BIOS (motherboard)
@@logiebogieboo_currI understand you got confused with the bios and the kernel but they aren’t the same thing the kernel is located in the OS meaning that it’s stored in the storage drive not the motherboard
@@creammando It is not. You can try it yourself honestly. Make a dual boot system, install a rootkit and you will notice that the rootkit has access to both operating systems.
@@бастин-д9й dual booting is a different story, i dont know much about how it works but im assuming both oses are connected in some way but thats not a good example, you can search it up, and at least do research like i did to verify your claims because im 100% sure the kernel is in the OS just like how kernel drivers are in the OS so if you wipe out the os and install a new one the kernel drivers go with it since its inside of the OS
You might also wanna know that DDoS stands for Distributed Denial of Service.
In this example, it show rather a DoS, since the Distributed warrant flooding from lots of other devices (in particular to make tracing harder)
DoS is a single server flooding requests to a target and DDoS is multiple servers flooding requests to a target (most of the time being part of a botnet) and no its not to make tracing harder its to make the denial of service more effective especially against strong servers.
3:55 i can imagine my cybercriminal using keylogger wondering why i pressed my arrow keys 5284 times today (i play fnf)
Ohh so that's why my old PC's cursor was moving on its own
Sadly, I was a victim of the web browser virus. I started to use another web browser, and like a few months later, my computer got physical damage, and I erased it, and by the time I repaired it, the virus was gone.
the fact that the app zoom has a rat in it, literally with the user’s permission someone can control your mouse, etc (its a feature idk if its still there or not)
No lol thats not a rat, a RAT (explained in the video btw) is a Remote Access Trojan that gives the attacker access to your computer (shell, screen view or both) and they can do whatever they want your pc as programmed into their RAT, for example some RATs dont have it programmed where they can control your mouse, also zoom cant control your mouse and stuff without your permission, that would be illegal and would be detected by antiviruses
Thanks for getting right to the point I was expecting a 2 minute intro or something like that but it just started on the point of the video, thanks
I need this stuff to make a cybersecurity ontology for a lvl 7 postgrad module (Ontologies and knowledge bases). what a win.
My heart stop beating when my computer (almost) got diagnosed with 5 entire freaking viruses just because I wanted to get an extension to hide my mouse pointer for my game and I knew dang well I had to renew the McAfee crap but I guess I didn't need to (So I didn't)
Had this happen too
it’s probably best to stop using mcafee at this point
2:38 “I can see you :D” Such a cute hacker
1:44 bro was personal with that one 💀💀
Looks like a girl that uses Instagram 24/7
nah- ima make a pop-up ad out of this-
@@ComputerBoyTheEntertainer why
@@weidie2moro just for my upcoming pop-up generator >:)
That was like hot singles in your area ads💀
i literally just got down with a playthrough of a game ABOUT viruses. what a coincidence!
edit: the game was plague inc.
edit 2: so i found a game on steam called "Entodrive". it's about computer viruses. gonna play that soon.
what was the game?
@@mr_mcfire472plague inc.
@@mr_mcfire472 Kinitopet?
I want to know the game too
Whats the game's name?
SQL injection: One of the most common ways to get hacked. By not properly sanitizing data sent by a user (such as a search form), an attacker can run arbitrary code on your database.
Not that common anymore tbh. Most user inputs are sanitized these days. Still possible though, but past its prime imo
ive been watching your videos since the beginning, and your artstyle has gotten very good! great video!
There's another you missed, called the "Touchscreen Water RAT". After washing your hands and shaking them off to dry them, there is a chance that a droplet will land on your smartphone that you placed near the sink and it will start making the touchscreen go haywire. Usually it's harmless, swiping left, right, up, down but if not stopped in time, it may open up random apps, open up messaging, start texting your ex...
It's also called ghost touching i think
My old ipad air 1 did that last year in around june
It did it this year too around March and april but it has stopped doing it (for now)
I did not put any water or anything near it and i always made sure it was clean
Idk why it happened, but the ipad air 1 model is like 10 years old so that must be the problem xx
Great channel.. gets to the point immediately..subscribed :)
i once had an encounter with rogue security software that led to me calling a number and downloading a RAT. i never fully got rid of it, but i was so young at the time and it was such a traumatizing experience because i was too afraid to involve my parents.
Cant wait for ramsonware people to hack my pc like "heh heh time to earn bank" then realize all I have is useless images of memes that i wont miss being encrypted
I think you underestimate their determination. If they have no use for you, theyll just fuck around on it or whatever till you do become useful. Or just exploit the next person that is of use to them. I dont think it affects their mental state like that knowing they hacked into a machine of no value to them when all it takes it one person to make their bank.
lmao 💀
You should care, even if you got ransomware, it can also be a worm that will spread to other devices on your network
At this point they will just destroy the pc
bro, I never buy anything in any of my accounts, once a time I got spyware, bro must have been disappointed to just see random meme screenshots lmao
as a cybersecurity major i loved this!!!
subscribing for more videos, (hopefully more security related videos)
I unfortunately caught a RAT on my computer recently by getting tricked by a user on discord. Thankfully they only screwed with my discord account and nothing else, but it was still utterly terrifying, especially given I lost access to many friends contacts and servers.
so your more worried of losing contact to your friends and your discord servers then them potentially getting all your passwords and credential information off you
same bruh, except they tried to put crypto miners in my pc
browser highjacking scares me now, as everytime i open firefox, bing will open. i usually just press new tap and firefox opens then close bing but now knowing it could be an issue scares me
4:43 He drew the most realistic drawing of a hacker ever.
Why is thinking you have a virus so scary I actually heavy breath
"I tried to stop him!" - 🤓
i once had a virus that deleted every direct access on my computer and didn't let me use the search feature for searching programs, it happened everytime my computer was turned off, so i did a factory reset (i think they're called that) on my computer and it was gone, but now after like 1-2 years after the incident now my command thing randomly opens up for a split second and then closes
Yeah the cmd prompt opening for a split second is just for windows or the app you are using to run some scripts so they dont get blocked by antivirus or firewall (this does NOT mean the app you are using is a virus)
i knew ads were anoying but... this is nr 1 reason to get rid of ads
not all ADs are malicious lmao
@@creammando ok
interesting video! I like how you use paint to explain things
Maybe 5 of these aren’t technically viruses, but I’m happy you added these tools and processes to inform the general public. You explained them all pretty well and precise, too!
2:43 idk, correct me if im wrong, i think kenitopet game works like a RAT virus
I think since a part in the game it controls the mouse
@@VINgaming1113and it can access webcam right?
@@VINgaming1113ye, it’s supposed to be similar to bonzi buddy, a computer malware, to just steal personal information.
@@VINgaming1113
are you really vingaming?
I heard a girl on a TH-cam video talk about how she got malware on her computer and contacted the person who "made" it I suppose. And he asked for a bunch of money so she could fix it, like how can you destroy someones computer then ask for money? 😔
more scamming
sadly thats how ransomware gangs work
Definition of ransomware.
I'll collect them all like thanos
😂
rip
💀
Gotta catch em' all
12 year old mfs be like
Adware and browser hijackers are my childhood, every friend had them in their family computers as well as at least 3 toolbars
I got rouge security software as my first virus and I was trying to buy “mcafee” or “Norton” or whatever until I went downstairs to ask my mom and she said that that is the virus- been paranoid on the internet ever since 💀
You forgot about one unique type of malware, Rensenware. It doesn’t ask for money, it asks for a score of 200,000,000 in Touhou 12 in its hardest difficulty mode, arguably the hardest of the Touhou games. Of course the coder coded and released a decryptor because he Rensenware’d himself.
Problem is… you provide the copy of Touhou 12.
well explained like always.
I love your videos. I'm actually learning stuff from you, thanks. You should do a video based off of diseases and how they harm/kill
7:33 me when i forget my Apple ID…
LOL😂😂😂
Ain't no way the hacker using a keylogger on a gamer, the gamer will crash the hacker's computer faster than he can react 💀
Keylogger vs average DMC player
Keylogger vs average fnf player
Keyloggers steal video game accounts all the time, what u talkin about
Wasdwawawadqwawadwasdwawadwasd
2006 WoW was some dark times when they didn't have authenticator downloading an addon was playing roulette praying that you didn't download a keylogger
I got RATed once while I was watching yt and I was just talking with him on the yt search bar 💀💀💀
Lol
What did u say lol
7:51 isnt file shredder a type of wiper?
yes, you gotta trigger it yourself but like i think it still fits
you should do types of music next
you would be suprised how easy it actually is to make stuff like phishing sites, keyloggers, spyware and rats
I know im a white hat
the amount of anxiety this gives me is uncomfortable
after this video i understand that my pc is now completely fucked up
3:46
Just imagine them just spying you and just witnessed you downloading images of drawn pregnant men.
I once got a cryptojacker, my memory was at 100% and my PC looked like it was gonna set on fire. II think the program name was "Garten of Banban"
For those of you interested DDOS stands for Distributed Denial of Service attack
i believe i had an adware on my pc at one point. randomly, and without my permission, it would open a thing for McAfee or whatever, with the worlds smallest close button, only able to be clicked on a certain page. my cousin also had this at one point, and i dont know if my pc is further compromised. thank you a ton for the video, to keep us all safe.
How did you get rid of it I have the same thing. Do you play dead frontier?
5:45 actually happened to my old computer once
that sneaky little installer program changed the actual Mozilla Firefox shortcut on the start menu and the desktop so that every time I would click on it, it would open the hijacked home page
it took me several months to figure out how to remove
As a younger kid i thought it was just RAT and wiper
This explains it soo good & has a nice length of time :) Love it!
Love your video bro ♥️
I have a video idea where you explain all leaked or pirated movies quality and their comparison 🔥
Plz ✨
I don't know why, but the idea of someone watching me watch this video and just sweating perfusely is funny to me
6:45 Somebody tried to do that to me by SMS, hiding it as a free money scam or something, my dad :) told me to delete that.
It also was in diffrent languages, and I had to find the eng. one among many.
Keylogger: *Tracks the keys you press, The one person who only uses their computer for gaming, Hacker: what does this all mean
6:29 Literally tech support scammers in a nutshell
Very high quality video!
Wouldn't it make sense to call this "Every Type of Computer Malware" instead? Or maybe "Cyber Attack".
I agree with changing it to malware instead of virus but I don’t think there are enough cyber terms to say “cyber attacks” which was also my first thought after hearing DDoS
Virus is just a blanket term
Cyberattacks is about right here, 'malware' applies where the attack is some form of software e.g. worm/virus/trojan, pretty much everything before RAM scraping. Most of the things afterwards are either network-based or just methods to describe an attack but not really an attack itself. Social engineering is sort of an umbrella term for other things mentioned in the video that play on the human and may/may not lead to malware infection i.e. phishing, adware, malvertising. Regardless of any pedantic wording necessities, vid's accurate :)
I think "computer virus" is a more understandable term for the average user
I’m studying to become an IT technician, and this, believe it or not, actually helps. Thanks!👍
trojan got its name because of the trojan horse story! when they disguised the attack as a gift! (this may be common sense but i love history)
Nah, this taught me far more in eight minutes than my IT classes in about 4 months 💀
New fear unlocked
Thanks a lot I will be passing my exam all thanks to you❤❤🎉🎉
The viruses in my computer aint gonna like this one
Excellent explanation. Now i know some stuff that we didn't know
My virus be like:hey i miss you,could you come hangout with me at 3 am 💀💀💀
8:04 why he looks so innocent while explaning
Video Idea: Every physician specialization of medicine explained
An April Fools Day video that is not an April Fools joke?
0:00 Malware
0:17 Virus
0:51 Worm
1:28 Trojan
1:59 Mavertising
2:27 RAT
2:44 Backdoor
3:00 Rootkit
3:36 Spyware
3:53 Keylogger
4:07 Ransomware
4:28 Fileless malware
4:49 Adware
5:09 RAM Scraper
5:19 DDoS Attack
5:44 Browser hijacking
6:11 Cryptojacking
6:29 Rogue Security Software
6:42 Phishing
7:09 Hybrid Malware
7:22 Brute Force Attack
7:47 Wiper
7:57 Social Engineering
1:09 THERE WAS VERY SCARY WORM THAT JUST:
-FOUND A COMPUTER
-GETS INSIDE
-BREAKS IT WITHOUT BEING AS A LIST AND WITHOUT OPENING IT
-REPLICATES ITSELF
-SENDS TO OTHERS
-REPEATS
I like this channel very informative 👍