Blockchain tech doesn’t benefit Cyber Security. It’s another revolutionary tech in terms of mainly sending money peer to peer without involvement of govt or any third party entity.
@@VasuYT1 it's just a technology, governments can also use this technology, with all due respect, I just how block chain can help cybersecurity, sir has lot of experience in cybersecurity space, so I assumed he may provide some valuable content.
@@VasuYT1 Maybe you are wrong. Blockchain can be used for other things as well. For example, we can store people's property documents in multiple blocks managed by the government without involving a third party. If anyone hacks these documents by stealing a key, it will alert the respective party and other blocks. There is still a chance of hacking, but it will be very small.
@@jaswanthroyal3268 Blockchain can be used for other things as well. For example, we can store people's property documents in multiple blocks managed by the government without involving a third party. If anyone hacks these documents by stealing a key, it will alert the respective party and other blocks. There is still a chance of hacking, but it will be very small.
Sir, Topic-1 if there is a Country which is under cyber attack, and every critical infrastructure is affected, how would the public and private sectors act and what kind of policies would be invoked and would there be any disaster management plan or do we have disaster management preparedness. Topic-2: Are there any cybersecurity summits that happen in our country and competitions not only hacking in other security related areas.
Industrial automation or IOT systems are going towards edge computing where we no need to send the sensitive data to cloud do the data processing in edge devices like microcontrollers. Cloud data ni ela hack chestaaru anedi chepte baaguntundi because IOT and Machine learning vast ga use chestunnaru so students or techies ki idi baga use avtadi info.
Awesome and interesting content! Can you please cover the Cyberattack of Maersk which happened in 2018 in the future episodes? It will be a great learning with do and don’t for all.
That was a nice pod cast. Please suggest a few technologies that the upcoming students need to learn in this AI world. Also suggest the technology application with real world examples.
Topics and solutions needed 1. Thousands of Indian mobile SIMS going to Vietnam, reason? 2. Where could be Pegasus software now which brought by earlier govts in AP. Is that single person able to handle today tool. 3. If I lost phone, with find my device active, still not found.. what are worst case scenarios and solutions. 4. Gold and drug busts in airports and ports 5. Deep fake what's app call to request money as friend or family. 6. Naked vedios blackmail solutions. 7. How hard or easy an EVM to hack. 8. How easy an normal router wifi to hack, safety tips. 9. Hackers competetions in other nations including neighbours, record level 7 seconds to hack iPhone? Possible? 10. What if a money heist kind of scenarios in India, how well established our depts are! who and how they handle!!!
Murali sir tell about your self means where are you from and what's your roots ఎందుకంటే మీరు ఇంగ్లీష్ ఎలా matlaaduthunnaroo తెలుగు కూడా కచ్చితంగా ఎలా maatlaaduthunnaru సిర్.......
The pegasus should be covered as it made a lot of chaos in India. How israel compiled software had waves in India, who was responsible ? What was the impact? What were the mitigation steps taken? How it was the shutdown?
Today we have faced one only fraud they have taken mobile access and looted 2 lakhs. Really this online fraud is horrible, small mistake (negligence) costed huge loss
Dear sir can you please explain about Israel technology and how they will caught criminals .. how many types of methods they will use .. please explain. If u do episode on this I think this is gonna be a viral and good video
Mahesh cooperative bank robbery case study cheppandi sir and a bank vallu proper IDS/IPS systems setup chyaledhu and vallu oka chinna company tho software chepincharu. so okasari a case meru study chesi maku okasari explain chyandi sir.
Please consider sharing your views on - Stock markets, share price manipulation and gambling chances by big players.. finally, how to crack that in practice.
Mastaru garu... I have a common query, like when police arrest some one assuming they made a crime and due to circumstances police kill them( in the name of......) if such things happen how a common man(victim family members) has to react to know the truth. Could you please give glimpse info on this which is very common scenario we are seeing now a days.
Pramod - I am not a criminal lawyer, but still my response as common man is the concerned personnel will depict will resort to these kind of behaviour when they fail to investigate the case, in any case the stance of courts have turned to be very strict and they impose serious punishment to erring officers more often than not.
Edho podichedham Ani ...oka betting app lo aadhar. PAN card front back photos tho sahaa details echesaaa.... Eppudu nenu em chesthe future lo veeti valla problem raakundaa untaadho chepthaaraa please....
Viewers will be very happy if you explain Bangladesh Central Bank hacking case. Where some transactions are stopped by SWIFT payment network fortunately...
Can you plz elaborate on mobile consents which we give for multiple apps such as cred, Truecaller and Google. What access do these applications have , I doubt they are listening to all our conversations and come up with add suggestions.
I have one doubt, this is friction on movies but many science and adventure movies they are saying we have all access for every CCTV AND every government portal how is this possible this only for making that situation or its true?
Sir we need cyber sequrity course from from murali sir because he had lot of experience in this field we don't know the root map how it goes and it is also very expensive in the market so we could request to guide the people who are interesting in the cyber sequrity plz plz plz plzzz think about it sir I m full of respect uh sir plz give me a details to I earn course with u personally with any cost kindly kindly kindly think about these sir
Don’t fall for honey traps and don’t click on any links. Don’t give your personally identifiable info, cards details etc. phone number is very key for your life, your bank, aadhar, pan, ITR etc links to your phone if it’s gone your life will turn upside down.
Sir, present wfh lo banking system like KYC completely license, personal photo passport, visa, address, phone number, address ani ee wfh Lappy lo unayi and also balance in card is that info easy to steal?
Every lock breaks eventually - but how long is that duration- is what matters - conspiracy theories exist for every topic in the world - you have to make a choice to believing in science or fiction eventually.
Murali sir tell me about boat data breach and other data breach which are exposing your data and passwords. In my case 3 mouths back i am Creating the AWS account while am using Google password to it (your password is breached in dark website try another password) this note is showcased after that i changed my passwords but how they getting this data from Google
Bro I got a job email and interview and everything was done later before releasing offer letter they asked me to submit passport and resume of mine I shared them and later I realized it was a fake job email. I have registered the complaint in cyber crime online. Should I also need to go to police station what could be the resolution for this please suggest me.
case 1 AIMS HACK in our country case 2 MHA informing in Press conference that on the day of ayodhya temple pran pratista jan22 this year we had 1200 ips blocked reg cyber attack on pls detail teh info
Hi, The content is very helpful and knowledgeable,thank you very much for taking this initiative My question is Our Indian hackers are capable of hacking neighbour country which has different language altogether? Is there any such incident earlier happened?
The language of Internet is TCP/IP - all packets traverse using that, you are referring to Conte t on the websites, which is not relevant when we want to hack, the attack is on the open vectors on the Applications and OS.
@@MuraliMastaru thanks for your reply Some time back I heard Chinese hackers made down our government websites It is just speculations or is it really?
Posting comment in behalf of telugu cyber security aspirants, how the future of manual penetration testing jobs in future. Is it true it is replaces by Ai ?
That's a very large generalized comment, remember new software always has unknown pattern of bugs and hence human intelligence will always be needed, but routine/published vulnerabilities may not need humans per se.
No one knows and aware about like pagasus type technology..and how the app will be works ? And how they hack mobiles or laptops … etc. without using links .. how we can protect our mobiles from Pegasus type technologies.. can you give us brief explanation…
Full explanation on block chain regarding how it is benefits cyber security and how crypto can be lost or stolen.
Blockchain tech doesn’t benefit Cyber Security. It’s another revolutionary tech in terms of mainly sending money peer to peer without involvement of govt or any third party entity.
@@VasuYT1 it's just a technology, governments can also use this technology, with all due respect, I just how block chain can help cybersecurity, sir has lot of experience in cybersecurity space, so I assumed he may provide some valuable content.
@@VasuYT1lot of companies or projects due to vulnerabilites in web3.0...
@@VasuYT1 Maybe you are wrong. Blockchain can be used for other things as well. For example, we can store people's property documents in multiple blocks managed by the government without involving a third party. If anyone hacks these documents by stealing a key, it will alert the respective party and other blocks. There is still a chance of hacking, but it will be very small.
@@jaswanthroyal3268 Blockchain can be used for other things as well. For example, we can store people's property documents in multiple blocks managed by the government without involving a third party. If anyone hacks these documents by stealing a key, it will alert the respective party and other blocks. There is still a chance of hacking, but it will be very small.
Real hacker ni theeskocchi oka podcast cheyyandi mastaruu...
Sir,
Topic-1 if there is a Country which is under cyber attack, and every critical infrastructure is affected, how would the public and private sectors act and what kind of policies would be invoked and would there be any disaster management plan or do we have disaster management preparedness.
Topic-2: Are there any cybersecurity summits that happen in our country and competitions not only hacking in other security related areas.
kudos for the efforts Murali mastaru , I am into cyber security and I can relate to the all the cases that you guys are discussing
Avunaa bro!! Ye domain lo work chesthunnaaru?
Murali Sir #Pegasus (spyware) if you could do a small episode on this, please ?
Block chain + Elections
Blockchain + Donations sites (for transparency of funds)(ketto campaigning fraud during COVID)
India's own Blockchain network ?
Industrial automation or IOT systems are going towards edge computing where we no need to send the sensitive data to cloud do the data processing in edge devices like microcontrollers. Cloud data ni ela hack chestaaru anedi chepte baaguntundi because IOT and Machine learning vast ga use chestunnaru so students or techies ki idi baga use avtadi info.
i really like how you are explaining things.
This is the content, which could understand people after 15 years ...
Nice daily make one video like this to cover all hacking news please sir..
Awesome and interesting content! Can you please cover the Cyberattack of Maersk which happened in 2018 in the future episodes?
It will be a great learning with do and don’t for all.
That was a nice pod cast. Please suggest a few technologies that the upcoming students need to learn in this AI world. Also suggest the technology application with real world examples.
Your experience is useful for movie writers
I used work on OSS configurations for a huge telecommunication company in US. Microwave is bloody complex configuration to do.
Duvel case: IT SYSTEMS shutdown chesi format cheytam vala asalu ealaa attack jarigindi ani investigation ealaa chestaaru?
Shutdown ante... for outside world and isolated them to only their access
Topics and solutions needed
1. Thousands of Indian mobile SIMS going to Vietnam, reason?
2. Where could be Pegasus software now which brought by earlier govts in AP. Is that single person able to handle today tool.
3. If I lost phone, with find my device active, still not found.. what are worst case scenarios and solutions.
4. Gold and drug busts in airports and ports
5. Deep fake what's app call to request money as friend or family.
6. Naked vedios blackmail solutions.
7. How hard or easy an EVM to hack.
8. How easy an normal router wifi to hack, safety tips.
9. Hackers competetions in other nations including neighbours, record level 7 seconds to hack iPhone? Possible?
10. What if a money heist kind of scenarios in India, how well established our depts are! who and how they handle!!!
This a lot of home work - OMG
Explain about " XZ & jia tan " backdoor
Murali sir tell about your self means where are you from and what's your roots ఎందుకంటే మీరు ఇంగ్లీష్ ఎలా matlaaduthunnaroo తెలుగు కూడా కచ్చితంగా ఎలా maatlaaduthunnaru సిర్.......
NFC hacking gurinchi video cheyandi sir..
The pegasus should be covered as it made a lot of chaos in India. How israel compiled software had waves in India, who was responsible ? What was the impact? What were the mitigation steps taken? How it was the shutdown?
Solarwinds attack and Log4j explain these!!
Nice Information mastaru 😊
Please please please make a full proof video on Pegasus spyware. Please....
Explain about most recent cyber cases in india and how in future the attacks will be there.. Thank you masteruu
Waiting for hacker episode 🔥🔥🔥🔥🔥
Pithapuram election is reging pls investigation ...?
Guriji....please check my preferences below:-
1. State sponsored hacking groups
2. APTs
We need some Worlds top 3 mostly interesting hacks and how they catch
Zero day attack is a vulnerability can’t be find by developers who develop software
Nenu ap gov website loo vulnerability find chesi .. lopala data motham .. edit and manage chesey antha vulnerability... But mana gov not responding 😂😂
I saw all of your videos. Thanks for sharing the knowledge. Why the call recording has disabled in new mobile phones. Pls can u tell the reason for it
Why not UPI is hackable?
Total India using it.
Is it dangerous in future that we can loos the money?
Now money is just number in digital!!!
Please tell us about Pegasus spyware …
ట్రెయిన్ signal trap చేదానికి వీలు ఉంటుందా ఈ మధ్యన జరిగిన ట్రెయిన్ ఏక్సిడెంట్ బాస్ చేసుకుని చెప్పండి......
Today we have faced one only fraud they have taken mobile access and looted 2 lakhs. Really this online fraud is horrible, small mistake (negligence) costed huge loss
Mi experience share cheyyandi anna ela decode chestaru oka problem ni avi chalu🎉
I want know about how AI going to impact the cyber world.
Sir do a video about Dell finance app
Dear sir can you please explain about Israel technology and how they will caught criminals .. how many types of methods they will use .. please explain. If u do episode on this I think this is gonna be a viral and good video
Please do a video on bitcoin. What is it? How it works? Why hackers use bitcoins for ransomware payments
Hello sir , please guide or provide a road map for students who are studying cyber security covering how they become a great cyber security expert
How is crypto and blockchain related to cybersecurity
Mahesh cooperative bank robbery case study cheppandi sir and a bank vallu proper IDS/IPS systems setup chyaledhu and vallu oka chinna company tho software chepincharu. so okasari a case meru study chesi maku okasari explain chyandi sir.
Hi bro em work chestavu nu
Please Google me
Please consider sharing your views on - Stock markets, share price manipulation and gambling chances by big players.. finally, how to crack that in practice.
I am not a expert on these topics - hence will not comment. But we can bring in an expert.
@@MuraliMastaru thank you for responding ❤️
Hi bro, cryptos n stocks fraud gurinchi chepandi
Mastaru garu...
I have a common query, like when police arrest some one assuming they made a crime and due to circumstances police kill them( in the name of......) if such things happen how a common man(victim family members) has to react to know the truth. Could you please give glimpse info on this which is very common scenario we are seeing now a days.
Pramod - I am not a criminal lawyer, but still my response as common man is the concerned personnel will depict will resort to these kind of behaviour when they fail to investigate the case, in any case the stance of courts have turned to be very strict and they impose serious punishment to erring officers more often than not.
I could immediately think of a name which starts with Initials of South Africa followed by double J and an Or !!
Edho podichedham Ani ...oka betting app lo aadhar. PAN card front back photos tho sahaa details echesaaa....
Eppudu nenu em chesthe future lo veeti valla problem raakundaa untaadho chepthaaraa please....
Stock market kii SEBI vundi kadhaa mari crypto currency kii regulations who evaruuu
Good education
What is computer networking how it works
Viewers will be very happy if you explain Bangladesh Central Bank hacking case. Where some transactions are stopped by SWIFT payment network fortunately...
This is good one to discuss - let me do a short on this.
Frequently VMware systems are getting malware attacks. We know this company is big cloud and part of broadcom now. Can you explain about this.
Ts phone tapping and Pegasus gurinchi discuss cheyandi
Phone Tapping is coming very soon....
How a decentralised, distributed and immutable systems can be useful for safe keeping of records and expose those records if necessary
Boat company customer data hack aindhi kadha, konchem detailed review ivvandi sir.
Can you plz elaborate on mobile consents which we give for multiple apps such as cred, Truecaller and Google. What access do these applications have , I doubt they are listening to all our conversations and come up with add suggestions.
I have one doubt, this is friction on movies but many science and adventure movies they are saying we have all access for every CCTV AND every government portal how is this possible this only for making that situation or its true?
Superb sir. Ty for the info
security gaa eelaa ?
Is indian rupee coming with block chain technology like bitcoin way buy/sell
Please change the shirt colour of host
can you make a detailed video on Mahesh Bank fraud Hyderabad branch
Please make a video on cyber security detailed roadmap for freshers
Already done
Already done...check videos
@@ShowTime31158 yes I have already gone through that video but if he eloborate road map it would be more helpful
We able to send alert notification along with required action to take with the help of automation using Ansible and other tools😅🔥
What kind of software are you using to send notifications if there is hack or ddos attack ? Ansible can’t send alerts for sure…
Sir we need cyber sequrity course from from murali sir because he had lot of experience in this field we don't know the root map how it goes and it is also very expensive in the market so we could request to guide the people who are interesting in the cyber sequrity plz plz plz plzzz think about it sir I m full of respect uh sir plz give me a details to I earn course with u personally with any cost kindly kindly kindly think about these sir
News related to anonymous
Very informative
Sir would you please EXPLAIN HOW TO PROTECT MY SELF FROM CYBER CRIMES ( MONEY MATTERS)
Don’t fall for honey traps and don’t click on any links. Don’t give your personally identifiable info, cards details etc. phone number is very key for your life, your bank, aadhar, pan, ITR etc links to your phone if it’s gone your life will turn upside down.
can you talk about snowden movie
Sir, present wfh lo banking system like KYC completely license, personal photo passport, visa, address, phone number, address ani ee wfh Lappy lo unayi and also balance in card is that info easy to steal?
what ever the news maybe but please keep doing.
Cyber security course nerchukunte bayata market unda
How can we secure our home wifi connections
I want to know about how to work ECIL.....is it possible to manipulate EVM's by chance any party's .....?
Every lock breaks eventually - but how long is that duration- is what matters - conspiracy theories exist for every topic in the world - you have to make a choice to believing in science or fiction eventually.
Murali sir, I want to learn cybersecurity from you..are u providing any coaching by the way..guide us please 🙏
Murali sir tell me about boat data breach and other data breach which are exposing your data and passwords. In my case 3 mouths back i am
Creating the AWS account while am using Google password to it (your password is breached in dark website try another password) this note is showcased after that i changed my passwords but how they getting this data from Google
Can you please go through online course scam i.e., Skill lync and some shakes that would reduce body i.e Herbalife
Hello sir i want to learn cyber security could please suggest one website from basics to advance in cyber security
In recent times we have issue with binace(crypto) can you take that case and exolane dep undersatng that ? its realy help !!..
How to enter into cyber field.i am doing engineering and I am desperate to go into cyber field but I have idea how to get in
Good... Script readers 📖📖📖
Bro I got a job email and interview and everything was done later before releasing offer letter they asked me to submit passport and resume of mine I shared them and later I realized it was a fake job email. I have registered the complaint in cyber crime online. Should I also need to go to police station what could be the resolution for this please suggest me.
case 1 AIMS HACK in our country
case 2 MHA informing in Press conference that on the day of ayodhya temple pran pratista jan22 this year we had 1200 ips blocked reg cyber attack on pls detail teh info
Sir can u say abt the topic dark web
Where can we learn the cyber security ??
Topic: how Crypto coins mining works and hacking of crypto currency?
Cyber security job resources.if possible course pettandi
Tor and kevin
Love you murali master sir try to make new videos sir
Hi,
The content is very helpful and knowledgeable,thank you very much for taking this initiative
My question is
Our Indian hackers are capable of hacking neighbour country which has different language altogether?
Is there any such incident earlier happened?
The language of Internet is TCP/IP - all packets traverse using that, you are referring to Conte t on the websites, which is not relevant when we want to hack, the attack is on the open vectors on the Applications and OS.
@@MuraliMastaru thanks for your reply
Some time back I heard Chinese hackers made down our government websites
It is just speculations or is it really?
Posting comment in behalf of telugu cyber security aspirants, how the future of manual penetration testing jobs in future. Is it true it is replaces by Ai ?
That's a very large generalized comment, remember new software always has unknown pattern of bugs and hence human intelligence will always be needed, but routine/published vulnerabilities may not need humans per se.
Penetration testing complete guide
Yes.
Meeku yem kavaali andhuloo
Bro!! Meeku yem kavaali andhuloo
Can we lock hacker details in hardware system using embedded system
Can you elaborate?
@@MuraliMastaru no sir it's my doubt
Please suggest some good antivirus software for cyber security
Microsoft Defender is pretty decent, make sure auto update is on.
@@MuraliMastaru thank you
No one knows and aware about like pagasus type technology..and how the app will be works ? And how they hack mobiles or laptops … etc. without using links .. how we can protect our mobiles from Pegasus type technologies.. can you give us brief explanation…
Zero day based
డిటెక్టివ్ నారద sorry detective Murali master
Why Hackers choose Linux servers more than windows
Flexibility of Shell (s) , access to tools, access to source code are few factors
Hey murali, wts the the point of keeping subtitles in Telugu, if you are speaking in Telugu, I hope i can see English subtitles back..!!
TH-cam is playing tricks with us, we will fix it
Sir try complete English conversation that will definitely help and reach more recipients
Aire Port lo bording pass tho account Hack chayavacha mastaru
Airport boarding pass does not have much info beyond the individual/flight/booking I'd that's all