High Definition Standard Definition Theater
Video id : kpVIbS8YDNs
ImmersiveAmbientModecolor: #bfb09a (color 1)
Video Format : (720p) openh264 ( https://github.com/cisco/openh264) mp4a.40.2 | 44100Hz
Audio Format: 140 ( High )
PokeEncryptID: b54da0be1fd410033165faa1809f0b597c2827357756ec2ae0ffef8193d855e3b84f15b39a37b9309b42026419c1e292
Proxy : eu-proxy.poketube.fun - refresh the page to change the proxy location
Date : 1732843459914 - unknown on Apple WebKit
Mystery text : a3BWSWJTOFlETnMgaSAgbG92ICB1IGV1LXByb3h5LnBva2V0dWJlLmZ1bg==
143 : true
Hate to be Alarmist But This Kind of Attack is a Matter of Time
Jump to Connections
10,684 Views • May 14, 2024 • Click to toggle off description
Full video here:    • How the World’s First CYBERWEAPON des...  
Stuxnet was the world first known cyber weapon. It was a digital worm responsible for nearly destroying Iran's nuclear program. Although this worm did limited damage outside of nuclear facilities in Iran, it showed what is possible. It opened up a Pandora's box of potential threats. Nothing is off limits. Anything connected to the internet or a computer is susceptible to attack. A major attack on infrastructure is only a matter of time!
Metadata And Engagement

Views : 10,684
Genre: Science & Technology
License: Standard YouTube License
Uploaded At May 14, 2024 ^^


warning: returnyoutubedislikes may not be accurate, this is just an estiment ehe :3
Rating : 4.707 (34/430 LTDR)

92.67% of the users lieked the video!!
7.33% of the users dislieked the video!!
User score: 89.00- Overwhelmingly Positive

RYD date created : 2024-06-04T01:10:41.967132Z
See in json
Connections
Nyo connections found on the description ;_; report an issue lol

33 Comments

Top Comments of this video!! :3

@isthattrue1083

6 months ago

IoT have no security anyway

10 |

@adilsongoliveira

6 months ago

Stuxnet wasn't the first virus to target hardware. In the 80's some CRTs were vulnerable to damage if you forced them to operate in frequencies beyond their capabilities, some DOS viruses did that.

2 |

@sadderwhiskeymann

6 months ago

the most recent (kinda related) horror story I came across:
a year or so ago a scientist (cannot remember what kind of scientist but I think a computer one) was granted beta access to gpt3,5. he had an interesting experiment to task it.
having a pet in the house with an automatic feeder, he provided gpt with internet access and a python virtual compiler (I'm not sure compiler is the right term but you get the idea)
he asked for a picture of his house.
the gpt got his ip, the feeder model, went through gawd knows how many forums, found a security breach in the feeder, found or created python code to perform the task and voila! a picture of his room!!

needless to say he lost his sleep for about a week!
That I call spooky!

2 |

@garrett6064

6 months ago

All of that stuff should be kept off the internet. Why does the electrical grid controls need to be on the internet? I can understand some of the office computers, but not grid controls. This weaknes is probably because they get away with 30 fewer employees, so their work can be done remotely. But opens a huge national security risk.

2 |

@HyenaEmpyema

6 months ago

I disagree about the air gap. Yeah stuxnet "jumped an airgap", but it was still infiltrated by someone who had physical access. If you have physical access to a system, all bets are off regarding security.

Power plants and major factories, etc should simply not be connected to the internet. there's no reason to for them to be. If an employee jumps the gap and puts malware on it, thats sabotage, not hacking.

3 |

@roelrovira5148

6 months ago

Solutions exist long time ago - Mechanical and Analog Electronic Systems and controls.

|

@Craig332

6 months ago

I consider this in relation to the circumstances surrounding the recent Francis Scott Key bridge collapse

|

@Phoenixspin

6 months ago

Arvin, please stop scaring me. I already have enough to worry about.

2 |

@slightly-biased

6 months ago

Malware?

Beware!

|

@nhbons783

6 months ago

IT WAS ME KANYE! I WAS THE ONE WHO HACKED YOUR FRIDGE AND EXPIRED YOUR MILK!

4 |

@thomasp506

6 months ago

So how to they get around air gaps?

|

@bobovv6060

6 months ago

Scary. A hacked fridge that will only order broccoli !

5 |

@metagencybrid310

6 months ago

More reason to just keep most of my devices dumb.

3 |

@MJC22.03

6 months ago

My vacuum cleaner has Youtube shorts, tictoc, and X social media aps buitlt in.....and it still sux !

|

@enzop2835

6 months ago

I dont care about broken toasters, I care about broken souls. Let's keep digging and educating the people.

|

@KJ-xt3yu

6 months ago

anything with add's, can host payloads.

example: bitcoin miners in add's, all the reports of malware being served via add's.

|

Go To Top