Library

Video Player is loading.
 
Current Time 0:00
Duration 10:32
Loaded: 0.00%
 
x1.00


Back

Games & Quizzes

Training Mode - Typing
Fill the gaps to the Lyric - Best method
Training Mode - Picking
Pick the correct word to fill in the gap
Fill In The Blank
Find the missing words in a sentence Requires 5 vocabulary annotations
Vocabulary Match
Match the words to the definitions Requires 10 vocabulary annotations

You may need to watch a part of the video to unlock quizzes

Don't forget to Sign In to save your points

Challenge Accomplished

PERFECT HITS +NaN
HITS +NaN
LONGEST STREAK +NaN
TOTAL +
- //

We couldn't find definitions for the word you were looking for.
Or maybe the current language is not supported

  • 00:00

    Hello World, Apple is introducing "Lockdown Mode", a new and unprecedented security feature

  • 00:05

    for iPhones and Macs, that aims to combat "mercenary spyware", in particular "state

  • 00:10

    sponsored mercenary spyware", which has been a big problem over the last few years.

  • 00:14

    For the simple reason that governments around the world are quite keen on hacking into the

  • 00:18

    phones of journalists and activists, this demand has created companies like "NSO Group"

  • 00:24

    - an Israeli business which employs hundreds of hackers to find severe vulnerabilities

  • 00:28

    in mainly iOS and Android phones, they then package these up into spyware software which

  • 00:33

    they sell to governments of dubious moral standing, to use against quote "terrorists

  • 00:37

    and criminals" - but on occasion this spyware is seemingly used against other groups, allegedly

  • 00:43

    of course.

  • 00:45

    Tech giants like Apple aren't happy about this, whether that's because they actually

  • 00:49

    care about their user's privacy or because constant news of their devices being hacked

  • 00:53

    just isn't a good look - I'll leave up to your judgement.

  • 00:56

    But either way Apple has done a fair bit to thwart spyware made by companies like "NSO

  • 01:01

    group" including beefing up iOS security and implementing a notification system for people

  • 01:06

    targeted by state sponsored hackers.

  • 01:09

    Apple is also suing "NSO Group", pledging to donate any damages to anti surveillance

  • 01:13

    organisations.

  • 01:15

    But Apple's latest idea is called "Lockdown mode" which will arrive in the next versions

  • 01:19

    of iOS and MacOS, now this feature isn't a gimmick, it is a real attempt at improving

  • 01:24

    a device's security.

  • 01:25

    "Lockdown mode" takes the relatively simple approach of reducing your device's attack

  • 01:30

    surface - in practice this means that by enabling "Lockdown mode", you are disabling a bunch

  • 01:36

    of your phone's features.

  • 01:37

    For example, when "Lockdown mode" is enabled, in the Messages app "Most message attachment

  • 01:42

    types other than images are blocked."

  • 01:44

    The whole point of doing this is that whilst I suppose there is someone out there who finds

  • 01:49

    it useful that the Messages app can handle a wide array of attachment formats, this functionality

  • 01:54

    introduces a lot of code which could potentially contain vulnerabilities.

  • 01:58

    And in the past, it has!

  • 02:00

    One of the most famous exploits that "NSO Group" used was called "FORCEDENTRY", it worked

  • 02:05

    by using a maliciously crafted pdf file.

  • 02:08

    And by merely sending the malicious pdf file to a victim through the "Messages App" you

  • 02:12

    could take over their entire iPhone, all without them even knowing - a bad actor could then

  • 02:17

    exfiltrate a victims files, read their messages, record their microphone and so on.

  • 02:22

    This exploit was allegedly used to target "Jordanian Human Rights Defenders and Journalists".

  • 02:28

    Now, receiving PDF files isn't really essential to an iPhone's functionality, so in "Lockdown

  • 02:33

    Mode" this feature is removed.

  • 02:35

    As well as other features that could be exploited like "just-in-time (JIT) JavaScript compilation"

  • 02:41

    when you're browsing the web, Facetime calls from people you don't have in your contacts,

  • 02:45

    and wired connections with a computer when your phone is locked.

  • 02:49

    I mentioned at the beginning of this segment that "Lockdown mode" is kinda unprecedented,

  • 02:54

    that's because nothing like it has come before.

  • 02:56

    No other major phone manufacturer has intentionally limited their device's functionality in order

  • 03:01

    to improve security.

  • 03:03

    However this new feature isn't for everyone, obviously it's not going to come enabled by

  • 03:08

    default, it's only meant to be used by people who suspect they're at risk of being targeted

  • 03:14

    with advanced spyware, which probably isn't you or I. Nevertheless it is, shall we say,

  • 03:20

    encouraging that Apple is introducing a feature like this, it's only going to be used by a

  • 03:24

    very small number of people, and will on paper at least make Apple no money.

  • 03:29

    That being said, it is a pretty good talking point for them, so I imagine we can expect

  • 03:34

    some bragging about it at the next keynote.

  • 03:37

    Next up, we have one of the largest data breaches of all time.

  • 03:40

    1 billion Chinese citizens' personal information was leaked, all because credentials to a database

  • 03:46

    belonging to the "Shanghai National Police" were posted online by a sloppy developer.

  • 03:51

    It looks like the programmer accidentally pasted the creds into a blog post, which went

  • 03:55

    on to cause only the largest data leak in Chinese history.

  • 03:58

    And before the post could be deleted someone managed to download the entire 24 Terabyte

  • 04:04

    database, and did the only obvious thing, listing the entire treasure trove for sale

  • 04:09

    on "breachforums" for 10 bitcoin.

  • 04:11

    Now, as far as leaks go, this is a pretty spicy one, not only does it include basic

  • 04:15

    stuff like names, addresses and mobile numbers, but also more sensitive data like national

  • 04:21

    ID numbers - and because this came from the "Shanghai national police", details of crimes

  • 04:26

    committed by each person are in the dump - now, most of the crimes are pretty trivial stuff

  • 04:31

    like road incidents and so on.

  • 04:33

    But nevertheless, this kind of information is gold dust for personalised spear phishing

  • 04:37

    campaigns, someone with enough time on their hands could automate a campaign of text messages,

  • 04:42

    targeting everyone on this list, urging them to... idk... pay a fine for the crime they

  • 04:47

    committed or something.

  • 04:49

    However such a campaign wouldn't be quite so effective if the Chinese government did

  • 04:53

    the right thing and notified their citizens of the leak, encouraging them to be wary of

  • 04:58

    scams.

  • 04:59

    But unfortunately, authoritarian governments aren't known for being humble, and the authorities

  • 05:03

    did the most predictable thing, going one step further than just ignoring the problem

  • 05:08

    and instead trying to actively stop people from discussing the issue.

  • 05:12

    The financial times is reporting that on Chinese social media, Hashtags such as “data leak”,

  • 05:17

    “Shanghai national security database breach” and “1 billion citizens’ records leak”

  • 05:22

    are being censored.

  • 05:23

    Also, I tried searching some keywords on Chinese search engine Baidu "china data leak 1 billion"

  • 05:29

    - But there's no news of the leak at all, instead I was suggested the page "One billion

  • 05:33

    Chinese fully vaccinated", and I guess, maybe the search engine figured out I was searching

  • 05:38

    for dissenting information, because it showed me an article titled "Falsehoods in US Perceptions

  • 05:44

    of China".

  • 05:45

    The forum that was initially host to the sale of the leak subsequently deleted the post,

  • 05:50

    and they also censored discussion of the leak - a post by a forum admin said they had removed

  • 05:55

    the post and deleted any threads discussing the leak, but they didn't give a reason why.

  • 06:00

    What you tend to find is that forums hosting data leaks and hacking tools will often self

  • 06:05

    censor if they draw too much negative attention - which shouldn't be surprising I suppose,

  • 06:10

    would you want to make yourself an enemy of the Chinese state?

  • 06:13

    I imagine not.

  • 06:15

    This video was made possible by Octopart - a website I've been relying on over the last

  • 06:19

    few years in my electronics business.

  • 06:22

    Octopart.com is essentially your component sourcing swiss army knife - making it simple

  • 06:27

    to keep tabs on component stock levels in real time throughout a range of distributors

  • 06:32

    - which is pretty important given the current component supply situation, you can also easily

  • 06:37

    grab datasheets and cad models for components when you need them.

  • 06:40

    The best part is it's free to use, and Octopart is integrated right into altium 365, if you

  • 06:47

    want to give altium a go you can find your free trial link in the description.

  • 06:52

    As always thanks for watching and have a good one.

All

The example sentences of SPYWARE in videos (4 in total of 7)

same adjective product noun, singular or mass in preposition or subordinating conjunction this determiner video noun, singular or mass i personal pronoun explore verb, non-3rd person singular present the determiner many adjective questions noun, plural surrounding verb, gerund or present participle tiktok proper noun, singular is verb, 3rd person singular present it personal pronoun a determiner spyware noun, singular or mass
with preposition or subordinating conjunction advanced verb, past participle spyware noun, singular or mass , which wh-determiner probably adverb is verb, 3rd person singular present n't adverb you personal pronoun or coordinating conjunction i personal pronoun . nevertheless adverb it personal pronoun is verb, 3rd person singular present , shall modal we personal pronoun say verb, base form ,
to to give verb, base form you personal pronoun a determiner quick adjective reminder noun, singular or mass , this determiner spyware noun, singular or mass is verb, 3rd person singular present developed verb, past participle by preposition or subordinating conjunction ' nso proper noun, singular group' proper noun, singular , it personal pronoun primarily adverb
spyware noun, singular or mass developed verb, past participle by preposition or subordinating conjunction an determiner israeli proper noun, singular group noun, singular or mass that wh-determiner can modal hack verb, base form into preposition or subordinating conjunction even adverb the determiner latest adjective, superlative mobile adjective oss proper noun, singular .

Use "spyware" in a sentence | "spyware" example sentences

How to use "spyware" in a sentence?

  • At the bottom, the elimination of spyware and the preservation of privacy for the consumer are critical goals if the Internet is to remain safe and reliable and credible.
    -Cliff Stearns-

Definition and meaning of SPYWARE

What does "spyware mean?"

/ˈspīwer/

noun
software that enables user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
other
Computer software that obtains information from a user's computer without the user's knowledge or consent.