yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

The basics of safe browsing


2m read
·Nov 10, 2024

  • Hi, everyone. Sal Khan here from Khan Academy, and I'm excited to talk a little bit about safe browsing. Our guest today is Kelly Hope Harrington, who's a Senior Staff Software Engineer at Google.

Kelly, welcome.

  • Thank you. Happy to be here.

  • So safe browsing, my sense of browser, we, you go to some websites, it sends up some webpages. What's the worst that can happen?

  • Oh, well there, there's all sorts of bad things that can happen on the internet, and I think some of the ones that come to mind first are things like phishing or social engineering. So, someone is trying to trick you into thinking they're someone you trust. So, you share either your personal information like your password or your credit card information, or maybe you do something that you wouldn't otherwise do because you trust them. And that could be something like downloading, installing malware. So, malware is something that will take over your computer. The attacker is trying to do something to get value out of you. So, maybe they want to take some of your personal data and sell it on the dark web. Maybe they want to do ransomware, where they lock down your computer and won't let you use it until you pay them money. Or maybe they wanna do something sneakier and do crypto mining in the background so your computer gets hot and slow while that's happening. We also see unwanted software. So, unwanted software might have something that you do value, but also does something else.

  • Yeah, so I just wanna make sure I understand this 'cause we talk in other videos about phishing where someone pretends to send you an emergency letter from a bank or whatever, and many of those phishing attacks usually try to get you to some type of a website. And this is where, once again, you're browsing now. You need to make sure that that's actually the website that you think it is.

  • Yeah, yeah. You know, I think that the attackers know you're looking for stuff, so they're trying to take advantage of you're already naturally trying to go and download something, and that is their opportunity to try and trick you, and try and get you to do something that you weren't otherwise gonna do.

  • Super helpful.

More Articles

View All
Estimate multiplying multi digit numbers
What I would like to do in this video is get some practice estimating the product of multi-digit numbers, and there’s just no better way of getting practice than just trying it ourselves. So, right over here, it says estimate 29 times 3198. Why don’t you…
How to learn Japanese FAST? Tips from a native speaker 🇯🇵📚✨🌎✈️
Hi guys, it’s me, Judy. Today we’re going to be talking about how to learn Japanese. Since I’m a native speaker in Japanese, I’m going to be sharing you guys my perspectives as a native speaker, and I’m going to be talking about the mistakes that most of …
Double the Lion Prides – Day 96 | Safari Live
We’re down to sunny and warm South Africa, where a few of my friends are stars in the afternoon drive. I believe Mr. Scottie Dyson is already on drive and is ready to say good afternoon, driving in the Maasai Mara. He must be very, very excited. My name’s…
Inside a Dog Rehab Center | National Geographic
We’re going behind the door, so it’ll be a tight squeeze. S.K. and Robin arrived in early 2015. They came to us from Humane Society International, who rescued them in South Korea. They had, you know, told us that these dogs really exhibited behavior that…
How to Photograph the Night Sky | National Geographic
I’m Bubba Wallace and I am a NASCAR race car driver. Photography is a hobby that I love to do. Definitely a good counterbalance to the fast-paced life that I live. We are in Gooseberry Mesa, Utah, to capture some nighttime astrophotography with a new frie…
Domain and range from graphs of quadratic and exponential functions | Khan Academy
So what we want to do in this video is try to figure out the domain and ranges of G of X that’s depicted right over here and H of X that’s depicted over here. So pause this video and see if you can figure out the domain and range of each of these function…