yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

The basics of safe browsing


2m read
·Nov 10, 2024

  • Hi, everyone. Sal Khan here from Khan Academy, and I'm excited to talk a little bit about safe browsing. Our guest today is Kelly Hope Harrington, who's a Senior Staff Software Engineer at Google.

Kelly, welcome.

  • Thank you. Happy to be here.

  • So safe browsing, my sense of browser, we, you go to some websites, it sends up some webpages. What's the worst that can happen?

  • Oh, well there, there's all sorts of bad things that can happen on the internet, and I think some of the ones that come to mind first are things like phishing or social engineering. So, someone is trying to trick you into thinking they're someone you trust. So, you share either your personal information like your password or your credit card information, or maybe you do something that you wouldn't otherwise do because you trust them. And that could be something like downloading, installing malware. So, malware is something that will take over your computer. The attacker is trying to do something to get value out of you. So, maybe they want to take some of your personal data and sell it on the dark web. Maybe they want to do ransomware, where they lock down your computer and won't let you use it until you pay them money. Or maybe they wanna do something sneakier and do crypto mining in the background so your computer gets hot and slow while that's happening. We also see unwanted software. So, unwanted software might have something that you do value, but also does something else.

  • Yeah, so I just wanna make sure I understand this 'cause we talk in other videos about phishing where someone pretends to send you an emergency letter from a bank or whatever, and many of those phishing attacks usually try to get you to some type of a website. And this is where, once again, you're browsing now. You need to make sure that that's actually the website that you think it is.

  • Yeah, yeah. You know, I think that the attackers know you're looking for stuff, so they're trying to take advantage of you're already naturally trying to go and download something, and that is their opportunity to try and trick you, and try and get you to do something that you weren't otherwise gonna do.

  • Super helpful.

More Articles

View All
How do you make a Virtual Reality Glove? - Smarter Every Day 191
Hey, it’s me, Destin. Welcome back to Smarter Every Day. I want this video to be long, and I want it to get down into the weeds and just air out and let me get as technical as I want to. In the last episode of Smarter Every Day, you got to see me interact…
Khan for Educators: Student experience
Hi, I’m Megan from Khan Academy, and in this video, we’re going to walk you through the learner or student experience at Khan Academy. We believe that everyone is a learner; from the teacher perspective, all of your students are learners, and you can be a…
Simulating robots with module imports | Intro to CS - Python | Khan Academy
Let’s design a program that imports functionality from another file. When programming teams collaborate on projects, they’re often writing code across multiple files. They package their work into functions and then share them for other team members to use…
Medical School Exam Week Vlog | Med School Diaries
This video is sponsored by Psych2Go. Psych2Go is an amazing channel for those who are interested in mental care and different things about mental health, and I’m sure that a lot of you guys are following them. Actually, don’t forget to check out their vid…
Derivatives of inverse functions | Advanced derivatives | AP Calculus AB | Khan Academy
So let’s say I have two functions that are the inverse of each other. So I have f of x, and then I also have g of x, which is equal to the inverse of f of x, and f of x would be the inverse of g of x as well. If the notion of an inverse function is comple…
Using TI calculator for P-value from t statistic | AP Statistics | Khan Academy
Miriam was testing her null hypothesis that the population mean of some dataset is equal to 18 versus her alternative hypothesis that the mean is less than 18. With a sample of 7 observations, her test statistic, I can never say that was T, is equal to ne…